NIH standards that specify products, technologies, or protocols in use or planned, as well as those earmarked to be retired or contained.
Technology Architecture
Brick: 65 related definitions
Brick
- Access Control Brick:
- Logical access control within NIH is provided at the network, operating system, and application level.
Network Access Control. Network access controls...
- Access Router/Switch Brick:
- Access routers and switches connect subnets to the distribution layer. In some cases, the access router/switch functionality is combined with the distribution...
- Application Server Brick:
- An application server is a modern form of platform middleware. It is system software that resides between the operating system on one side, and the external...
- Availability - Application Management Brick:
- Availability - Application Management is the monitoring, collecting and correlating performance, event and availability statistics to predict and, thus,...
- Availability - Database Management Brick:
- Availability - Database Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
- Availability - Server Management Brick:
- Availability - Server Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
- Availability - Storage Management Brick:
- Availability - Storage Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
- Availability Management - Network Brick:
- Network management includes the administrative services performed in managing NIHnet and the Institute and Center (IC) networks, including network devices,...
- Communication Middleware Brick:
- Communication middleware helps programs talk to other programs. It is software that supports a protocol for transmitting messages or data between two points...
- Communications Protocol Brick:
- Communications protocols define the rules for sending blocks of data from one node in the network to another node and are normally defined in layers. A...
- Confidentiality Brick:
- The primary method of protecting confidentiality of information is via encryption. In addition to sensitive business data, there is also data about the...
- Configuration Management Software Brick:
- Configuration Management is the documentation and management of the technical elements and relationships in the IT infrastructure, application and business...
- Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick:
- The Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick addresses optical networking when implemented...
- Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Transport Brick:
- NIH has migrated from an asynchronous transfer mode (ATM) backbone to a Gigabit Ethernet fiber backbone in the Controller Area Network (CAN) environment...
- Core Router Brick:
- Core routers are part of the backbone, which also contains all the high-speed transport media. This layer does not provide any packet manipulation.
- Data Management Middleware Brick:
- Data management middleware functionality helps programs, including application programs and database management systems (DBMS), read from and write to...
- Data Warehouse (DW) Database Server Brick:
- Data Warehouse (DW) database functional requirements are different than Online Transaction Processing (OLTP) Database Management Sytems (DBMS) in that...
- Desktop Web Conferencing Brick:
- Desktop Web Conferencing is defined as applications that enable Internet-based synchronous, real-time meetings with participants in multiple, geographically...
- Digital Identity/Public Key Infrastructure (PKI) Brick:
- Digital Signature systems are defined as applications that provide identification and storage of digital signatures along with validation against a centrally...
- Distribution Router/Switch Brick:
- Distribution routers and switches connect the access layer to the backbone network. The distribution layer directs and filters traffic between access layer...
- Document Imaging Brick:
- Document imaging devices can be standalone or embedded into the organization’s existing, fax, copy or duplication systems. Imaging systems take existing...
- Document Management Tools Brick:
- Document management includes software systems that allow enterprises to generate, produce, store, manage, retrieve, and distribute electronic files (e.g....
- Email Client Operating Systems (OSs) Brick:
- Email client operating systems (OSs) allocate system resources at individual workstations in support of NIH's enterprise email applications.
- Email Server Operating Systems (OSs) Brick:
- Email server operating systems (OSs) allocate system resources for the computers (servers) that run NIH's enterprise electronic mail applications.
- Enterprise and Mid-Range Server Operating System Brick:
- Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application and...
- Enterprise and Mid-Range Server Platform Processor Brick:
- Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application and...
- Enterprise Directories Brick:
- Enterprise directories list and/or describe users and services on the NIH network and are typically used in conjunction with the enterprise messaging ...
- Enterprise Reporting Tools Brick:
- An enterprise reporting tool is one that allows NIH to gain a better understanding of its operations by putting critical information in the hands of all...
- Event Management - MOM Brick:
- Enterprise event management (MoM) systems support the acceptance of events from elements in the IT infrastructure; consolidate, filter and correlate those...
- Event Monitoring and Analysis Brick:
- Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
- File Transfer Middleware Brick:
- File Transfer Middleware is a class of communication middleware specifically focusing on the transfer of files from application to application. The transfer...
- Gateways Brick:
- There are two types of gateways:
1. Database gateways enable access to heterogeneous Database Management Systems (DBMS), usually through a common Structured...
- Identification and Authentication Brick:
- This standard establishes NIH Login as the required method of implementing authentication in web-based applications at the NIH. Authenticated identities...
- Instant Messaging Client Brick:
- The Instant Messaging (IM) Client is the user’s desktop-resident software that enables users to send short, text-based messages or files to other users....
- Instant Messaging Server Brick:
- The Instant Messaging (IM) Server is the application software that enables users to send short, text-based messages or files to other users. The server...
- Integration Adapters Brick:
- Adapters are some combination of design tools and runtime software that act as glue to link applications, which are considered "sources" or "targets" (or...
- Integration Broker Suites (IBS) Brick:
- An integration broker is a third-party intermediary that facilitates interactions among application systems. By definition, the broker itself provides...
- Integrity Brick:
- Anti-Virus. An effective anti-virus architecture uses a multi-tier (that is, desktop, server, and gateway) approach and is not necessarily reliant on a...
- Intrusion Detection Brick:
- Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
- Local Area Network (LAN) Cabling Brick:
- Structured cabling standards have been developed and published by NIH. Figure 2 and Figure 3 in the Patterns section of this report illustrate a high-level...
- Messaging Client Software Brick:
- Messaging client software includes applications that run on workstations and enable peer-to-peer, asynchronous communications.
- Messaging Protocols Brick:
- Messaging protocols are the formal specifications that define data exchange procedures.
- Messaging Servers Brick:
- Messaging servers are enterprise applications that run on a central computer and enable synchronous and asynchronous, peer-to-peer communications.
- Network Load Balancing Server Brick:
- This brick shows NIH’s direction for network load balancers that allow server workload to be distributed across multiple servers for greater end-to-end...
- NIH Federated Identity - Authentication / Authorization Brick:
- The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
- NIH Federated Identity - Identity Provider Brick:
- The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
- NIH Federated Identity - Protocols Brick:
- The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
- Online Transaction Processing (OLTP) Database Server Brick:
- The Online Transaction Processing (OLTP) database market is defined by products that are suitable for a broad range of enterprise-level real time applications,...
- Performance Management Tools Brick:
- Performance Management is the trending of end-to-end response time and performance parameters from network, system and application components to predict...
- Problem Management Tools Brick:
- Problem Management is identifying, quickly resolving and preventing problems through root cause analysis and tracking. Problem management involves identifying...
- Remote Access Technology Brick:
- Remote access provides the ability to connect to the network from a distant location. This requires a computer, a modem and remote access software to allow...
- Resource Scheduling Brick:
- Resource Scheduling is a utility or feature that facilitates commitment of any resource(s) (person, room, office, subjects, equipment, etc.) for either...
- Search Engines Brick:
- A search engine includes a robot or crawler that goes to every page or representative pages on a Website, or the whole Web, and creates an index. It also...
- Secure Email Brick:
- Secure email is a method of establishing trust and securing email communications and attachments exchanged between NIH and external users.
The technology...
- Shared Virtual Workspace Brick:
- Shared virtual workspaces are team-oriented collaboration tools that provide services for sharing files and supporting asynchronous and real-time collaboration...
- Staff Digital Certificate Brick:
- A Staff Digital Certificate is a digital certificate that is issued to an individual staff member of NIH. A staff member is defined as anyone who possesses...
- Video Teleconferencing (VTC) Technology Brick:
- Video teleconferencing technology allows two or more people at different locations to see and hear each other simultaneously, often times even sharing...
- Vulnerability Tools Brick:
- Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
- Web Browsers Brick:
- Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a site and navigate...
- Web Content Management System Brick:
- Web Content Management Systems (WCMS) consist of applications used to create, manage, store and deploy content on the Web, including text, graphics, video...
- Web Server Brick:
- Web servers are software that serve as engines which run websites. Through a Web listener, they accept HTTP (non-encrypted) and HTTPS (encrypted) connections...
- Web Services Brick:
- Web services are not really a technology; they represent software components and a common set of standards supported by multiple, different technologies...
- Wireless LAN Brick:
- The role of a wireless LAN is to extend network coverage to allow for in-building or campus communication for mobile users; wireless LAN (WLAN) equipment...
- Workflow/Business Process Management (BPM) Tools Brick:
- Business Process Management (BPM) is a general term describing a set of services and tools that provide for explicit BPM (for example, process analysis,...
- Workgroup/Server Switch Brick:
- The workgroup and server switches provide connectivity to and between workstations and servers, respectively, within a network segment.
Go to top