An Ethernet operations, administration, and maintenance standard for measuring network performance including latency, packet loss, and jitter. Y.1731 enables service-level agreement monitoring in carrier and enterprise networks.
A network architecture pattern where connections branch from central points in a Y-shaped configuration. Y-topologies appear in physical layouts and logical network diagrams.
A human-readable data serialization format commonly used for configuration files in DevOps and cloud environments. Kubernetes, Docker, and CI/CD pipelines use YAML to define infrastructure and application settings.
A data modeling language defining network device configurations and operational state for automated management. YANG enables programmatic network control through NETCONF and RESTCONF protocols.
A pattern-matching tool creating rules to identify and classify malware samples. Security teams use YARA rules for threat hunting, incident response, and automated malware detection.
A hardware authentication device providing strong multi-factor authentication through FIDO2, U2F, and one-time password protocols. YubiKeys resist phishing and credential theft by requiring physical possession.
Fill-up the contact form and we will connect with you shortly.