IT Terminology
A
D
H
J
A for app
abbreviation / acronyms | term | definition | |
---|---|---|---|
A | |||
A/N/K | alphabetic, numeric, katakana | Pertaining to alphabetic, numeric, or katakana characters. | |
a11y | accessibility | There are eleven letters between the "a" and the "y". | |
A2A | application-to-application | An approach to enterprise application integration that provides visibility into internal systems, so that these systems can share information or business processes. | |
AA | anti-aliasing | the technique of minimizing the distortion artifacts known as aliasing when representing a high-resolution signal at a lower resolution | |
AA | automated attendant | A device, typically attached to a private branch exchange or voice mail system, that answers incoming calls. | |
AAA | authentication, authorization, and accounting | Also pronounced "triple a." Refers to a framework for
intelligently controlling access to computer resources, enforcing
policies, auditing usage, and providing the information necessary to
bill for services. |
|
AAB | All-to-all broadcast | the process where every node broadcasts its information to all other nodes. | |
AAC | |||
AAL | ATM adaptation layer | The ATM layer where non-ATM data is converted to ATM format. The AAL serves as the "glue" that connects traditional packet and frame structures with short, fixed-length ATM cells. | |
AARP | AppleTalk Address Resolution Protocol | Provides for the dynamic assignment of node identifiers to nodes within an AppleTalk network. | |
AAS | Auto Area Segmentation | Scanner technology which detects and optimizes text and graphics on the same page by Epson. | |
AAT | Average Access Time | The average amount of time it takes for a storage peripheral to transfer data to the CPU. | |
AAUI | Apple Attachment Unit Interface | A 14-position, 0.050-inch-spaced ribbon contact connector. | |
ABAP | Advanced Business Application Programming | Powerful programming language created specifically for developing SAP applications. The core development tool in SAP's R/3 system. | |
ABC | |||
ABEND | |||
ABI | application binary interface | A set of specifications that enables an application written for one target OS and hardware platform to run on a different OS and platform, where the two hardware platforms share the same processor type. | |
ABLE | Agent Building and Learning Environment | A Java framework and toolkit for constructing and deploying intelligent agents. | |
ABM | activity-based management | The use of ABC principles in the ongoing management of costs and resources. | |
ABME | asynchronous balanced mode extended | In communications, an operational mode in which modulus 128 sequence numbers are used. | |
ABR | Automatic Baud Rate detection | The process in which a receiving device examines the first character of an incoming message to determines its speed, code level, and stop bits. | |
ABR | available bit rate | An ATM service category. ABR service is conceptually similar to that of a frame relay network - a minimal cell rate is guaranteed, and bursts can be supported if the network resources allow it. | |
ACA | Australian Communications Authority | The Australian government body that regulates the nation's communications industries. | |
ACAP | Application Configuration Access Protocol | a standard for accessing program configuration information from a remote server, allowing a user to use and change their configuration from any workstation by reading or writing the values on a central server. Defined in RFC 2244. | |
ACC | Authorization Contract for Containers | Specification (JSR-115) that defines new java.security.Permission classes to satisfy the J2EE authorization model | |
ACCU | Association of C and C++ Users | A worldwide association of people who are interested in C, C++, and related programming languages. | |
ACD | |||
ACDI | Asynchronous Communications Device Interface | A software device that permits asynchronous transmission, a way of transmitting data in which one character is sent at a time, and there may be uneven amounts of time between characters. | |
ACE | |||
ACEE | access control environment element | In RACF, a control block containing details of the current user, including user ID, current connect group, user attributes, and group authorities. | |
ACF | Advanced Communications Function | A family of IBM communications programs that handle tasks such as resource sharing and distribution of functions. They include ACF/Virtual Telecommunications Access Method (ACF/VTAM) and ACF/Network Control Program (ACF/NCP). | |
ACF2 | Access Control Facility 2 | A host-based security subsystem from CA (formerly Computer Associates); also known as CA-ACF2. | |
ACG | adaptive code generation | A technology that enables a program that uses processor features of a given system model to continue to work correctly when the program is moved to another system model that does not have all the processor features of the original model. | |
ACH | automated clearinghouse | A type of funds transfer network that processes debit and credit transactions between accounts from participating financial institutions. | |
ACI | access control information | Data that identifies the access rights of a group or principal. | |
ACID | atomicity, consistency, isolation, durability | Four well-established tests for verifying the integrity of business transactions in a data-processing environment. | |
ACK | acknowledgement | When a modem receives a data packet, it sends a signal back to the sending modem. If all the data is present and correct, it sends an ACK signal, which acts as a request for the next data packet. | |
ACL | |||
ACM | Association for Computing Machinery | a worldwide association of computer professionals headquartered in the United States. www.acm.org | |
ACMS | Application Control and Management System | A transaction-processing monitor from Compaq (now part of Hewlett-Packard); originally a product of Digital Equipment, which Compaq acquired in 1998. | |
ACP | array control processor | A type of processor used in storage systems. | |
ACPI | Advanced Configuration and Power Interface | A standard developed by Intel, Microsoft and Toshiba to improve PC power management and plug-and-play capabilities. | |
ACR | |||
ACRI | additional coding-related required information | A specification that is required by an encoding scheme to complete its definition, which extends beyond the character set and code page elements. | |
ACROSS | Automated Cargo Release and Operations Service System | Automated Cargo Release and Operations Service System | |
ACSE | Association Control Service Element | The method used in International Organization for Standardization's OSI for establishing a call between two applications. | |
ACSLS | Automated Cartridge System Library Software | A Unix-based tape-library-sharing system from Storage Technology. | |
ACT | access control template | a reusable named authorization pattern that you can apply to multiple resources. An access control template consists of a list of users and groups and indicates, for each user or group, whether permissions are granted or denied. | |
ACU | abstract code unit | A measurement used by the z/OS XL C/C++ compiler for judging the size of a function. The number of ACUs that comprise a function is proportional to its size and complexity. | |
AD | |||
ADAPT | Architecture, Design, Analysis and Planning Tool | Architecture, Design, Analysis and Planning Tool | |
ADB | Apple Desktop Bus | Port on the Macintosh for a keyboard, a mouse, and other peripherals. | |
ADC | |||
ADCCP | Advanced Data Communications Control Procedures | A bit-oriented, ANSI-standard communications link-layer protocol. | |
ADDM | |||
ADE | |||
ADF | |||
admin | ADMINISTRATOR | the account name used by the system administrator under Windows NT and its successors | |
ADI | |||
ADK | Additional Decryption Key | Key to be able to decrypt data even if the private key owner is unwilling to provide the private key | |
ADL | Advanced Distributed Learning | A set of standards designed to facilitate the sharing of learning objects across different learning management systems. | |
ADM | Development Manager |
||
ADMD | Administration Management Domain or Administrative Management Domain | A public e-mail message service that uses the X.400 protocol. | |
ADMF | Asynchronous Data Mover Facility | A IBM mainframe feature designed to enhance system performance in data moves between central and expanded storage. | |
ADN | Advanced Digital Network application delivery networking | ADN refers to a 56Kbps leased-line. ADN is an approach and a suite of technologies that comprises application security, application acceleration and network availability. | |
ADO | ActiveX Data Objects | A high-level data access object model introduced by Microsoft in 1996. | |
ADP | Accidental Damage Protection | A hardware support agreement covering physical damage to aproduct caused by or resulting from a fortuitous incident. Accidents covered include liquid spills, drop impact, electrical surges, and accidental breakage. | |
ADPCM | adaptive differential pulse code modulation | A speech-coding method that calculates the difference between two consecutive speech samples in standard pulse code modulation (PCM) coded telecommunications voice signals. | |
ADS | |||
ADSI | |||
ADSL | Asynchrous Data Switching Line |
A digital local loop using copper facilities and providing greater bandwidth in one direction than the other.
|
|
ADSM | ADSTAR Distributed Storage Manager | An IBM product which provides services for backing up, archiving and restoring data files by allowing a central workstation to act as a server for networked workstations and personal computers. | |
ADSR | Attack, Decay, Sustain, Release | the four parameters in a basic synthesizer. While Sustain is a level control, the Attack, Decay and Release are time and ratio-dependant parameters. When a key is pressed, the Attack determines the ratio with which it reaches a top level and the begins to fall at the ratio of the Decay parameter down to the level set by the Sustain value. | |
ADSTAR | Automated Document Storage and Retrieval | IBM's name for its storage products business in the 1990s. | |
ADT | |||
ADTG | Advanced Data Table Gram | Microsoft Proprietary binary format for storing database data | |
ADUC | Active Directory Users and Computers | A snap-in in the Microsoft Management Console (MMC) | |
AEC | Architecture, Engineering, Construction | A computer graphics market requiring specialized applications that facilitate efficient planning, design, drafting, and analysis. | |
AES | Advanced Encryption Standard |
A competition is currently underway to
define a public 256-bit symmetric encryption algorithm that will
replace DES (Data Encryption Standard).
|
|
AF | |||
AFC | antiferromagnetically coupled | A type of storage media that uses an advanced magnetic coating expected to dramatically increase HDD capacity. IBM shipped the first AVC-based storage products in 2001. | |
AFI | Authority and Format Identifier | This identifier is part of the network level address header. | |
AFIS | Automated Fingerprint Identification System |
a biometric ID methodology that uses
digital imaging technology to obtain, store, and analyze fingerprint
data. The AFIS was originally used by the U.S. Federal Bureau of
Investigation (FBI) in criminal cases.
|
|
AFK | Away From Keyboard | An example of Internet shorthand used in chat rooms, E-Mail, and instant messages. | |
AFM | Atomic Force Microscope | a powerful tool to manipulate matters at the nanoscale. It is today used for imaging a wide range of surfaces such as glass, composites, ceramics, polymers and biological samples. AFM finds increasing application in nanotechnology and biophysics. | |
AFP | |||
AFL | Academic Free License | permissive free software license written in 2002 by Lawrence E. Rosen | |
AGC | Automatic Gain Control | Most often used in audio circuits; an electronic circuit which automatically increases the volume when someone is speaking quietly and drops the volume when someone is speaking loudly, to keep the transmitted signal constant. | |
AGP | Accelerated Graphics Port | An Intel technology for desktop systems. It increases system performance by offloading graphic requirements from the system bus to a bus dedicated to video processing. | |
AHCI | Advanced Host Controller Interface | an interface specification that allows the storage driver to enable advanced SATA features such as Native Command Queuing and hot plug. | |
AHP | analytical hierarchy process | A process that uses hierarchical decomposition to deal with complex information in multicriterion decision making, such as information technology vendor and product evaluation. | |
AI | |||
AIA | Application Integration Architecture | Application Integration Architecture | |
AID | attention identifier | A character in a data stream that is sent to the host system when a display station user presses an AID key. Typical AID keys are function keys or the Clear, Enter, Page Up, Page Down, Help, Print, and Home keys. | |
AIM | AOL Instant Messenger | an application that allows computer users to correspond with friends while online | |
AIN | Advanced Intelligent Network | Introduced by AT&T Network Systems in 1991, AIN enables service providers to define, test and introduce new multimedia messaging, personal-communication and cell-routing services. | |
AIO | all in one | These are printers that are a combination of various devices in one machine, including printer, scanner, fax machine and copier. | |
AIOD | Automatic Identified Outward Dialing | An option on a PBX that specifies the extension number instead of the PBX number on outward calls. Used for internal billing. | |
AIP | Advanced Inspection and Prevention |
Cisco ASA add-in modules | |
AIR | Additive Increase Rate | An ABR service parameter, AIR controls the rate at which the cell transmission rate increases. It is signaled as AIRF, where AIRF = AIR*Nrm/PCR. | |
AIT | Advanced Intelligent Tape | An eight-millimeter helical-scan tape drive designed and manufactured by Sony. Sony has differentiated its AIT drive from other 8-millimeter tape drives with a unique media feature on the tape cartridge called memory in cassette (MIC). | |
AIX | Advanced Interactive Executive |
AIX is an operating system developed by IBM and is in fact Unix-based.
|
|
Ajax | Asynchronous JavaScript and XML | A way of including content in a web page in which javascript code in the web page fetches some data from a server and displays it without re-fetching the entire surrounding page at the same time (hence the 'Asynchronous') | |
AJP | Apache JServ Protocol | Binary, packet-oriented protocol bridging the web server with the servlet container. The web server attempts to maintain persistent TCP connections to the servlet container, and to reuse a connection for multiple request/response cycles | |
AL PA | Arbitrated Loop Physical Address | In Fibre Channel transmissions, an 8-bit value used to identify a participating device in an arbitrated loop. | |
ALET | access list entry token | A token that serves as an index into an access list. | |
ALG | Application Layer Gateway | Used in conjuction with NAT to allow IP address translation | |
ALGOL | ALGOrithmic Language | a pair of programming languages that had a strong impact on programming language design. | |
ALI | Application layer interface |
The ALI forms the interface for the application layer in the
OSI reference model. It provides a clearly defined separation of communication and application
|
|
ALM | |||
ALP | Application Layer Program / Protocol | A program or network protocol at the Application Layer | |
ALSA | Advanced Linux Sound Architecture | Linux kernel component intended to replace the original Open Sound System for providing drivers for sound cards. | |
ALT | alternative | ||
ALU | |||
AM | Amplitude Modulation | A particular technology, most commonly used in radio broadcasting, where blending a modulated signal into a carrier wave by varying the amplitude of the carrier creates the final transmit frequency. | |
AMA | automatic message accounting | A function that automatically documents billing data related to subscriber-dialed long-distance calls. | |
Amanda | (formerly) Advanced Maryland Automatic Network Disk Archiver | an open source computer archiving tool that is able to back up data residing on multiple computers on a network. http://www.amanda.org/ | |
AMD | |||
AME | Advanced Metal Evaporated | A media formulation manufactured by Sony for use in its consumer and computer product lines. | |
ami | Analyze, Metricate, Improve | A method for software project management and process improvement. | |
AMI | infrastructure |
||
AML | |||
AMMA | Advanced Memory Management Architecture | Strategies for providing sufficient memory to all the processes in a computer system, performed by the memory management unit. | |
AMP | |||
AMPS | Advanced Mobile Phone System | The original standard specification for analog systems. Used primarily in North America, Latin America, Australia and parts of Russia and Asia. | |
AMR | |||
AMRF | Action Message Retention Facility | A z/OS facility that, when active, retains all action messages except those specified by the installation. | |
AMS | access method services | A multifunction utility named IDCAMS that is used to manage catalogs, devices, and both VSAM and non-VSAM data sets. | |
AMT | |||
AMTA | American Mobile Telecommunications Association | AMTA represents and promotes the interest of specialized wireless communications, meeting the educational, informational and regulatory needs of licensees and related businesses. See them at AMTAUSA.ORG. | |
ANDF | Architecture-Neutral Distribution Format | an emerging OSF standard for software distribution. Programs are compiled into ANDF before distribution, and executables are produced from it for the local target system. | |
ANI | Automatic Number Identification | The number associated with the telephone station from which switched calls are originated or terminated. | |
Anon FTP | Anonymous FTP | A method for downloading and uploading files using FTP protocol without having a username or a password. In place of a username, word "anonymous" is used, and in place of a password, email address is usually used. | |
ANOVA | analysis of variance | A form of statistical analysis. | |
ANR | automatic network routing | In High-Performance Routing (HPR), a highly efficient routing protocol that minimizes cycles and storage requirements for routing network layer packets through intermediate nodes on the route. | |
ANSI | American National Standards Institute | the main industrial standardization organization in the United States. There are official ANSI standards in almost all industries, and many of them have to do with computers. www.ansi.org | |
ANX | Automotive Network Exchange | Established by the Automotive Industry Action Group to offer extranet-based applications to suppliers of Chrysler, Ford and General Motors. | |
AOA | angle of arrival | Based on triangulation, a method of processing cellular phone signals, AOA allows the physical position of switched-on wireless devices to be located. | |
AOCE | Apple Open Collaboration Environment | Macintosh System 7 extensions that make it possible to share e-mail, directory, and other services in a multiplatform environment. | |
AoE | Ata Over Ethernet | Network protocol designed for simple, high-performance access of SATA storage devices over Ethernet networks. It gives the possibility to build SANs with low-cost, standard technologies | |
AOF | |||
AOL | |||
AOR | Address of Record |
An SIP term, an AOR provides a single public address for all
telecommunications. The AOR can be mapped across multiple devices and media types.
|
|
AP | access point | a hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN. APs are important for providing heightened wireless security and for extending the physical range of service a wireless user has access to. | |
APA | all-points addressable | Able to address, reference, and position text, overlays, and images at any defined position or picture element (pel) on the printable area of the paper. | |
APaaS | application platform as a service |
application platform as a service | |
APACS | Association for Payment Clearing Services | The organization that manages U.K. payment systems. | |
APaRT | automated packet recognition/translation | Technology that allows a server to be attached to CDDI or FDDI without requiring the reconfiguration of applications or network protocols. | |
APC | |||
APDU | application-layer protocol data unit | In OSI, a protocol data unit in the application layer. | |
APF | Automated Purposing Framework | Collection of scripts and utilities that enable you to consistently and reliably prepare computer hardware (BIOS, mass storage) and install the Windows operating system and layered products on one or more build computers | |
API | Application Programming Interface |
An interface to a computer operating
system or software program that gives other programs access to
functions similar to those offered to users through a graphical user
interface.
|
|
APM | |||
APML | Attention Profiling Markup Language | used to consolidate and aggregate individual users' ranked interests | |
APNIC | Asia Pacific Network Information Center | Nonprofit Internet registry organization for the Asia Pacific region. The other Internet registries are currently IANA, RIPE NCC, and InterNIC. http://www.apnic.net/ | |
APO | Advanced Planner and Optimizer | A supply-chain-planning suite from SAP. | |
APOP | Authenticated Post Office Protocol | similar to the POP protocol except that APOP enables your password to be encrypted while being transmitted over the network. | |
APOT | Alternate (Additional) Point of Termination | form identifies specific collocation terminations at the ICDF frame where the CLEC "UNE termination cables" are terminated. These terminations are used for the purpose of ordering UNEs, Ancillary Services, or Finished Services. | |
app | application | a computer program that performs useful work not related to the computer itself. Examples include WORD PROCESSORs, PRESENTATION GRAPHICS programs | |
APPC | Advanced Program-to-Program Communication | The programming interface to LU 6.2, IBM's protocol for peer-to-peer program communication under SNA. | |
APPN | Advanced Peer to Peer Networking | IBM data communications support that routes data between Advanced Peer-to-Peer Communication (APPC) systems to enable users anywhere on the network to have direct communication with each other. | |
APR | Apache Portable Runtime | Its mission is to provide a free library of C data structures and routines, forming a system portability layer to as many operating systems as possible, including Unices, MS Win32, BeOS and OS/2 | |
APS | |||
APWG | Anti-Phishing Working Group |
an international membership
organization that seeks to eliminate fraud based on attacks from
phishing and e-mail spoofing. These attacks hurt legitimate businesses
as the attackers fraudulently use the identity of an established
organization in their attack.
|
|
AQCB | Automated Quote Contract Billing | System used to price non-tariffed products and services. | |
AR | differentiates AR from virtual reality. |
||
ARA | Apple Remote Access | Communication software designed to offer remote access to an AppleTalk-compatible network via an ARA server. | |
ARAD | architected rapid application development | SOA tools that automate models and rules | |
ARAG | AntiReflection AntiGlare | There are add-on screens for monitors that eliminate screen glare and protect the user’s eyes. | |
ARCNET | Attached Resource Computer NETwork | a LAN protocol, similar in purpose to Ethernet or Token Ring. | |
ARD | Automatic Ring Down | Private line connecting a station instrument in one location with a station instrument in another location. When station one is off hook, station two rings. Also called "hot line". | |
ARIA | Accessible Rich Internet Applications | ARIA, also WAI-ARIA, defines a way to make Web content and Web applications more accessible to people | |
ARIN | American Registry for Internet Numbers | the Internet registry service for North and South America, as well the Carribean and sub-Saharan Africa. http://arin.net/ | |
ARL | ABLE Rule Language | A rule-based programming language that is used to express business logic outside of program logic. ARL provides tight integration with Java objects, and the tooling provided with ABLE is based on the Eclipse platform. | |
ARM | Advanced RISC Machines | a RISC processor find most of their use on hand-held machines and PDAs. Currently owned by Intel, and currently produced by both the above and Digital/Compaq. | |
ARP | Address Resolution Protocol | A method for finding a host's Ethernet address from its Internet address. It works like this: The sender broadcasts an ARP packet containing the Internet address of another host and waits for it to send back its Ethernet address. | |
ARPANET | Advance Research Projects Agency Network | A packet-switched network developed in the early 1970s. The “father” of today’s Internet. ARPANET was decommissioned in June 1990. http://www.arpa.mil/ | |
ARQ | automatic repeat request | A modem status signal indicated by a light on the modem; in cases of transmissions errors, the ARQ is a request to the sender to retransmit. | |
ARS | |||
ART | Additional Reference Transmission | ART is carrier term | |
ARTS | Association for Retail Technology Standards | Data Model standard | |
ARu | audio response unit | Output device which provides a spoken response to digital inquiries from a telephone or other device. The response is usually assembled by a computer from a prerecorded vocabulary of words. | |
AS/400 | Application System/400 | A midrange computer system introduced by IBM in 1988 as a replacement for its System/36 and System/38 product families. | |
AS2 | Applicability Statement 2 |
a specification for EDI between
businesses using the Internet's Web page protocol, HTTP. The
specification is an extension of the earlier version, Applicability
Statement 1 (AS1).
|
|
ASA | average speed of answer | A standard quantitative method for measuring the speed at which call center calls are answered. | |
ASBR | Autonomous System Boundary Router | ASBRs run both OSPF and another routing protocol, such as RIP. ASBRs must reside in a nonstub OSPF area. | |
ASC | Abstract Syntax Checker | In OSI, a utility program for OSI Communications Subsystem that processes user-specified ASN.1 statements | |
ASCII | American Standard Code for Information Interchange |
pronounced as-kee, standard way of
encoding characters into digital codes. An ASCII file is taken to mean
a text file containing unformatted text that is, characters but not
information about fonts, sizes and so on.
|
|
ASCL | Asianet Satellite Communications Limited | dataline, broadband internet, leading ISP in kerala. asianet.co.in | |
ASE | |||
ASF | |||
ASIC | Application-Specific Integrated Circuit | A chip with custom-built hardware circuits for a particular set of functions. ASICs are commonly used in networking devices to maximize performance and provide integration of multiple functions into a single chip. | |
ASIF | access security information field | In SNA, a field within Function Management Header Type 5 (FMH-5), which is used to convey security information. | |
ASIS | access security information subfield | In SNA, a subfield within Function Management Header Type 5 (FMH-5), which is used to convey security information. | |
ASK | Anomalous State of Knowledge | ASK is a programming term | |
ASLR | Address Space Layout Randomization | a process which entails arranging the positions of major data areas randomly in virtual address space. Microsoft's Windows Vista and Windows Server 2008 have ASLR enabled by default | |
ASLS | Analog Single Line Station | a telephony term. An extension port on a PABX/KSU that will allow a standard household type phone to interface with the system. | |
ASM | |||
ASML | originally ASM Lithography (ASM for Advanced Semiconductor Materials) | largest supplier in the world of photolithography systems for the semiconductor industry, founded in 1984 as a joint venture between the Dutch companies Advanced Semiconductor Materials International (ASMI) and Philips. www.asml.com | |
AS | Activesync | AS is Microsoft software | |
AS / ASN | autonomous system (number) | A number assigned to a local network, registered into the carrier's routing community and placed under the umbrella of an administrative domain called an autonomous system | |
ASN | Abstract Syntax Notation | The International Organization for Standardization's OSI language for describing abstract syntax. | |
ASN.1 | Abstract Syntax Notation One | In OSI, a notation for defining data structures and data types. The notation is defined in international standards ISO 8824/ITU X.208 and ISO 8825/ITU X.209. | |
ASO | Address Supporting Organization | ICANN Supporting Organization responsible for reviewing and developing recommendations on IP address policy aso.icann.org |
|
ASP | |||
ASPI | Advanced SCSI Programming Interface | An interface from Adaptec that allows application programs to access SCSI hardware. See SCSI. | |
ASPX | Active Server Pages eXtended | Dynamic web pages engine for the Microsoft .NET framework | |
ASQ | Automated Software Quality | The use of software tools, such as automated testing tools, to improve software quality. |
|
ASR | |||
ASV | Approved Scanning Vendor | Company approved by the PCI SSC to conduct external vulnerability scanning services. | |
AT | Advanced Technology | the class of IBM PCs originally introduced in 1984 using the 80286 microprocessor and a 16-bit bus | |
AT&T | American Telephone And Telegraph | The USA's major common carrier for long distance telephone lines. | |
ATA | |||
ATAG | Authoring Tool Accessibility Guidelines | W3C recommendation that explains how to develop authoring tools that make it easier to produce accessible Web pages that conform to the Web Content Accessibility Guidelines (WCAG) | |
ATAPI | AT Attachment Packet Interface | A hardware and software specification that documents the interface between a host computer and CD-ROM drives using the ATA bus. | |
ATB | all trunks busy | A single tone interrupted at a 120 impulses per minute (ipm) rate to indicate all lines or trunks in a routing group are busy. | |
ATCA | Advanced Telecom Computing Architecture |
ATCA provides the telecommunications
industry with an opportunity to adopt a standard architecture for a
broad spectrum of products, including wireless access, wireless core
networks, and IP Multimedia Subsystem IMS network elements.
|
|
ATG | |||
ATI | Allied Telesyn International | Networking hardware manufacturer | |
ATL | |||
ATLAS | Authorization Token Layer Acquisition Service | Describes the service needed to acquire authorization tokens to access a target system using the CSIv2 protocol. This design defines a single interface with which a client acquires an authorization token | |
ATM | |||
ATO | assemble to order | A strategy allowing a product or service to be made to meet the custom requirements of a specific order, where a large number of such customized products can be assembled in various forms from common components. | |
Atom | |||
ATP | |||
ATPCO | Airline Tariff Publishing Company | The central database where airlines file and publish their fares | |
ATRAC | Adaptive TRansform Acoustic Coding | Audio compression algorithm, introduced by Sony for its Mini Disk, which relies on the masking of low-amplitude frequency components by temporaly adjacent high-amplitude components | |
ATRN | Authenticated Turn | Authenticated Turn | |
ATSC | Advanced Television Systems Committee | an international, non-profit organization developing voluntary standards for digital television. | |
ATTIS | AT&T Information Systems | A division of AT&T Technologies that supplies and manufactures CPE. | |
ATU-C / ATU-R | ADSL Transmission Unit, Central or Remote | Device at end of ADSL line that stands between line and first item of equipment in subscriber premises or telephone switch. May be integrated within access node. | |
ATUL | ADSL Termination Unit Remote | ATUR is the ADSL modem or PC card that physically terminates an ADSL connection at the end user’s location. | |
ATVEF | Advanced TV Enhancement Forum | A standard for creating enhanced, interactive television content and for delivering that content to a range of television, set-top, and PC-based receivers (http://www.atvef.com). | |
ATX | Advanced Technology eXtended | A particular set of characteristics defining a generic type of motherboard, power supply and chassis combination. The definition came from Intel, along with a consortium of hardware and software makers to define the ability of the design. | |
AUDIT | AUtomated Data Input Terminal | AUtomated Data Input Terminal | |
AUI | Attachment Unit Interface | a device that contains a 15-bit pin, or socket, and is used to connect a NIC with a standard Ethernet cable. | |
AUIML | Abstract User Interface Markup Language | An XML implementation that provides a platform and technology-neutral method of representing windows, wizards, property sheets, and other user interface elements. | |
AUP | acceptable use policy | a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. | |
AUTOEXEC | Automatic Execution | When a program is executed on it's own. | |
AUTONEG | Autonegotiation | a feature that determines link options and optimal settings for a given Ethernet connection. When AUTONEG is enabled, a network interface card or a switch port can determine the capabilities of the device at the far end of the link and select the best mode of operation. | |
AUV | Autonomous Underwater Vehicle | a robotic device driven through water by a propulsion system. AUVs are self-sufficient vehicles carrying their own energy source. The control of the vehicle is done using an onboard computer thus eliminating the need of operators located elsewhere. | |
AUX | auxiliary device | A peripheral device that may perform a useful function but is not necessary for the operation of the computer. Examples are printers, scanners, and modems. | |
AV | |||
AVD | alternate voice data | A single transmission facility which can be used for either voice or data. | |
AVED | AntiVirus Emergency Discussion list |
A mailing list for professional
antivirus researchers allowing them to alert other researchers to
emerging or ongoing 'crisis' or 'emergency' virus events.
|
|
AVI | Audio/Video Interleaved | AVI is the most common format for audio/video data on the personal computer. | |
AVK | Application Verification Kit | Tool intended to help developers test their applications for correct use of J2EE APIs and portability across J2EE compatible application servers, and to help developers avoid inadvertently writing non-portable code | |
AVS | Application Visualisation System | a portable modular UNIX-based graphics package supported by a consortium of vendors including Convex, DEC, IBM, HP, SET Technologies, Stardent and WaveTracer. | |
AVST | Applied Voice & Speech Technologies Inc. | software company in the telecommunication industry http://www.avst.com/ | |
AWD | Access Workflow Designer | Organize and track information | |
AVVID | Architecture for Voice, Video and Integrated Data | An architectural approach for integrating enterprise voice, video and data traffic over IP-based networks, introduced by Cisco Systems in 1999. | |
AWE | Advanced WavEffects | A series of sound cards from Creative Labs that includes the Sound Blaster AWE 32, the Sound Blaster AWE64, and the AWE64 Gold. | |
AWS | Advanced Wireless Services Amazon Web Services | AWS-1 (or UMTS band IV) is a wireless telecommunications spectrum band used for mobile voice and data services, video, and messaging. AWS-1 is used in the United States. Amazon Web Services (AWS) delivers a set of services that together form a reliable, scalable, and inexpensive computing platform “in the cloud”. aws.amazon.com/ | |
AWT | Abstract Window Toolkit | In Java programming, a collection of GUI components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all operating system environments. | |
a+ | Pronounced A plus, a certification developed by the Computing Technology Industry Association (CompTIA) to validate vendor-neutral skills for entry-level computer technicians. Holders of the A+ certification have been trained in installing, repairing, troubleshooting, maintaining, customizing and operating PCs. | ||
AC97 | The popular audio system from Realtek. | ||
acoustic coupler | A special type of modem that converts acoustic energy (sound waves) into electrical energy, allowing a standard telephone handset to be attached to a computer or data terminal for data transmission. | ||
ActiveX | A Microsoft technology that facilitates various Internet applications, and therefore extends and enhances the functionality of Microsoft's Internet Explorer browser. Like Java, ActiveX enables the development of interactive content. | ||
Activity Streams | a publish/subscribe notification mechanism that provides frequent updates to subscribers about the activities or events that relate to another individual. | ||
Ada | a programming language developed in the late 1970s for the U.S. Department of Defense. | ||
Ad Hoc Network | A decentralized wireless network in which each node is capable of forwarding data to other nodes without relying on an established access point. An ad hoc network can be created spontaneously as needed and requires no permanent infrastructure. | ||
Adwords | an advertising service by Google for businesses wanting to display ads on Google and its advertising network. The AdWords program enables businesses to set a budget for advertising and only pay when people click the ads. adwords.google.com | ||
Aero | The new user interface for Windows Vista, except for the Start and Home Basic editions. | ||
air interface | a cellular industry term. It refers to the system that ensures compatibility between subscriber terminal equipment (i.e. cell phones and PDAs) and base stations. It involves the specification of channel frequencies and widths, | ||
air PBX | an IP-PBX system in which traditional PBX desk phones are replaced by cell phones. The implementation can be via WLAN or cellular. Devices using software telephone ("softphone") technology can use all functions provided by the call manager. | ||
always-on | An internet connection which remains on 24/7 such as ADSL or cable, rather than only connecting on demand like a dialup. | ||
Android | Linux based operating system that is backed by Google and the other members of the Open Handset Alliance. | ||
Anonymous | With no traceability; unable to ascertain the actual
identity of the claimed identity; very likely to imply naming that is
intentionally opaque. |
||
antenna | A metallic device used to transmit and receive electromagnetic waves. An antenna can be a passive or active device. | ||
applet | This a Java program that can be embedded in a Web page. The difference between a standard Java application and a Java applet is that an applet can't access system resources on the local computer. | ||
archive | Data that is important information, stored for a long period of time in some recording media such as magnetic tapes, storage arrays or other non-active hard disks. | ||
atom | Atom is an alternate XML format for easily sharing content, much like RSS Really Simple Syndication (format). Blogs on http://www.blogger.com/ for example, publish Atom feeds. | ||
Autonomous Vehicles | can drive itself from a starting point to a predetermined destination in "autopilot" mode using various in-vehicle technologies and sensors, including GPS navigation technology | ||
avatar | |||
AVG | AVG is a family of anti-virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing platforms, developed by AVG Technologies. http://www.avg.com | ||
AZERTY | The standard French language keyboard layout. Term comes from the first six letters below the row of numbers. |
B
B for bandwidth
abbreviation / acronyms | Term | Definition |
---|---|---|
b | bit | The number of bits used to represent a character. For personal computers a byte is usually 8 bits. |
B | byte | |
B channel | Bearer Channel | A wire used in ISDN service that can carry up to 64 Kbps of data when operating at full capacity. It is a clear channel "pipe" that carries voice, data, or video over ISDN. The BRI service offered to home users has two B channels. |
B2B | business-to-business | B2B is also commonly used as an adjective to describe any activity, be it B2B marketing, sales, or e-commerce, that occurs between businesses and other businesses |
B2C | business-to-consumer | B2C describes activities of commercial organizations serving the end consumer with products and/or services. It is usually applied exclusively to electronic commerce. |
B2E | business-to-employee | The use and leverage of e-business approaches and Internet technologies to deliver a comprehensive set of services to an enterprise's employees and their managers. The full term is sometimes presented as "business-to-enterprise." |
B8ZS | Binary Eight Zero Suppression. | 8ZS is a technique in T1 that modifies the AMI encoding to ensure minimum pulse density without altering customer data. When eight "zeros" in a row are detected, a pattern with intentional bipolar violations is substituted. |
B-HAVW | Behavioral Heuristic Analyzer in Virtual Environments | Bitdefender technology |
BAA | Blanket Authorization Agreement | Signed by interconnectors guaranteeing that they have authority of the end user customer to request CPNI and place service orders on the customer’s behalf. |
BAC | BroadCast Agent | Business Objects broadcast agent |
BACNET | Building Automation and Control Network protocol | a communications protocol for building automation and control networks. |
BAF | Bellcore AMA Format | Bellcore (Now Telcordia Technologies) AMA Format |
BAI | Bank Administration Institute | File / report format used in financial services industry |
BAM | business activity monitoring | A Gartner term that defines the concept of providing real-time access to critical business performance indicators to improve the speed and effectiveness of business operations. At its broadest level, BAM is the convergence of operational business intelligence and real-time application integration. |
BAN | Body Area Networks | an emerging field of technology that has the potential to revolutionize healthcare and pathbreaking applications in sports, communications and security. |
BAPI | Business Application Programming Interface | A set of documented, server-side interfaces to one or more R/3 processes, from SAP. BAPI packages multiple internal functions to enable programmatic access to such higher-order tasks as checking customer numbers, providing product descriptions, selecting products, creating quotations or creating orders. |
bar file | broker archive file | The unit of deployment to the broker; also known as a bar file. It contains any number of compiled message flows (.cmf), message sets (.dictionary), and a single deployment descriptor. |
Basel II | Basel Capital Accord | a regulatory framework for the banking sector, developed by the Basel Committee on Banking Supervision. This committee meets every three months at the Bank for International Settlements in Basel, Switzerland. |
BASH | Bourne-Again SHell | an interactive UNIX shell based on the traditional Bourne shell, but with increased functionality. BASH is the shell, or command language interpreter, that will appear in the GNU operating system |
BASIC | Beginners' All-purpose Symbolic Instruction Code | A high-level algebraic programming language developed at Dartmouth College in the 1960s and widely taught to beginning programmers. It is simple to use but lacks speed. |
BAT | ||
BBC | British Broadcasting Corporation Broadband Bearer Capability | The British Broadcasting Corporation (BBC) is a British public service broadcaster, headquartered at Broadcasting House in the City of Westminster, London http://www.bbc.co.uk/> A bearer class field that is part of the initial address message. |
BBCs | buffer-to-buffer credits | allow data communication in a Fibre Channel SAN where there are long spans of fiber optic cable. Unless storage distance extension is employed, latency imposes a distance limitation of a few kilometers between the source and the destination in the network. |
BBN | Bolt, Beranek and Newman | the last names of the three founders of BBN Technologies and the original name of the company. |
BBP | Business-to-Business Procurement | A catalog-based procurement product from SAP. |
BBS | Bulletin Board System | A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time. |
BC4J | Business Components For Java | Java 2 platform, Enterprise Edition (J2EE) framework that helps developers quickly construct high-performance J2EE applications following industry-standard design patterns |
BCB | buffer control block | An opaque cache manager structure that is used to maintain state as a file system pins and releases data (for example, its volume structure) in the cache. |
Bcc | Blind Carbon Copy | When you send an e-mail to only one person, you type the recipient's address in the "To:" field. When you send a message to more than one person, you have the option to enter addresses in the "Cc:" and "Bcc:" fields. |
BCC | Block Check Character | A control character added to a block in character oriented protocols (such as Bisync) used for determining if the block was received in error |
BCD | binary-coded decimal | a format for representing decimal numbers (integers) in which each digit is represented by four bits (nybble or nibble). See byte. For example, the number 375 would be represented as: 0011 0111 0101. |
BCE | Bell Canada Enterprises; | Canada's Largest Communications Company http://www.bce.ca |
BCEL | Byte Code Engineering Library | Library intended to give users a convenient possibility to analyze, create, and manipulate (binary) Java class files |
BCI | Business Continuity Institute | The BCI promotes the highest standards of professional competence and commercial ethics in the provision, maintenance and services for Business Continuity Management (BCM). |
BCM / BCMP | Business Continuity Management (Planning) | automates the collaborative research, analysis and writing needed to create a recovery plan for critical business and IT operations that can be published and distributed to the recovery teams. |
BCOCA | Bar Code Object Content Architecture | An architected collection of constructs used to interchange and present bar code data. |
BCP | ||
BCS | basic content services | BCSs provide document library services with complementary ad hoc imaging, basic Web publishing, document collaboration and document routing as their core functionalities. |
BCUG | bilateral closed user group | In data communication, two users who have bilaterally agreed to communicate with each other, but not with other users. |
BCV | business continuance volume | EMC's name for the data volumes created by its Symmetrix TimeFinder feature. BCVs are copies of active data volumes that are separately addressed from the source volume. |
BCX | Basic To C Translator | an open source and free software, translates BASIC to C/C++ for compilation on various Win32 compilers. It is a small command line tool that takes a BASIC source code file and outputs a C/C++ source code file. |
BD | Blu-ray Disc | This is an optical disc format that was developed to enable recording, playback, and rewriting of HD video. This technology has a storage capacity far greater than that of traditional DVDs. |
BDC | Backup Domain Controller | Secondary to the PDC, provides user/computer domain authentication |
BDF | building distribution frame | The location in a building where equipment attaches a number of cables from the LDF's |
BECN | Backward Explicit Congestion Notification | A bit sent by a frame relay network to notify an interface device (DTE) that congestion avoidance procedures should be initiated by the sending device |
BEEP | Blocks Extensible Exchange Protocol | a framework for creating network application protocols. It is intended to abstract-out the common features that have traditionally been duplicated in each protocol implementation |
Bellcore | Bell Communications Research | A jointly owned, financed and centrally staffed organization of the regional holding companies formed after the AT&T divestiture in 1984, charged with establishing network standards and interfaces. Bellcore changed its name to Telcordia Technologies in 1999. |
BER | ||
BERT | Bit Error Rate Test | A test that reflects the ratio of errored bits to the total number transmitted. Usually shown in exponential form (10^-6) to indicate that one out of a certain number of bits are in error. |
BES | BlackBerry Enterprise Server | BlackBerry's mobility platform |
BFR | Bona Fide Request | Submitted CLECs with an interconnection, or pending, agreement with Qwest for non-tariffed, non-negotiated, non-mandated services, including operations standards. |
BFT | Binary File Transfer | A method of transferring files using fax modems. It's an extension to the fax protocol. |
BGA | ball grid array | As opposed to a pin grid array (PGA), a ball grid array is a type of microchip connection methodology. Ball grid array chips typically use a group of solder dots, or balls, arranged in concentric rectangles to connect to a circuit board. |
BGAN | Broadband Global Area Network | BGAN is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface. |
BGP | Border Gateway Protocol | The interdomain routing protocol implemented in Transmission Control Protocol/Internet Protocol (TCP/IP) networks. |
BGP-4 | Border Gateway Protocol-4 | A networking redundancy service based on BGP. It enables an enterprise to route Information Protocol (IP) traffic destined for the same IP address via different network connections. In a BGP-4 environment, when a transmission comes from an Internet service provider's network, it will look for the primary router that connects to the enterprise's location. |
BHCA | busy hour call attempt |
The capacity of a voice call processor
can be measured in BHCAs. BHCAs measure the amount of
calls that a voice system can attempt to handle in a
continuous one-hour period (for example, 2,500 busy hour call attempts
or, equivalently, 2,500 call attempts during the busy
hour). BHCA capacities include all calls attempted, whether
completed or not.
|
BHCC | busy hour call completion |
The capacity of a processor can be measured in terms of
BHCCs. BHCCs are a measure that includes only completed calls, which makes it a more rigorous metric than BHCA. |
BHLI | Broadband High Layer Information | This is a Q.2931 information element that identifies an application (or session layer protocol of an application). |
BHMC | Busy Hour Minutes of Capacity | For Switched Access |
BHO | Browser Help Object | a software component that can be added to Internet Explorer to add new functions. |
BI | business intelligence | An interactive process for exploring and analyzing structured, domain-specific information to discern business trends or patterns, thereby deriving insights and drawing conclusions. The BI process includes communicating findings and effecting change. |
BIA | business impact analysis | An analysis of the costs that would be incurred if a system or set of business processes failed to function properly. BIA is a required early step in the BCP process. |
BIBOP | big bag of pages | a technique that encodes object type in the high-order bits of their address, by using a lookup table that maps from those bits to a type. |
BIC | bank identifier code | A code used to uniquely identify a bank, logical terminal, or branch within a SWIFT network. |
BICI | Broadband Inter-Carrier Interface | A carrier-to-carrier interface line PNNI (private network-to-network interface) that is needed because carriers do not permit their switches to share routing information or detailed network maps with their competition's equipment. |
BiDi | Bi-Directional | the capability of a computer system to correctly display bi-directional text. |
BIDS | Business Intelligence Development Studio | IDE from Microsoft used for developing data analysis and Business Intelligence solutions utilizing the Microsoft SQL Server Analysis Services, Reporting Services and Integration Services |
Bin | binary | Binary data, composed of something other than human-readable text. Binary code, the digital representation of text and data |
Binhex | BINary HEXadecimal | A method for converting non-text files (non-ASCII) into ASCII. This is needed because Internet e-mail can only handle ASCII. |
BIOD | block input/output daemon | In the Network File System (NFS), a daemon that performs parallel read/write requests on behalf of an NFS client. |
BIOS | Basic Input/Output System | A fundamental element of PCs and other computers. It is a kind of built-in software that determines what a computer can do without accessing programs from a disk. |
BIP | Bit Interleaved Parity | Method used at PHY layer to monitor error performance of link. Check bit or word is sent in link overhead covering previous block or frame. Bit errors in payload will be detected and may be reported as maintenance information. |
BIPS | Bank Internet Payment System | The BIPS specification includes a protocol for sending payment instructions to banks safely over the Internet and a payment server architecture for processing those payment instructions |
BIRT | Business Intelligence and Reporting Tools | Open source, Eclipse-based reporting system that integrates with your application to produce compelling reports for both web and PDF. |
BIST | built-in self test | a feature included in newer integrated circuits and other electronic equipment |
BISUP | Broadband ISDN User's Part | SS7 protocol that defines signaling messages to control connections and services. |
Bisync or BSC | Binary SYNChronous | A synchronous communications protocol that transmits binary-coded data between two devices by using a set of control characters and control character sequences. |
Bit | Binary DigIT | A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. Bandwidthis usually measured in bits-per-second. |
BIT7 | Bit Seven | A TR008 DS1 line code that performs zero code suppression by placing a one in bit 7 of an all-zeros byte. |
BITNET | Because It's Time Networking | Low-cost, low-speed academic network consisting primarily of IBM mainframes and 9600-bps leased lines. BITNET is now part of CREN. |
BITS | ||
BITW | Bump-In-The-Wire | Configuration where IPsec is implemented through the use of an outboard crypto processor. |
BIW | Business Information Warehouse | A component of SAP's R/3 system. |
BL | BLade Server | An HP brandname for ProLiant BladeServers, which are designed forthe performance, management, density and total cost of ownership (TCO) savings requirements of data centers. |
BLAST | Basic Local Alignment Search Tool | consists of a set of algorithms. BLAST is used to compare biological sequences like protein sequences or nucleotides. With BLAST a comparison of individual sequence can be done against a database of sequences and information obtained in case there is matching of sequences. |
BLISS | Broadband Local Integrated Services Solution | Allows service providers to offer a bundle of packet-based services including local and long distance voice services and high-speed data |
B-LLI | Broadband Low Layer Information | This is a Q.2931 information element that identifies a layer 2 and a layer 3 protocol used by the application. |
BLOB | binary large object | A generic term used to describe the handling and storage of long strings of data by database management systems. A BLOB is a category of data, characterized by large size (including media formats such as audio and video), which can place extreme demands on storage systems and network bandwidth. |
Blog / BloggerBLOG | weB LOGBetter Listings on Google | A blog is basically a journal that is available on the web. The activity of updating a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog.Better Listings on Google |
BLS | Basic Link Service | a Fibre Channel request and response protocol used by all devices. |
BMRT | Blue Moon Rendering Tools | RenderMan-compliant photorealistic rendering systems. It was distributed as freeware |
BMT | Biel Mean Time | a synonym for Internet Time. BMT is followed by a @and 3 numbers ranging from 001 to 999. The Swatch organization devised an idea to divide the 24 hour day into 1000 "beats", often called Swatchbeats, each being 26.4 seconds in length. |
BNC | Bayone-Neill-Concelman / British Naval Connector | A connector type for 10Base2 or Thin-Net networks. Shaped like the letter T, it connects coaxial cables. The “T” has two male connectors and one female connector. |
BNF | Backus-Naur Form | formal meta-syntax for describing context-free syntaxes. In speech recognition, a special adaptation of grammar representation specified by Speech Recognition Control Language (SRCL) |
BNI | Broadband Network Interface | Broadband Network Interface |
BNOS | Brocade Network OS | Brocade OS that can converge fbre channel and IP onto a Linux core |
BO / BOBJ | Business Objects | a French enterprise software company, specializing in BI. Since 2007 is part of SAP AG. |
BOA | Basic Object Adapter | Software that provides CORBA-compliant services for object implementations. |
BOB | ||
BOC | Bell operating company | Any of the 22 original companies (or their successors) that were created from the breakup of AT&T in 1983. They were reorganized into seven Bell regional holding companies (RHCs). |
BOCU-1 | Binary Ordered Compression for Unicode | A Unicode compression scheme that is MIME-compatible (directly usable for e-mail) and preserves binary order, which is useful for databases and sorted lists. |
BoD | Bandwidth on Demand | BoD value-added service enables you to request additional bandwidth between any two locations during heavy demand period |
BOD | Business Object Document | A representation of a standard business process that flows within an organization or between organizations. BODs are defined by the Open Applications Group using XML. |
BOL | Books Online | A bookstore on the Internet created as a joint venture of German publisher Bertelsmann and French publisher Havas. It is designed to be pan-European with a Web site available in various local languages. http://www.bol.com |
BOM | ||
BONDING | Bandwidth on Demand Inter-Operability Group | An industry working group that develops common control and synchronization standards needed to manage high-speed data as it travels through the PSTN. These standards are for DS0 inverse multiplexing and switched services. |
boot | bootstrap | To start a computer and load the operating system to prepare the computer to execute an application. |
BOOTP | Bootstrap Protocol | A protocol - defined in Internet Engineering Task Force Request for Comment 951 - that enables a diskless client machine connected to an IP network to discover its own IP address and the address of a server running the protocol. |
BOPS | Billions of Processes Per Second | Processing speed |
bot / botnet | robot (network) | generally used to refer to an automated program used to
process data with minimal human intervention. Most often referred to as
certain types of search engines that seek out information from pages on
the Internet. |
BOT | ||
BPA | ||
BPC | Business Planning and Consolidation | SAP NetWeaver capabilities |
BPDM | Business Process Definition Metamodel | the first standard metamodel to facilitate development of service-oriented architectures within and among enterprises by unifying internal business or department processes (orchestration) with interactions between businesses or departments (choreography). |
BPDU | Bridge Protocol Data Unit | parts of the STP that help describe and identify attributes of a switch port. |
BPEL | Business Process Execution Language | An XML-based language for the formal specification of business processes and business interaction protocols. |
BPEL4WS | Business Process Execution Language for Web Services | A set of specifications released in 2002 by IBM and Microsoft, combining previously separate efforts of the two companies. BPEL4WS is designed to enable Web services to support workflow and business process execution. |
bpi | bits per inch | The density, measured in number of bits per inch, at which information can be stored on magnetic tape. |
BPL | broadband over power lines | This is a technology that has never emerged successfully from many attempts since the early '80s. It is a direct competitor with both DSL and cable connectivity and attempts the same capability over electrical transmission lines. |
BPM | business process management | BPM activities seek to make business processes more effective, more efficient, and more capable of adapting to an ever-changing environment. |
BPON | Broadband Passive Optical Network | BPON standards were set by the ITU-T as G.983.3 for a local loop technology running the ATM protocol over single mode fiber. |
BPOS | Business Productivity Online Standard Suite | Microsoft Cloud-based services |
BPP | ||
BPPM | BMC ProactiveNet Performance Management | BMC's APM solution includes both real and synthetic transaction capabilities, including a passive end user experience agent deployed as a sofware process or within a VM as a virtual appliance. |
bps | Bits Per Second |
Bits per second is the standard way of
measuring how fast data moves across a network or phone system. For
example, a 56K modem can hypothetically transfer data at 56,700 bits
per second.
|
BPV | BiPolar Violation | the occurrence of two successive pulses of the same polarity in a bipolar signal. In T1 it is detected as an error. |
BRA | Basic Rate Access | The name used in Canada and Europe for Basic Rate Interface (see BRI). |
BRAN | Broadband Radio Access Networks | An ETSI project, it provides telecommunications services the middle ground between mobile systems and the wired access world |
BRAS | Broadband Remote Access Server | the aggregation point for the subscriber traffic. |
BRE | Business rule engines | used to automate controls, especially when business process management is implemented to standardize and automate critical regulated processes. |
BREW | Binary Runtime Environment for Wireless |
mobile channel technologies |
BRF | Benchmark Report Format | In computer graphics, a standard format for reporting benchmark results. This format provides the purchaser with a consistent data-tracking system for comparing hardware platforms. |
BRI | Basic Rate Interface | An Integrated Services Digital Network (ISDN) channel configuration. BRI - known as Basic Rate Access (BRA) in Canada and Europe - consists of two 64 kilobit per second (Kbps) data or voice channels, which are designated as B (bearer) channels, and one 16-Kbps signaling or packet data channel, designated as the D (delta) channel. BRI is, therefore, often referred to as 2B+D. |
BROUTER | Bridge-Router | This was an early technology, which took advantage of the (relative) speed of a bridge, but also provided the capabilities of a router. The brouter was characterized by the term, "bridge when possible, route when necessary." |
BRR | Business Readiness Rating | a proposed rating system for use by open source software community. |
BRZ | Bipolar Return to Zero | RZ is a bipolar signal in which each pulse returns to zero amplitude before its time period ends. This prevents the buildup of DC current on the signal line. |
BS 7799 | British Standard 7799 | A comprehensive standard from the British Standards Institute (BSI). Formally titled the "Code of Practice for Information Security Management," BS 7799 was significantly revised in 2000 and evolved into International Organization for Standardization (ISO) standard 17799 |
BSA | Business Software Alliance | A software industry coalition whose stated missions include industry education and copyright enforcement. |
BSC | ||
BSD | Berkeley Software Distribution | the UNIX operating system derivative developed and distributed by the Computer Systems Research Group of the University of California, Berkeley, from 1977 to 1995 |
BSDI | Berkeley Software Design, Inc. | a commercial supplier of Internet and networking software based on the BSD (Berkeley) version of UNIX. |
BSE | Basic Service Elements | In Open Network Architecture, BSEs are functions of the switched network. A BSE normally consists of an access link element, a features/functions element, or a transport and usage element that connects Enhanced Service Providers to their customers. |
BSM | Business Service Management | a category of IT operations management software products that dynamically links the availability and performance events from underlying IT infrastructure and application components to the business-oriented IT services that enable business processes. |
BSNL | Bharat Sanchar Nigam Limited | a state-owned telecommunications company headquartered in New Delhi, India. BSNL is one of the largest Indian cellular service providers and the largest land line telephone provider in India. |
BSoD | Blue Screen of Death | Terminal error screen displayed by Microsoft Windows, not normally recoverable except by a reboot. Also known as a Stop Screen. A blue screen will display a STOP error code, which may give some indication as to the cause. |
BSP | board support package | Part of a software package that is processor or platform dependent. Typically, sample source code for the BSP is provided by the package developer. |
BSS | ||
BSSID | basic service set identifier | uniquely identifies each BSS, the SSID used in multiple, possibly overlapping. |
BST | binary search tree | a type of binary tree where the nodes are arranged in order: for each node, all elements in its left subtree are less-or-equal to the node (<=), and all the elements in its right subtree are greater than the node (>). |
BT | ||
BTAG | Beginning Tag | An ATM term. A one octet field of the CPCS_PDU used in conjunction with the etag octet to form an association between the beginning of message and end of message. |
BTAM | Basic Telecommunications Access Method | a low-level programming interface specified by IBM for use on the IBM System/360 for sending and receiving data through telecommunication lines |
BTO | Business technology optimization | Business technology optimization |
BTM | ||
BTS | Bits Per Second | In data communications, bits per second (abbreviated bps) is a common measure of data speed for computer modems and transmission carriers. |
BTW | By The Way | Computer jargon |
BTX | Balanced Technology eXtended | ntel has collaborated with the Desktop Computing industry to create an evolutionary step in the desktop computer form factor. BTX integrates cost-effective engineering and design strategies for power dissipation, structural integrity, acoustic performance, and motherboard design into a scalable form factor. |
BUS | Broadcast and Unknown Server | This server handles data sent by an LE Client to the broadcast MAC address ('FFFFFFFFFFFF'), all multicast traffic, and initial unicast frames which are sent by a LAN Emulation Client. |
BVD | Basic Virtual Disk | a VD configured using only non-hybrid RAID levels like RAID-0, RAID5 or RAID5E. Its elements are physical disks. |
BW | bandwidth | |
BYOD | bring your own device | a type of VoIP subscription. Subscribers who have their own VoIP device (a SIP-capable device) when signing up for a VoIP service will usually be able to take advantage of a cheaper subscription plan |
back door | A usually hidden or secret means for an external user to break into your host, network, application, or data. See also virus | |
back end | the part of a computer system not directly interacting with the user. | |
backbone | Backbone network is the main communication path in a WAN; the set of cables or connections that carries most of the traffic | |
backhaul | The terrestrial link between an earth station and a switching or data center. | |
bandwidth shaping | The process of manipulating, managing or controlling (shaping) portions of a network connection to the outside world and determining an allowed bandwidth consumption based on types of activities. | |
bank | ||
Baud Rate | The speed at which a modem sends and receives data, e.g., 2400 bps, 9600 bps. One baud is roughly equivalent to one bit per second. | |
benchmark / benchmarking | ||
best-effort | Describes a network system that does not use a sophisticated acknowledgment system to guarantee reliable delivery of information. | |
best practice | A group of tasks that optimizes the efficiency or effectiveness of the business discipline or process to which it contributes. Best practices are generally adaptable and replicable across similar organizations or enterprises. | |
beta | Software that's still in the testing stage not quite ready for wide release. During a beta test users report bugs back to the developers. | |
bid | ||
Big Blue | A slang name for IBM. Blue is IBM's corporate color. | |
Biometric Authentication | use biometric traits to verify users' claimed identities when accessing devices, networks, networked applications or Web applications | |
black box | A generic term used to identify functional equipment segments, as opposed to circuitry, that make up each segment of a telecommunications system. | |
blade server | A server architecture that houses multiple server modules ("blades") in a single chassis. It is widely used in datacenters to save space and improve system management. | |
blawg | Slang term used to describe an online blog that is written by lawyers, or one that is focused on providing legal-oriented content. | |
bogie | also spelled bogey, refers to a false blip on a radar display. The term is also used to describe radar echoes that occur for unknown reasons, especially in the military, where such a signal might indicate hostile aircraft. | |
booking.com | Booking.com is the world's leading online hotel reservations agency by room nights sold, attracting over 30 million unique visitors each month via the Internet from both leisure and business markets worldwide. Priceline is the parent company. http://www.booking.com/ | |
Boolean | A term that originated in the in the realm of mathematics, and that is now commonly known for its application to search engine logic. A Boolean search allows for the inclusion or exclusion of documents containing certain keywords | |
Bottleneck | A point at which the performance or capacity of an entire system or network can be significantly influenced. Formally, a bottleneck lies on a network or system’s critical path and provides the lowest throughput. | |
bounce | The return of a piece of mail because of an error in its delivery. | |
Bricks and clicks | business that existed pre-Internet that now uses e-commerce technology to sell on the Internet |
|
bridge | Device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the data link layer (Layer 2) of the OSI reference model. | |
broadband | Broadband is another word for high-speed Internet. Because it transfers information quickly, broadband is ideal for downloading music and watching streaming videos. | |
broadcast | Data packet that are sent to all nodes on a network. Broadcasts are identified by a broadcast address. | |
buffer | A storage area used for handling data in transit. Buffers are used in internetworking to compensate for differences in processing speed between network devices. Bursts of data can be stored in buffers until they can be handled by slower processing devices. Sometimes referred to as a packet buffer. | |
bug | An error in a piece of software that stops it from working the way that it should do. | |
burn | Create a CD or DVD. | |
burst | Temporary increased network loading due to a data surge or alarm avalanche | |
bus | ||
business technology | Pervasive technology use that boosts business results. | |
bypass mode | Operating mode on FDDI and token ring networks where an interface has de-inserted from the ring. |
C
C for Cache
abbreviation / acronyms | Term | Definition |
---|---|---|
C-GREX | Chaos Game Representation Explorer | a handy Bioinformatics tool for exploring the sequence visualization and pattern analysis of biological sequences including RNA, DNA and amino acid sequences. |
C++ / CPP | C Plus Plus | Object-oriented programming language based on C. Also, filename extension. |
C2A | Click-to-Action | A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. |
C4S | command, control, communications, and computer systems | |
C64/128 | Commodore 64/128 | The C64 computer to this day holds the record for being the most successful model of computer ever made with even the lowest estimates being in the tens of millions. Its big brother, the C128, was not quite as popular but still sold several million units. |
C&SI | consulting and system integration | Consulting & SI job or industry |
CA | ||
CaaS | Communications as a Service | The utilization of enterprise-class communications applications and technology (such as IP telephony, contact center services and unified communications) is offered as a service. |
CAC | ||
CAD/ CAM | Computer-Aided Design / Manufacturing |
Also known by engineers and architects
as the best invention of all time. Today, CAD software is used for
nearly all three-dimensional designing. Designers can turn an object
into an electronic representation more quickly and accurately than by
diagraming it with a pencil and paper.
|
CAI | Common Air Interface | A standard that defines technical parameters for control and information signals passed between a radio transmitter and receiver, so that communication may take place between equipment manufactured by different companies. |
CAL | Client Access License | A Microsoft software license program. The cost of clients accessing specially licensed servers. There are typically two methods of licensing access to a server or a separately-priced service. These were previously known as "Per- server or per-seat. |
CALEA | Communications Assistance for Law Enforcement Act |
This is a U.S. legal framework enabling telephone call interception in certain circumstances. Please refer to http://www.fcc.gov/calea/ for further details.
|
CAM | ||
CAMA | centralized automatic message accounting | An automatic message accounting system that serves more than one switch from a central location. |
CAMEL | Customized Application for Mobile networks Enhanced Logic | a feature of GSM that allows users to roam between networks. CAMEL is a standard that is now starting to be deployed. |
CAN | ||
CAN-SPAM | Controlling the Assault of Non-Solicited Pornography and Marketing |
a law passed by the U.S. Congress in 2003 (15 U.S.C. 7701) providing penalties for sending deceptive mass e-mails. The act required the Federal Trade Commission to investigate whether or not to establish a national Do Not E-mail registry |
CAP | carrierless amplitude phase modulation | A multilevel, multiphase encoding method for transmitting data over twisted pair lines. It is a superset of the legacy protocol used by analog modems. |
CAPA | CA Productivity Accelerator | a set of interactive features and functions to help ease training, navigation, use and process adoption of the product once it is live and in use in the field. |
CAPE | concurrent art-to-product environment | A design approach that brings together a variety of synergistic applications, including visualization, rapid prototyping, analysis, materials selection, machining and cost estimation. |
CAPI | ||
caps | capital letters | capital letters |
CAPTCHA | Completely Automated Public Turing Test to tell Computers and Humans Apart | a challenge-response system test designed to differentiate humans from automated programs. http://www.captcha.net/ |
CAR | committed access rate | A metric used in network quality-of-service agreements to classify and limit customer traffic and manage excess traffic according to the network policy. |
CARE | Customer Account Record Exchange | National guidelines for the formats and language used in mechanized exchanges of Equal Access-related information between Interexchange Carriers and telephone companies. |
CAROT | Centralized Automatic Reporting on Trunks | A mechanized system for testing of trunks to ensure that trunks are accessible to traffic, function properly during call setup and termination, and provide a proper transmission path during a call. |
CARP | Common Address Redundancy Protocol | Allows multiple hosts on the same local network to share a set of IP addresses among them |
CART | command and response token | An 8-byte token that is added to write-to-operator (WTO) commands; it enables the response WTO to be associated with the command that invoked it. |
CAS | ||
CASE | computer-aided software engineering | An umbrella term for a collection of application development tools designed to increase programmer productivity. |
CAT | ||
CAT n | Category n |
As in Category 5 (Cat 5), 5e
(enhanced), 6 or 6e copper cabling typically used in
buildings to connect PCs and telephony handsets to hubs or switches. The
category indicates a specific gauge of wiring.
|
CATI | computer-aided telephone interviewing | Technology used facilitate information gathering via phone interviews (for example, for survey purposes). |
CATIA | Computer Aided Three-dimensional Interactive Application | a multi-platform CAD/CAM/CAE commercial software suite developed by the French company Dassault Systemes and marketed worldwide by IBM |
CATP | Caffeine Access Transport Protocol | Common method of moving caffeine across Wide Area Networks such as the Internet . CATP was first used at the Binary Cafe in Cybertown and quickly spread world-wide. |
CATS | Calling Card & Third Number Settlement | An telephone company system for ICS (intercompany settlements) processed through CMDS (Centralized Message Distribution System). |
CATV | community antenna television (or Cable TV system) | Commonly known as "cable TV." Television signals are received at a selected site and retransmitted to subscribers via a cable network. Additional channels, not normally available in that area, can also be transmitted. |
CAV | Constant Angular Velocity | A method of reading (or writing) data from (or to) a spinning disk. As data is read from the disk, the drive motor always spins at the same speed. |
cB | C Beautifier | A tool for tidying the syntax of source code. |
CBC | cipher block chaining | A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted. |
CBL | Composite Blocking List | Takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics which are specific to open proxies of various sorts which have been abused to send spam, worms/viruses that do their own mail transmission |
CBN | common bonding network | The set of metallic components that are intentionally or incidentally interconnected to provide the principal means for effecting bonding and grounding inside a telecommunications building. |
CBQ | Class-Based Queuing | A public domain QoS methodology for classifying packets and queuing them according to criteria defined by an administrator to provide differential forwarding behavior for each traffic class |
CBP | Certifed Biometrics Professional |
IEEE program focuses on the relevant knowledge and skills needed to apply biometrics to real-world challenges and applications. |
cbr files | Comic Book Archive | CBR files rarred file archives with their extension changed from .rar to .cbr |
CBR | ||
CBT | Computer Based Training | A form of education in which the student learns by executing special training programs on a computer. Unlike Web-based training programs, CBT does not require an Internet connection. |
CBWFQ | Class-Based Weighted Fair Queueing | Extends the standard WFQ functionality to provide support for user-defined traffic classes. For CBWFQ, you define traffic classes based on match criteria including protocols, ACLs, and input interfaces |
cc | carbon copy | An option in most e-mail programs, it allows you to send duplicate copies of an e-mail message. When you type a recipient's e-mail address in the cc field, it is viewable to everyone who receives the e-mail message . |
CC | closed captioning | A service that transmits text captions for a television program and can be displayed on any modern television with a display size measuring greater than 13 inches (33 cm) diagonally. |
CCA | Citrix Certified Administrator | Entry to mid level certification for IT professionals who want to “demonstrate product expertise on Citrix platform products |
CCAs | composite content applications | case management and front-end access for field personnel to complex back-end applications |
CCC | Clear Channel Capability | A characteristic of a transmission path in which the bit position allocated for customer data may represent any combination of zeros and ones. . Also refer to Clear Channel |
CCD | Charge Coupled Device | a solid-state chip containing a series of tiny, light-sensitive photosites and was originally developed by Honeywell . The heart of all electronic and digital cameras. |
CCD+ | Cash Concentration and Disbursement plus addenda | One of the primary message formats necessary for enterprise-initiated payments to traverse the U.S. national banks' clearinghouse system. The format is limited to a single addendum record (one invoice, one payment), and many banks can process it. |
CCF | call control function | The network intelligence that provides call/connection processing and control. |
CCH | connections per circuit hour | |
CCHIT | Certification Commission for Health Information Technology | A voluntary, private sector organization launched in 2004 to certify health information technology (HIT) products such as electronic health records and the networks over which they interoperate. www.cchit.org |
CCI | controlled cryptographic item | Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements. |
CCIE | Cisco Certified Internetwork Expert | Cisco Certified Internetwork Expert. |
CCIR | Comite Consultatif International des Radio Communications | Abbreviation of the French name for the International Radio Communications Consultative Committee, now part of the ITU. |
CCIS | common-channel interoffice signaling | In multichannel switched networks, a method of transmitting all signaling information for a group of trunks by encoding it and transmitting it over a separate channel using time-division digital techniques. |
CCITT | International Telegraph and Telephone Consultative Committee | French acronym for the international standards organization. Part of the United National ITU. |
CCL | Communications Control Language | a file that dialers and browsers use to control the modem connection. These files should not be changed except by the supplied editor. |
CCNA | Cisco Certified Network Associate | Cisco Certified Network Associate |
ccNSO | Country Code Names Supporting Organization | the policy-development body for a narrow range of global issues regarding ccTLD within the ICANN structure. ccnso.icann.org |
CCOW | Clinical Context Object Workgroup | A group that defines standards for collaboration among applications on clinical workstations. Originally an independent consortium, CCOW is now technical committee of the HL7 standards organization. |
CCP | Certified Computer Professional | The award for successful completion of a comprehensive examination on computers. Also Certificate in Computer Programming. |
CCPM | Critical Chain Project Management | Lean methodology for doing projects |
CCR | ||
CCS | ||
CCSA | common control switching arrangement | An arrangement in which switching for a private network is provided by one or more common control switching systems. |
CCSE | Checkpoint Certified Security Expert | Checkpoint Certification. Stage 2 after completing the CCSA |
ccTLD | country code Top-Level Domain | an Internet top-level domain generally used or reserved for a country or a dependent territory. |
CCTV | Closed-Circuit Television |
A networked camera used for surveillance, process monitoring and other purposes.
|
CD | Compact Disc | An optical form of storage media, typically used for audio and software programs. |
CD Table | change-data table | In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. |
CDB | capacity database | capacity database |
CDC | call data channel | The logical link between the device performing an electronic surveillance access function and the LEA (law enforcement agency) that primarily carries call-identifying information. |
CDDI | Copper Distributed Data Interface | An American National Standards Institute specification for transmitting FDDI signals over copper media. CDDI runs on both shielded and unshielded twisted-pair cabling. |
CDE | common desktop environment | popular commercial window manager (and much more -- as its name touts, it is more of a desktop environment) that runs under X-Windows. Free work-alike versions are also available. |
CDF | bA way of defining the server-push channels for accessing frequently changing web content. |
|
CDFS | compact disc file system | Controls access to the contents of CD-ROM drives. Based on the ISO 9660 Standard (but extends it to allow long and double-byte filenames). |
CDH | Customer Data Hub | Oracle MDM product |
CDI | ||
CDMA | Code Division Multiple Access |
A digital cellular phone service that
offers up to 20 times more call-handling capacity than conventional
cellular systems by assigning a special electronic code to each signal.
|
CDN | content-delivery network | A network specializing in the delivery of streaming audio and video. |
CDO | care delivery organization | A category of enterprises that use healthcare information systems. CDOs are organizations, such as hospitals and physician practices, whose primary mission is to deliver healthcare-related services. |
CDP | Protection captures every write at the LUN level |
|
CDPD | Cellular Digital Packet Data | A packet data protocol standard for sending wireless data, it was developed for use on cellular phone frequencies. It transmits data in packets on unused cellular channels (in the 800MHz to 900 MHz range). |
CDR | ||
CD-R | Compact Disc—Recordable | a type of CD that can be recorded by the user. CD-Rs have the same capacity and are readable in the same drives as ordinary CDs |
CD-ROM | compact disc read-only memory | A version of the standard CD intended to store general-purpose digital data. CD-ROMs can store a wide variety of data, such as music, video and graphics. |
CD-RW | Compact disc-rewritable | Replacing the CD-ROM in desktop computers is the CD-RW, standing for Compact Disc Rewritable. The CD-RW lets you create backup files or make music compilations by "writing" the files on the disc. |
CDS | Correlated Double Sampling | Technology to clean the image signal during scanning |
CDT | C/C++ Development Tools | Eclipse subproject working towards providing a fully functional C and C++ Integrated Development Environment (IDE) for the Eclipse platform |
CDV | Cell Delay Variation | A QoS parameter that measures the difference between the transfer delay of a single cell transfer delay and the expected transfer delay. |
CE router | Customer edge router | A router that is part of a customer network and that interfaces to a provider edge (PE) router. |
CEA | Consumer Electronics Association | CEA is the industry authority on market research and forecasts; consumer surveys; legislative and regulatory news; engineering standards; training resources. http://www.ce.org |
CEAP | cloud-enabled application platforms | cloud-enabled application platforms |
CEBP | communication-enabled business process | key capability of UC is that it offers a method to integrate communication functions directly with business applications |
CeCILL | CEA CNRS INRIA Logiciel Libre | Free Software license adapted to both International and French legal matters, in the spirit of and retaining compatibility with the GNU General Public License. |
CEF | ||
CEH | Certified Ethical Hacker | Certification in IT security issued by The International Council of Electronic Commerce Consultants (EC-Council) |
CEI | ||
CEIM | Common Enterprise Information Model | the ability to define actions and execute processes right from BI metadata |
CELL/B.E. | Cell Broadband Engine | A breakthrough microprocessor with unique capabilities for applications requiring video, 3D graphics, or high-performance computation for imaging, security, visualization, health care, surveillance, and more. |
cellphone | Cellular Telephone | A mobile, wireless telephone that communicates with a local transmitter using a short-wave analog or digital transmission. |
CELP | code-excited linear prediction | An analog-to-digital voice coding scheme. |
CEM | customer experience management | Aligning executive involvement, operational processes, organizational structure, and technology infrastructure to stimulate, anticipate, and satisfy customer needs. |
CEMF | Cisco Element Management Framework | Collects fault information from various sources.Network elements, such as routers or switches, may report fault conditions as SNMP traps, Syslog messages |
CEP | complex event processing | Sofware infrastructure that can detect patterns of events (and expected events that didn’t occur) by fltering, correlating, contextualizing, and analyzing data captured from disparate live data sources to respond as defned using the platform’s development tools. |
CEPS | Common Electronic Purse Standard | A standard endorsed by Visa and American Express for electronic purse (e-purse) or stored-value applications on smart cards. |
CER | Corporate Error Reporting | Tool that allows IT Administrators to manage error reports and error messages created by the Windows Error Reporting client (WER) in Windows XP and Windows Server 2003 |
CERN | Conseil Europeen pour la Recherche Nucleaire | The original, French name of the European Organization for Nuclear Research, headquartered in Geneva, Switzerland. A nuclear research laboratory where the World Wide Web was invented. |
CERT | Computer Emergency Response Team | A group formed in 1998 by the U.S. Defense Advanced Research Projects Agency |
CES | Character Encoding Scheme Consumer Electronics Show | A CES is character encoding form plus byte serialization. There are seven character encoding schemes in Unicode: UTF-8, UTF-16, UTF-16BE, UTF-16LE, UTF-32, UTF-32BE, and UTF-32LE. CES is a major technology-related trade show held each January in the Las Vegas Convention Center. http://cesweb.org/ |
CESID | caller's emergency service identification | The number used to identify the calling terminal within the context of the emergency service call. |
CEVA | content-enabled vertical application | CEVAs typically help to automate complex processes that previously required workers to sort through paper documents and other forms of content manually. |
CF | Compact Flash | a very small removable mass storage device. First introduced in 1994 by SanDisk Corporation, CF memory Cards weigh a half ounce and are the size of a matchbook. CF memory Card is the world's most popular removable mass storage device. |
CFA | ||
CFB | Ciphertext feedback | a mode of operation for a block cipher. In contrast to the CBC mode, which encrypts a set number of bits of plaintext at a time, it is at times desirable to encrypt and transfer some plaintext values instantly one at a time, for which ciphertext feedback is a method. |
CFM | ||
CfMD | Certified for Microsoft Dynamics | a label for add-on products that ISV have built to expand the functionality of Dynamics |
CFMN | Client For Microsoft Networks | 32-bit, protected-mode network client for Windows 9x that provides the redirector and other software components for Microsoft networking |
CFV | Call For Votes | Initiates the voting period for a Usenet newsgroup. At least one email address is customarily included as a repository for the votes. |
CG | Computer Graphics | graphics created using computers and, more generally, the representation and manipulation of pictorial data by a computer. |
CGA | Colour Graphics Adaptor | A computer standard using digital signals offering a resolution of 320 by 200 pixels, a palette of 16 colors. |
CGI | ||
CGM | Consumer-generated media | any written, audio or video content created by end users, using basic or semiprofessional tools. |
CGMP | Cisco Group Multicast Protocol | A form of IGMP snooping that lets the switch send multicasts only to the ports on a VLAN that are participating in the multicast |
CHAP | Challenge Handshake Authentication Protocol | A security protocol used by a server to grant or deny system access based on a client-supplied password, which is encrypted prior to transmission. |
Charset | character set | A set of characters used in Windows. Charsets refer to the same collections of characters as those defined by Windows code pages. |
chat | conversational hypertext access technology | A form of interactive online typewritten communication that allows participants ("members") to engage in text-message conferencing, via real-time computer networking over designated communications facilities |
CHIPS | Clearing House Interbank Payments System | A clearing system that processes very large payments (valued at an average of $1.4 trillion a day) in more than 27 countries. |
ChR | channel reliability | The percentage of time a channel was available for use in a specified period of scheduled availability |
cHTML | Compact Hypertext Markup Language | A proprietary version of HTML adopted by NTT DoCoMo for i-mode. |
CIA | confidentiality, integrity, and availability | InfoSec dimensions. |
CIC | includes telephony, audioconferencing, UM, rich presence with IM, business process automation. |
|
CICS | Customer Information Control System | A software program designed to OLTP, it was developed by IBM. It is one of the most widely used programs for creating customer transaction systems. |
CIDR | Classless Internet Domain Routing | A protocol that allows for variable-length addresses that allows for more- and less-specific routing information. This replaces the old class A, class B, class C routing scheme. |
CIE | Commission Internationale de l'Eclairage | An organization that has established a number of widely-used color definitions. www.cie.co.at |
CIFS | Common Internet File System | the file sharing protocol that forms the basis of Microsoft Windows networking. Formerly known as SMB (Server Message Block), it is also supported by UNIX and Linux systems using the Samba software package. |
CIK | crypto-ignition key | device or electronic key used to unlock the secure mode of crypto-equipment. |
CIM | Common Information Model | Provides a common definition of management information for systems, networks, applications and services, and allows for vendor extensions |
CINDER | Cyber Insider Threat | program soliciting from outsiders novel techniques to insider-threat detection |
CIO | chief information officer | The top executive in charge of IT in an enterprise. |
CIP | Common Industrial Protocol | an open industrial protocol for industrial automation applications. |
CIPA | Children’s Internet Protection Act | a law passed by Congress in 2000 (47 USC 254) requiring libraries to use blocking programs to prevent access to Internet sites with objectionable content |
CiR | circuit reliability | The percentage of time a circuit was available for use in a specified period of scheduled availability. |
CIR | committed information rate | The average data rate that a carrier commits to support over a given virtual circuit between two end-user sites. The commitment is over a specified period of time, typically one month. |
CIS | ||
CISC | Complex Instruction Set Computer | a computer with many different machine language instructions. The IBM PC, 68000-based Macintosh, Pentium, IBM 370 mainframe, and VAX are CISC machines. |
CISO | chief information security officer | The chief executive responsible for information security in an enterprise. The CISO's responsibilities often bridge the gap between technical security measures and security-related business practices and policies. |
CISSP | Certified Information Systems Security Professional | A certification program administered by the International Information Systems Security Certification Consortium |
CIX | Commercial Internet Exchange | An agreeement among network providers that allows them to do accounting for commercial traffic. It is primarily a concern for network providers. |
CJK / CJKV | Chinese, Japanese, and Korean (Vietnamese) | A reference to Chinese, Japanese, and Korean languages. Sometimes a “V” for Vietnamese is added to the acronym. |
CKD | count key data | In mainframe computing, a data-record format employing self-defining record formats |
CKO | chief knowledge officer | The enterprise position responsible for articulating and championing an enterprise's knowledge management (KM) vision, and for providing enterprise level leadership for implementing and managing the KM program |
C/kT | carrier-to-receiver noise density | In satellite communications, the ratio of the received carrier power to the receiver noise power density. |
CLA | Corporate License Agreement | A licensing agreement option under Novell's "Customer Connections" program. It offers an alternative for midsize organizations that cannot qualify for Novell's Master License Agreement. |
CLASS | Custom Local Area Signaling Services | A generic term describing several local service offerings such as incoming-call identification, call trace, call blocking, automatic return of the most recent incoming call, automatic re-dial, selective call forwarding, etc. |
CLEC | Competitive Local Exchange Carrier | A telephone company that competes with other local phone companies within an exchange, or calling area, to provide local telephone service |
CLI | ||
CLIPS | C Language Integrated Production System | Productive development and delivery expert system tool which provides a complete environment for the construction of rule and/or object based expert systems |
CLLI | Common Language Location Identifier | 11-character code that identifies the wire center from which a call originated. |
CLM | Contract lifecycle management | an integral, back offce technology in many life science segments, including managed-care and payer organizations. |
CLNP | ConnectionLess Network Protocol | The International Organization for Standardization's OSI protocol for providing the OSI Connectionless Network Service (datagram service). |
CLOB | character large object | A data type that contains a sequence of characters (single-byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. |
CLR | ||
CLTP | ConnectionLess Transport Protocol | Provides for end-to-end Transport data addressing (via Transport selector) and error control (via checksum), but cannot guarantee delivery or provide flow control. |
CLUSRCVR | cluster-receiver channel | A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers. |
CLUSSDR | cluster-sender channel | A channel on which a cluster queue manager can send messages to other queue managers in the cluster, and cluster information to the repository queue managers. |
CLUT | Color LookUp Table | The color options in a graphics system, arranged by index number. Typically, the system has a default color map. The index of colors in the color map can be reallocated, however, depending on the application. |
CLV | Constant Linear Velocity | A technology which revolves around (no pun intended) rotating a disk at varying speeds. By changing rotation speed depending on which track is being accessed, the density of bits in each track can be made uniform. |
CMA | Circular Mil Area | A unit of area equal to the area of a circle whose diameter is 1 mil (0.001 inch). Used chiefly in specifying cross-sectional areas of conductors. |
CMC | computer-mediated communication | human communication via computers and includes many different forms of synchronous, asynchronous or real-time interaction that humans have with each other using computers as tools to exchange text, images, audio and video. |
CMDB | configuration management database | CMDB is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. |
CME | Common Malware Enumeration | CME number is a unique, vendor-neutral identifier for a particular threat. The CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community. |
CMIP | Common Management Information Protocol | The International Organization for Standardization's OSI network management protocol. |
CMIS | ||
CMM | Capability Maturity Model | Strategy for improving the software process, irrespective of the actual life-cycle model used |
CMOS | complementary metal-oxide semiconductor | a type of integrated circuit noted for its extremely low power consumption and its vulnerability to damage from static electricity. CMOS devices are used in digital watches, pocket calculators, microprocessors, and computer memories. |
CMOT | CMip Over Tcp | An effort to use the International Organization for Standardization's OSI network management protocol to manage TCP/IP networks. |
CMRR | common-mode rejection ratio | The ratio of the common-mode interference voltage at the input of a circuit, to the corresponding interference voltage at the output. |
CMRS | Commercial Mobile Radio Service | A radio communication service between mobile stations or receivers and land stations, or by mobile stations communicating among themselves, that is provided for profit, and that makes interconnected service available to the public. |
CMS | ||
CMTS | cable modem termination system | a system of devices located in the cable head-end that allows cable television operators to offer high-speed Internet access to home computers. |
CNA | Converged Network Adapter | a technology that supports data networking (TCP/IP) and storage networking (Fibre Channel) traffic on a single I/O adapter. |
CNAM | Caller ID With Name | Caller ID With Name |
CNAME | Canonical name |
|
CNE | Certified Novell Engineer (also Certified Network Engineer) | A certification initiated by Novell to qualify certain individuals that have demonstrated high standards of knowledge in the areas of hardware used in and software configuration of the Novell Network operating system. |
CNGI | China's Next Generation Internet | Chinese: 中国下一代互联网, a five year plan initiated by the Chinese government with the purpose of gaining a significant position in the future development of the Internet through the early adoption of IPv6. |
CNN | Cable News Network composite network node | Cable News Network (CNN) is a U.S. cable news channel founded in 1980 by Ted Turner. http://www.cnn.com/A type 5 node and its subordinate type 4 nodes that support APPN network node protocols and appear to an attached APPN or LEN node as a single network node. |
CNR | ||
CO | central office |
The telephone company's centralized
switching facility, where subscriber loops terminate. The
CO handles a specific geographical area (known as a local
exchange), identified by the first "n" digits of the local elephone
number.
|
CoA | Care Of Address | Temporary IP Address used by a mobile user when roaming onto a foreign IP network. It is used within mobile IP and can either be leased from the HA (Home Agent) or FA (Foreign Agent) |
COAM | customer owned and maintained | User provided and serviced communications equipment and its associated wiring. |
coax | coaxial (cable) | Cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductor. |
COBIT | Control Objectives for Information and related Technologies | a comprehensive approach to good IT practices. In its third revision, it offers a wide range of tools, guidelines, standards and a control framework for the management of information technologies. |
COBOL | Common Business Orientated Language | Many mainframe computer applications were once written in this programming language. |
COCOMO | COnstructive COst MOdel | A technique for estimating the effort and duration of a software project based on its estimated size created by Barry Boehm |
COD | ||
CoDA | Context Delivery Architecture | an architectural style of business software that builds on SOA and event-driven architecture (EDA) interaction and partitioning styles, and that adds formal mechanisms for the software elements to discover and apply their context in real time. |
CODEC | coder/decoder or compressor-decompressor |
A communications device used to convert
analog signals to digital form for transmission over a
digital medium, and back again to the original analog form. A
codec is required at each end of the channel.
|
COE | Component Object modEl | the fundamental class of Microsoft's attempt to defuse the growth of Java platform-independent code. |
COEs | centers of excellence | software management concept |
COIN | Community Of Interest Network | A COIN provides a way of giving members of a shared-interest community access to privileged information. |
COLD | computer output to laserdisc | A microfiche replacement system. COLD systems offer economies as a replacement medium when rapid or frequent access to archived documents is necessary. |
colo | co-location | Putting a web server in a dedicated facility that provides high-speed Internet connection, security, environment, backup power, and technical support. Unlike the dedicated server, the client controls both hardware and software. |
com (.com) | commercial | One of several top-level domains assigned to URLs that are of a commercial nature. Other domain suffixes include .ac, .co, .mil, .gov, .net, .org, and a long list of country codes. |
COM | |
|
COMDEX | Computer Dealers Expo | A hardware and software exposition started in 1978, it has become the place to announce new product launches and to rub elbows with VCs and representatives from high-tech firms all over the world. In America, it takes place twice a year. |
COMPAQ | COMPatibilty And Quality | Used to refer to the fact that their computers were both IBM PC compatible and very reliable. In 2002, Compaq merged with Hewlett-Packard. |
COMPARE | Compliance Progress and Readiness | A scale introduced by Gartner in 1997 to assist business units, enterprises or business partners in measuring their progress toward year 2000 compliance. |
COMSAT | Communications Satellite Corporation | A United States company created by an act of Congress in 1962 to provide communications via satellites. COMSAT leases satellite circuits to many American companies. |
COOL | C++ Object Oriented Language | A Microsoft application development tool initiative and language; a predecessor to C#. |
COOP | Continuity of Operations Plan | outlines steps that an agency will take in the event a disaster interrupts business. Continuity plans require agencies to designate functions as essential or nonessential. |
COPPA | Children's Online Privacy Protection Act | Legislation passed by the U.S. Congress in 1998 prohibiting the use of unfair or deceptive practices to gather personal information about individuals under the age of 13. |
COPS | ||
COR | central outdoor router | the central router in a multi-device WLAN. |
CORBA | Common Object Request Broker Architecture | a standard API for distributed object communication. CORBA was created by the Object Management Group. It is the most widely used distributed object standard for connecting operating system platforms from multiple vendors. HTTP://WWW.OMG.ORG. |
CORE | COMPARE Operational Readiness Evaluation | Gartner's CORE risk assessment and reporting steps are used to define business operational risks, to report risks to management, investors, regulators and customers in a consistent form, and to determine when contingency and recovery strategies are required. |
CORS | Continuously Operating Reference Station | network managed by the U.S. ofce of National Ocean Service (NOAA) to provide GNSS data consisting of carrier phase measurements throughout the United States. |
CoS | class of service |
A classification method for providers
to deliver different levels of QOS. Providers will
typically offer a number of classes for different types of traffic,
such as different COS for voice, video and data.
|
COS | Cloud Optimized Storage | EMC's cloud platform Atmos |
COTS | commercial off-the-shelf | Descriptive term for software that can be purchased from an external supplier, as opposed to that which is developed within the enterprise. |
COW | Copy-On-Write | Part of a snapshot, and keeps track of disk changes since the snapshot was taken. |
CPA | Cost Per Action | for banner ads; the fee charged every time a user completes a desired action, such as filling out a form, downloading software, or viewing a series of pages. |
CPAN | Comprehensive Perl Archive Network | an archive of over 16,000 modules of software written in Perl, as well as documentation for it |
cPanel | control panel | industry standard web hosting control panel, cPanel provides a Graphical User Interface (GUI) for many Linux system administration tasks. |
CPC | ||
CPE | customer premises equipment |
Any telephone apparatus, including
telephone handsets, PBX switching equipment, key and
hybrid telephone systems, and add-on devices, that is
physically located on a customer's property.
|
CPF | Cloud Provisioning Fabric | portability between different clouds |
cpi | characters per inch | The number of characters printed horizontally within an inch across a page. |
CPLD | Complex Programmable Logic Device | A typical CPLD is the equivalent of two to 64 SPLDs. A CPLD typically contains from tens to a few hundred macrocells. |
CPM | corporate performance management | CPM includes the processes used to manage corporate performance, such as strategy formulation, budgeting and forecasting; the methodologies that drive some processes, including the balanced scorecard, or value-based management. |
CPN | calling party number | A set of digits and related indicators (type of number, numbering, plan identification, screening indicator, presentation indicator) that provide numbering information related to the calling party. |
CPNI | Customer Proprietary Network Information | Information which is available to a telephone company by virtue of the telephone company's basic service customer relationship. |
CPOE | Computerized Provider Order Entry | a computer application that allows a physician's orders for diagnostic and treatment services (such as medications, laboratory, and other tests) to be entered electronically instead of being recorded on order sheets or prescription pads. |
CPRM | Content Protection for Removable Media | a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying. |
cps | Characters Per Second | Printing engine speed |
CPS | Continuous Protection Server | Backup exec option allows administrators to continuously capture and back up data changes to allow administrators to restore data to any point in time |
CPU | Call Pick Up
Central Processing Unit Critical Patch Update |
CPU is PABX phone systems term
The CPU controls the computer, runs all the programs
on the computer and processes all of the data and can be thought of as the
'brain' of the computer. CPU is Oracle patch term |
CRACK | Challenge/Response Authentication of Cryptographic Key | a protocol for the secure exchange of keys, used by Nokia primarily. |
CRC | Cyclic Redundancy Check | An error check in which the check key is generated by a cyclic algorithm |
CRL | certificate revocation list | A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a SSL handshake to ensure that the certificates involved have not been revoked. |
CRLF | carriage return, line feed | a pair of ASCII codes, 13 and 10, that tell a terminal or printer to return to the beginning of the line and advance to the next line. |
CRM | Customer Relationship Management |
CRM refers to solutions and strategies
for managing businesses' relationships with customers. With the
advent of Web retailing, companies have found it hard to develop
relationships with customers since the e-commerce interface is so
impersonal.
|
CRMB | Customer Reference Material Database | IBM term |
cROI | companywide ROI | The incremental cash flow -- cost savings and revenues -- generated by online retail technology throughout a multichannel company. |
CRR | Continuous Remote Replication | Continuous Remote Replication |
CRT | Cathode Ray Tube | CRT is the technology used in traditional computer monitors and televisions. The image on a CRT display is created by firing electrons from the back of the tube |
CRUD | Create, Read, Update, Delete | Used to describe access rights for data. |
crypto | Cryptography | The study of decryption and encryption technologies. |
CS | ||
CSA | service agreements |
|
CSC | |
|
CSCF | call session control function |
CSCF is a functional entity within IMS and part of 3GPP UMTS Reference Architecture.
|
CSCW | computer supported co-operative work | any technology system that relies on combinations of hardware and software resources to enable groups of people to collaborate and share technology. |
CSD | Cisco Secure Desktop | allows secure VPN connections from remote PCs and offers functionality to ensure PCs meet administrator approved |
CSE | custom search engine | The search engine that you create and customize using Google Custom Search. |
Csel | Cable Select | This is basically Plug-and-Play ATA. You plug in your ATA/IDE hard drives, set them to CSEL (Cable Select), and they determine whether they are master or slave automatically, saving you from manual configuration. |
CSFs | critical success factors | critical success factors |
CSG | Communications Services Group | On May 1, 2009, TNS completed the acquisition of the CSG from VeriSign, Inc. |
CSMA/CA | Carrier Sense Multiple Access/Collision Avoidance | CSMA/CA is the medium access method used by IEEE 802.11 WLANs. |
CSMA/CD | Carrier Sense Multiple Access with Collision Detection | A protocol in which stations listen to the bus and only transmit when the bus is free. If a collision occurs, the packet is retransmitted after a random time-out. Ethernet uses CSMA/CD. |
CSO | |
|
CSP | ||
CSS | Cascading Style Sheet |
Cascading style sheets are used to
format the layout of Web pages. They can be used to define text styles,
table sizes, and other aspects of Web pages that previously could only
be defined in a page's HTML.
|
CSS-P | cascading style sheet positioning | Use of a cascading style sheet to position Web page elements using pixel locations or locations relative to other elements. |
CST | Consolidated Service Test | Enhances the way IBM tests and recommends maintenance packages for z/OS and OS/390 software, including the major subsystems |
CSU | ||
CSV | ||
CSW | channel status word | An area in storage used to indicate the status of a device and channel involved in an I/O operation. |
CTCp | Client-To-Client-Protocol | a feature of some IRC clients |
CTD | Cell Transfer Delay | A QoS parameter that measures the average time for a cell to be transferred from its source to its destination over a virtual channel (VC) connection. |
CTI | computer-telephony integration |
The intelligent linking of computers
with telephony, enabling coordinated voice and data
transfers to the desktop.
|
CTO | chief technology officer | The enterprise position responsible for managing technology infrastructure and resources, including technology deployment, network and system management, integration testing, and developing technical operations personnel. |
CTP | capable to promise | A system that allows an enterprise to commit orders against available capacity, as well as inventory. These systems are evolving to include multiple sites, as well as the entire distribution network. |
CTR | Click-Through Rate | Web publishers typically generate revenue from advertisers each time a visitor clicks on one of the advertisements |
ctrl | control | This refers to the Control key on your keyboard, it is often used for shortcuts. |
CTS | ||
CTT | China Tietong Telecommunications | a major state-owned basic telecommunications operator in China. Its former name was China Railcom (China Railway Communication Corporation, Limited). http://www.chinatietong.com |
CTX | Commited to Excellence | CTX Technology Corporation (Commited to Excellence) |
CUG | closed user group | In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. |
CUoD | Capacity Upgrade on Demand | An option available on certain IBM systems that allows a customer to activate additional processor capacity when needed. |
CUPS | Common Unix Printing System | Provides a portable printing layer for UNIX-based operating systems. It is developed by Easy Software Products to promote a standard printing solution and is the standard printing system in MacOS X and most Linux distributions www.cups.org |
CVP | Content Vectoring Protocol | A specification developed by Check Point Software, used for content screening and antivirus checking. |
CVS | ||
CVSD | Continuous Variable Slope Delta modulation | A method of digit ally encoding speech using a one- bit sample to encode the difference between two successive signal levels, usually 32,000 times a second. |
CVV2 / CVC / CVC2 | Card Verification Value 2 / Card Verification Code /Card Validation Code 2 | The last part of the code above the signature strip on modern credit and debit cards, which is often required by online shops to verify that the card is genuine. |
CYMK | cyan, magenta, yellow, black | An abbreviation denoting the traditional four-color printing process; the name derives from the four ink colors used. The majority of printed color paper and photographic documents incorporate the CMYK process. |
C | programming language developed at Bell Laboratories in the 1970s, based on the two earlier languages B (1970) and BCPL (1967). | |
C# | pronounced “C sharp”, a programming language developed by Anders Hejlsberg (the developer of Turbo Pascal and Delphi) for Windows programming under Microsoft’s .NET Framework. | |
Cache | Pronounced "Cash". A temporary storage area for frequently accessed information. The cache shortens the time it takes to access this information, relieves the burden from the main memory, and increases the overall speed of applications. | |
carbon neutral | also called carbon neutrality, used to describe the action of organizations, businesses and individuals taking action to remove as much carbon dioxide from the atmosphere as each put in to it. | |
Carnivore | an Internet surveillance system developed for the U.S. FBI so that they could monitor the electronic transmissions of criminal suspects. Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual. The EPIC reported in early 2005 that the FBI had replaced Carnivore with other, unspecified surveillance software from commercial sources. | |
carrier | A network operator may market any number of communication services for voice and data. Carriers offer their services to both end-customers (private or business) and other carriers. In the latter case, the service simply consists of transport capacity for long-distance traffic. | |
Cascade | ||
CE | CE-marking is a European Union regulatory community sign. It symbolizes the compliance of the product with all essential requirements relating to safety, public health, consumer protection. http://www.eurunion.org/ | |
Centrex | A service provided from a reserved section of the main public exchange that has been reprogrammed to act as if it were the exclusive PBX of an individual user, in other words a 'virtual' PBX. | |
certificate | Digital representation of user or device attributes, including a public key, that is signed with an authoritative private key. | |
Channel Bank | Channel terminal equipment used for combining (multiplexing) channels on a frequency-division or time-division basis. | |
chip | a miniaturized electronic circuit that has been manufactured in the surface of a thin substrate of semiconductor material | |
Chrome | a powerful Google browser that loads Web pages quickly and accurately. www.google.com/chrome | |
cipher | A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key. | |
clear channel | A channel that uses out-of-band signaling (as opposed to in-band signaling), so the channel's entire bit rate is available. | |
cloud computing | Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). | |
cluster | process of connecting multiple servers together in order to provide greater overall system availability, performance, and capacity for your server platforms. | |
compiler | A software-development tool that translates high-level language programs into the machine-language instructions that a particular processor can understand and execute. | |
Computer-Brain Interface | interpret distinct brain patterns, shifts and signals as commands that can be used to guide a computer or other device. | |
concurrent | A way to measure the usage of software licenses. Rather than limiting usage based on the number of people who are entitled to use the software, a concurrent-use license places a limit on the number of people who may do so simultaneously. | |
Convergence | The consolidation of all communications - voice, data and video - onto a single network infrastructure. | |
Cookie | a piece of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. | |
Craigslist | Craigslist is a centralized network of online communities featuring free online classified advertisements, with sections devoted to jobs, housing, personals, for sale, services, community, gigs, résumés, and discussion forums. http://www.craigslist.org/ | |
Cut-through | Technique for examining incoming packets where Ethernet switch looks only at first few bytes of packet before forwarding or filtering it. Faster than looking at whole packet but allows some bad packets to be forwarded. |
D
D for DNS
abbreviation / acronyms | Term | Definition |
---|---|---|
d-channel / D channel | ||
d-commerce | digital commerce | form of e-commerce by companies that sell news, documents, subscriptions, or any other content that can be delivered digitally over the Web. Under the ultimate "pay as you go" model, a d-commerce company acts as an electronic middleman: Users establish an account with a d-commerce company to purchase content from a variety publishers |
D&I | Drop And Insert | Refers to the cross connecting of Time-Division Multiplexing (TDM) circuits. It allows you to take 64Kb DS0 channels from one T1 and digitally cross connect them to 64Kb DS0 channels on another T1 |
D2D | disk-to-disk | backup technologies |
D2D2T | disk-to-disk-to-tape | backup technologies |
DA | Destination Address | Information sent in forward direction indicating address of called station or customer. |
DAA | Distributed Application Architecture | under design by Hewlett-Packard and Sun. A distributed object management environment that will allow applications to be developed independent of operating system, network or windowing system. |
DaaS | desktops-as-a-service | virtual desktop hosting |
DAB | Digital Audio Broadcast | Digital radio broadcast, providing better quality and a greater number of channels than traditional (analogue) radio. |
DAC | digital-to-analog converter | The digital-to-analog converter is for converting a digital signal into an output analog voltage. |
DAC / DACL | Discretionary Access Control List | Discretionary Access Control consists of something the user can manage, such as a document password.A DACL consists of a list of security identifiers (which identify users) and specific permissions for each |
DACS | Digital Access and Cross Connect System | A time-slot switch that allows T1 or E1 lines to be remapped electronically at the DS-0 (64 Kbps) level. Also called DCS or DXS. |
DAE | Disk Array Enclosure | The DAE is a JBOD (Just a Bunch Of Disk) enclosure without a storage processor (SP). The DAE supports up to 10 Fibre Channel drives per enclosure and is connected by dual Fibre Channel loops into the DPE. |
Daemon | Disk And Execution MONitor | Disk And Execution MONitor software |
DAFS | Direct Attached File System | an advanced methodology of a particular network data storage method. |
DAL | Dedicated Advertiser Location | A type of iTV ad in development, online advertisers are proposing Simple DALs and Complex DALs. A Simple DAL refers to the data that users reach on the screen, once they leave a video (TV) stream. Viewers will be able to leave a broadcast stream, beyond the duration of an ad, but will then get rapidly returned to it after navigating past some qualifier screens. |
DAM | ||
DAMA | demand assigned multiple access | Allocation of communication satellite time to earth stations as the need arises. |
DAML | DARPA Agent Markup Language | A language currently in development for presenting information on the WWW that will allow information objects to be tagged in a way that allows software applications, computer agents, and virtual assistants. |
DAO | Disk-At-Once | This is a single-session method of writing data to a CD-R/RW disc that creates a disc in a format suitable for commercial duplication. |
DAP | Directory Access Protocol | A derivative of the X.500 DAP standard, postulated by the ISO many years ago. DAP and X.500 remained unused for many years because of the complexity of the DAP access protocol. |
DAR | ||
DARPA | Defense Advanced Research Project Agency | the progenitor of the Internet. DARPA is where it all began. http://www.darpa.mil/ |
DAS | direct-attached storage | RAID storage that is internal and host-attached (both the RAID controller and software technologies and the hard disk drives are housed within the server) |
DAS | distributed antenna system | a way to efficiently distribute wireless connections inside a large building where steel columns and layers of concrete can interfere with wireless signals. A DAS can be used to get rid of "dead zones" by routing radio frequency (RF) signals through fiber or copper cabling from a single base station to multiple antennas located throughout the building. |
DASH | Desktop and mobile Architecture for System Hardware | Suite of specifications that takes full advantage of the Web Services for Management (WS-Management) specificationdelivering standards-based Web services management for desktop and mobile client systems |
DAST | Dynamic Application Security Testing | technologies designed to detect conditions indicative of a security vulnerability in an application in its running state |
DAT | digital audio tape | A magnetic tape that stores audio data in digital form. |
DAVID | Digital Audio Video Interactive Decoder | Digital Audio Video Interactive Decoder |
db | Decibel | A unit of power (sound, optical or electrical) increase or decrease that is proportional to the exponential increase or decrease of power. |
DB | Database | A collection of data organized in a structured manner so that information can be readily retrieved. |
DB2 | Database 2 | IBM's RDBMS offering, originally built for Multiple Virtual Storage (MVS) systems. It uses SQL as its data manipulation and definition language. IBM has released versions of DB2 for several other operating systems, such as Windows and Unix. |
DB9 | D sub-miniature 9 | Also called Dsub9, a 9 pin connector shaped like the leter ‘D’. They are used to connect serial devices together with a serial cable. |
DBA | database administrator | The person responsible for managing data, namely data set placement, database performance, and data recovery and integrity at a physical level. Also known as a "data administrator." |
DBCS | Double-Byte Character Set | One of a number of character sets defined for representing Chinese, Japanese, or Korean text. These character sets are often encoded in such a way as to allow double-byte character encodings to be mixed with single-byte character encodings. |
dBm | decibels milliwatt | used to measure signal strength on telephone lines |
DBMS | Database Management System |
In short, a DBMS is a database
program. Technically speaking, it is a software system that uses a
standard method of cataloging, retrieving, and running queries on data.
The DBMS manages incoming data, organizes it, and provides ways for
the data to be modified or extracted by users or other programs.
|
DBS | direct broadcast satellite | A wireless technology for broadcasting by transmitting a compressed high-speed signal via satellite. |
DCAP | Data Link Switching Client Access Protocol | Data Link Switching Client Access Protocol |
DCB | Data Center Bridging | a set of IEEE industry standards that delivers end-to-end congestion notification and quality of service throughout the network which allows customers to configure traffic classes and priorities to deliver a lossless Ethernet fabric such as Open FCoE. |
DCBU | D-channel backup | An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. |
DCC | ||
DCCP | Datagram Congestion Control Protocol | a minimal general purpose transport-layer protocol that minimizes the overhead of packet header size or end-node processing as much as possible. |
DCE | terminate a data transmission connection. Normally it refers to a modem. |
|
DCO | Device Configuration Overlay | Allows system vendors to purchase HDDs from different manufacturers with potentially different sizes, and then configure all HDDs to have the same number of sectors |
DCOM | Distributed Component Object Model | A version of Microsoft's COM that enables application components to be distributed over several computers through the use of a remote procedure call (RPC). |
DCT | Digital Cordless Telephone | A cordless telephone that uses digital transmission technology to provide more security and better sound quality than a traditional analog cordless telephone. |
DDAP | Digital Distribution of Advertising for Publications | User-driven organization working towards enabling the universal exchange of digital ads throughopen process integration and the use of accredited standards. See http://www.ddap.org |
DDBMS | Distributed database management system | A database management system (DBMS) that enables end users or application programmers to view a collection of physically separate databases as a logical single-system image. The concept that is most fundamental to the DDBMS is location transparency, meaning the user should not be conscious of the actual location of data. |
DDCMP | Digital Data Communications Message Protocol | A byte-oriented, link layer protocol that supports half- or full-duplex modes and either point-to-point or multipoint lines in a Digital Network Architecture network. |
DDD | Data Display Debugger | a popular graphical user interface for command-line debuggers such as GDB, DBX, JDB, WDB, XDB, the Perl debugger, and the Python debugger.DDD is licensed under the GNU GPL and is open source. |
DDE | Dynamic Data Exchange | A method of exchanging data between applications on MacOS, Windows, and OS/2 operating systems. |
DDI | ||
DDL | Data Definition Language | A language for describing data and its relationships in a database. |
DDN | Digital Data Network | A network service established in China in 1994, connecting Beijing, Tianjin, Shanghai and other provincial capitals. Each post and telecommunications administration in China has a department regulating DDN service in its region. |
DDNS | Dynamic Domain Name System | A technology that automatically updates the logical names of dynamically assigned IP addresses in the DNS server of an IP network. Specifications for a standard approach to DDNS were defined in Request for Comment 2136, introduced in 1997 |
DDoS | Distributed Denial of Service | attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. |
DDP | Datagram Delivery Protocol | In AppleTalk networks, a protocol that provides network connectivity by means of connectionless socket-to-socket delivery service on the internet layer. |
DDR | double-data-rate | A type of SDRAM that doubles the data burst cycle, improving system performance. |
DDS | ||
DDSA | digital data service adapter | In data communications, a device used when sending and receiving data using a nonswitched digital data service. |
DDT | Disk-to-Disk-to-Tape | Data storage and archive strategy. Data is initially stored on disk then, according to some criteria, it is copied to a secondary disk store pending archiving to tape. |
DEA | Data Encryption Algorithm | In Cryptographic Support, the equivalent to the Data Encryption Standard. |
DEC | Digital Equipment Corporation | a company whose products included the PDP-8, PDP-11, and VAX minicomputers, the VT-100 terminal, and the Alpha microprocessor. In 1998, Digital Equipment Corporation was aquired by Compaq, now part of Hewlett-Packard. |
DECT | Digital Enhanced Cordless Telecommunications |
An interface specification for
digital mobile telephony. DECT employs 10 carrier frequencies
between 1.88 GHz and 1.9GHz, and has a transmission speed
of 144 Kbps.
|
defrag | defragment | To optimize your hard drive, usually with a program that "cleans it up" |
DEK | data encryption key | Used for the encryption of message text and for the computation of message integrity checks (signatures). |
DEL | DELETE | the DELETE key on a computer keyboard |
Demarc | Demarcation Point | The point, jack or cross connect panel, at which ownership or responsibility for operating and maintaining facilities passes from one party to another. |
Demux | demultiplexer | A logic circuit that takes a single input and sends it to one of several outputs. |
DEN | Directory Enabled Network | term used in conjunction with an architecture and grouping of networking capabilities that are developed and driven by a central directory. |
DEP | business rules to dynamically generate attractive, personalized customer communications for delivery |
|
DES | ||
DET | Directory Entry Table | A table on every network volume that contains directory entries for each file on the volume. The table, stored in the server's memory, enables quick access to the location of every file |
DFM | |
|
DFI | Design for Innovation | DFI Inc. (Design for Innovation) |
DFL | design for logistics | A product design approach that considers logistical issues, such the manner in which the product will be stored or transported. |
DGC | Distributed garbage collection | garbage collection in a system where objects might not reside in the same address space or even on the same machine. |
DHA | directory harvest attack | an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. |
DHCP | Dynamic Host Configuration Protocol |
A network server uses this protocol to
dynamically assign IP addresses to networked computers. The DHCP
server waits for a computer to connect to it, then assigns it an IP
address from a master list stored on the server.
|
DHTML | Dynamic HyperText Markup Language | web pages that use a combination of HTML, JavaScript, and CSS to create features such as letting the user drag items around on the web page, some simple kinds of animation, and many more. |
DHX | Diffie-Hellman Exchange | an authentication method used by the Apple file service of Mac OS X Server. |
DIA | ||
DICOM | Digital Imaging and Communications in Medicine | a standard for handling, storing, printing, and transmitting information in medical imaging. |
DID | direct inward dial | Allows a user outside a company to dial an internal extension number without needing to pass through an operator or an attendant. The dialed digits are passed to the PBX, which then completes the call. |
DI/DO | Dispatch In/ Dispatch Out | Refers to the source of a reported trouble on a telephone circuit: |
DIF | Directory Interoperability Forum | Coalition formed in 1999 by IBM, Novell, Oracle, Lotus Development and Isocor to promote the use of LDAP by developers, and to accelerate directory interoperability standards. |
DiffServ | Differentiated Services | A protocol that helps support network quality of service. DiffServ enables data packet fields to carry information about the specific level of service a packet should receive on the network. |
Digerati | digital version of literati (Italian) | a reference to a vague cloud of people seen to be knowledgeable, hip, or otherwise in-the-know in regardsto the digital revolution. |
DIIOp | Dominio Internet Inter-Orb Protocol | allows external programs to attach to, and manipulate Domino databases |
DIMM | Dual In-line Memory Module | DIMM is a later version of memory than that of its earlier SIMM counterpart. A DIMM module was introduced for the Pentium processor because the Pentium processor needed a 64 bit path. The SIMM module only has a 32 bit path. |
DIPP | Dual Inline Pin Package | Refers to the physical geometry of an integrated circuit or other electronic package; rectangular, with pins on the two longer sides |
DIR | DIRectory | DIRectory |
Dirid | Directory identifier | A numeric identifier used within INF files to represent a disk directory. |
DISA | ||
Disc / Disk | DISKETTE | A thin, flexible, plastic, circular memory medium, coated on both sides with metal oxide and enclosed in a protective jacket. Data is stored magnetically in binary digital form on its surface(s). |
DIT | Directory Information Tree | A graphical display of an organization's directory structure, sites, and servers, shown as a branching structure. The top-level (root) directory usually represents the organization level |
DITTO | Data Interfile Transfer, Testing and Operations | An IBM licensed program that provides file-to-file services for card I/O, tape, and disk devices. |
Divx | DIgital Video Express | DVD (DVD-ROM) format being promoted by several large Hollywood companies, including Disney, Dreamworks SKG, Paramount and Universal. The idea was financed mainly by retail electronics giant Circuit City. |
DIX | Digital, Intel , Xerox | The first letter of the Digital Corp, the Intel Corp, and the Xerox Corp, which are the leading vendors defined the original Ethernet standards. |
DKI | Driver Kernel Interface | An interface between the UNIX system kernel and different types of drivers. DKI consists of a set of driver-defined functions that are called by the kernel. These functions are entry points into a driver. |
DKMS | Dynamic Kernel Module Support | Designed to create a framework where kernel dependent module source can reside so that it is very easy to rebuild modules as you upgrade kernels |
DL | ||
DLC | data link control | |
DLC | Digital Loop Carrier | Digital transmission system designed for subscriber loop plant. Multiplexes many circuits onto very few wires or onto single fiber pair. |
DLCI | data link connection identifier | A number of a private or switched virtual circuit in a Frame Relay network that tells the Frame Relay how to route the data. |
DLDP | Device Link Detection Protocol | detect the link status of a fiber cable or twisted |
DLE | data link escape | In BSC, a transmission control character used to indicate that the next character is a control character, not a data character. |
DLL | dynamic link library | A Windows mechanism that links executable code modules to an application program or process. A DLL is loaded at runtime by the application or process that invokes it. |
DLM | data life cycle management | a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted. |
DLOS | ||
DLP | ||
DLPBC | Dual Loop Port Bypass Circuitry | routing circuitry that makes it possible to add and remove nodes without disrupting the network. |
DLPI | Data Link Provider Interface | The SVR4 STREAMS-based kernel-level interface that supports the services of the Data Link Layer for both connection-mode and connectionless-mode services |
DLR | Design Layout Record | The layout for the local portion of a circuit at a particular location. |
DLT | Digital Linear Tape | A magnetic tape technology that uses half-inch, single-hub cartridges,writes 128 or 208 linear tracks, and provides capacities from 40 to80GB. A technology designed by DEC and sold to Quantum |
DM | Data Mining | Generic term for identifying possible relationships and trends between data items. Typically data mining is the statistical analysis of data to identify commonalities and patterns. |
DMA | Direct Memory Access | A technique of transferring data between the computer memory and a device on the computer bus without the intervention of the microprocessor. |
DMAA | Discrete Mathematics, Algorithms and Applications | Discrete Mathematics, Algorithms and Applications |
DMB | Dhtml Menu Builder | Used to idetify a DHTML/Javascript menu building tool called DHTML Menu Builder. Also used in the extension of the application's project files |
DMCA | Digital Millennium Copyright Act | A controversial reform of the U.S. copyright laws that is the first attempt to update those laws for the age of digital technology. |
DME | distributed management environment | A specification of the Open Software Foundation (OSF) for managing open systems. |
DMI | Desktop Management Interface | an API to enable software to collect information about a computer environment. |
DML | Data Manipulation Language | a family of computer languages used by computer programs or database users to retrieve, insert, delete and update data in a database. The currently most popular Data manipulation language is that of SQL, which is used to retrieve and manipulate data in a Relational database. |
DMO | Distributed Management Object | This OLE server exposes representations of SQL Server database objects (tables, stored procedures, server properties, and so on), many of which are usually modified through Transact-SQL |
DMS | Digital Multiplex Systems | System that combines number of digital circuits. |
DMT | Discrete Multi-Tone | an ADSL modulation technique that splits bandwidth usage usage into sub-channels for maximum data transfer. A channel is then optimized for modulation if certain channels cannot transmit data. |
DMZ | demilitarized zone | a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s. |
DNA | DNA is also Delivery Network Accelerator (BitTorrent), Dynamic Network Administration (Ericsson), Dynamic Network Analyzer (Lucent) |
|
DNIC | data network identification code | A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. |
DNLC | Directory Name Lookup Cache | Unix file cache |
DNR | Digital Noise Reduction |
Ensures superior picture quality by "cleaning" images and
reducing picture "noise". Particularly useful for older movies where
the source master has picture noise.
|
DNS | Domain Name Service / Server / System |
the way that Internet domain names are
located and translated into IP addresses. A domain name is a
meaningful and easy-to-remember "handle" for an Internet address.
|
DNSBL | DNS Based List, DNS Blacklist, or DNS Blocklist. | A published list of IP addresses that can be queried through the Internet. DNSBLs are used to publish IP addresses associated with e-mail spam and spamming. |
DNSSEC | Domain Name System SECurity extensions | Technique for securing the Domain Name System. It is a set of extensions to DNS, which provide end-to-end authenticity and integrity and was designed to protect the Internet from certain attacks. See also http://www.dnssec.net/ |
DOA | Dead On Arrival | |
DOCSIS | Data-over-Cable Service Interface Specifications | Defines technical specifications for equipment at both subscriber locations and cable operators' headends. Adoption of DOCSIS will accelerate the deployment of data-over-cable services and will ensure interoperability of equipment throughout system operators' infrastructures. |
DO-IT | Disabilities, Opportunities, Internetworking and Technology | Disabilities, Opportunities, Internetworking and Technology |
Dolly | Digital Dolly | a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files. It is similar to the Symantec product known as Ghost. |
DOM | ||
DOMAIN | Distributed Operating Multi Access Interactive Network | Distributed Operating Multi Access Interactive Network |
DOP | Dilution Of Precision | One of many quality measurements to evaluate solutions derived by a positioning receiver. This is a numeric value that relates relative geometries between positioning satellites as well as the geometries between the satellites and the receiver. |
DoS | denial of service | The inability of a Web site or other server to respond to legitimate connections. DoS attacks are used to block access to a target Internet site. |
DOS | Disk Operating System | A command-driven PC OS that resides in main memory and uses disks for data storage. It was once the standard OS for IBM-compatible PCs. Early versions of Microsoft Windows ran on top of DOS. |
DOV | Data-Over-Voice | A technique used in FDM allowing the combination of voice and data on the same line. DOV usually employs twisted pair cables assigning some of the unused bandwidth for data transmission. |
DPA |
|
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers. |
DPC | Destination Point Code | The part of a routing label that identifies where an SS7 signaling message should be sent. |
DPF | Database Partitioning Feature | A feature that can be used to improve the management of a large database by dividing it into multiple database partitions that are physically placed on one or more servers. |
DPI | ||
dpi | Dots Per Inch | An image measurement standard that measures an images resolution as it applies to printers. It measures the images pixels in one square inch. The higher the number the better the images resolution or quality. |
DPMA | Dynamic Power Management Architecture | This architecture allows computers to have a variety of advanced power management features. |
DPMI | Dos Protected Mode Interface | allow DOS programs to access the extended memory of PC architecture computers while maintaining system protection. DPMI defines a specific subset of DOS and BIOS calls that can be made by protected mode DOS programs. |
DPN | Data Packet Network | Network in which “bundles of information are transmitted, one after another. Differs from circuit network, in which entire circuit is dedicated to particular user. |
DPtoTP | Display Coordinates TO Tablet Coordinates | Coordinates conversion |
DPV | Distributed Partitioned View | Joins horizontally partitioned data from a set of member tables across one or more servers, making the data appear as if from one table |
DPW | Digital Pulse Wireless | also known as Ultra Wideband Radio. It is the revolutionary wireless technology for transmitting large amounts of digital data over a wide electromagnetic radiation spectrum of frequency bands with very low power. |
DQM | Data Quality Manager | Oracle CDH engine |
DR | disaster recovery | Methods and procedures for returning a system, network or data center to full operation after a catastrophic interruption — including the recovery of lost data, the use of alternative network channels if the primary channels are disconnected or malfunctioning. |
DRAC | Dell Remote Assistant Card | Interface card from Dell Inc that provides out-of-band management facilities. The controller has its own processor, memory, battery, network connection, and access to the system bus |
DRAM | Dynamic Random Access Memory | This is a common type of random access memory that is used in personal computing. The "dynamic" in its name is due to the fact that this memory needs to be refreshed as opposed to other SRAM that is "static". The DRAM is refreshed by the use of electrical current pulses that pass through all memory cells. DRAM needs to be periodically refreshed to retain the stored data. |
DRE | Document Rendering Engine | Collection of Java classes that can be used to define an abstract document and render it in PDF or HTML. A document consists of a collection of elements such as text, lists (bulleted, numbered, plain), tables, images, fonts, color, etc. |
DRF | Data Recovery Field | In NTFS file encryption keys are stored there |
DRi | Disaster Recovery Institute | DRI International was founded in 1988 in order to develop a base of knowledge in contingency planning and the management of risk, a rapidly growing profession. |
DRM | ||
DROP | delivery of real-time execution information protocol | feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions. |
DRP | ||
DRU | Disc Remastering Utility | Tool designed to create a customized copy of the Ubuntu Linux Distribution |
DRW | Defect Remediation Window | How long it takes to fx or “close” a defect |
DS | Differentiated Service | A IETF standard for a small, well-defined set of per-packet building blocks from which a variety of services may be built, thereby providing a framework for delivering QoS in networks |
DS0 | Digital Subscriber Level Zero | A 64 Kbps unit of transmission bandwidth. A worldwide standard speed for digitizing one voice conversation, and more recently, for data transmission. Twenty-four DS0s (24x64 Kbps) equal one Digital Signal Level 1 (DS1). |
DS1 | Digital Signal Level 1 | Framing specification used in transmitting digital signals at 1.544 Mbps on a T1 facility or 2.048 Mbps on an E1 facility. |
DSn | digital signal level n | A classification of digital circuits. The DS technically refers to the rate and the format of the signal, whereas the T designation refers to the equipment providing the signals. In practice, DS and T are used synonymously; for example, DS1 and T1, DS3 and T3. |
DSA | ||
DSAP | Destination Service Access Point | |
DSBM | Designated Subnet Bandwidth Manager | A device on a managed subnetwork that acts as the Subnet Bandwidth Manager for the subnetwork to which it is attached |
DSE | Directory Services Environment | Contains a list of Naming Contexts and Application Partitions maintained by a Domain Controller |
DSI | Dynamic Systems Initiative | Microsoft's technology strategy for products and solutions that help businesses enhance the dynamic capability of its people, process, and IT infrastructure using technology |
DSL | ||
DSLAM | DSL Access Multiplexer | a device that joins a high-speed computer network to a set of ordinary telephone lines in a telephone company central office. |
DSM | dependency structure matrix | Excellence tools Kit For Development Projects |
DSM-CC | Digital storage media command and control | a toolkit for developing control channels associated with MPEG-1 and MPEG-2 streams. |
DSML | Directory Service Markup Language | combines directory services technology (LDAP ) with XML syntax to provide an easy way to share and use personalized data across company and technology boundaries. |
DSN | dealer software network | A network-resident, standards-based environment that interconnects chains of applications and services. |
DSO | data source object | A DSO exploit is a form of spyware that takes advantage of data binding to gain access to the hard drive of a computer connected to the Internet. Such spyware can be difficult to detect and eradicate, and if it is successfully removed, it often returns. |
DSOM | Distributed System Object Model | a version of SOM that supports sharing binary objects across networks. DSOM is similar to Microsoft's competing standard called DCOM. |
DSP | digital signal processor | A specialized computer chip optimized for high data rates needed to process digitized wave forms, particularly those derived from analog sources. Often used in equipment requiring voice digitization. |
DSR | ||
DSS | igital Signature Standard | The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography. |
DSSA | Distributed System Security Architecture | a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. |
DSSS | Direct Sequence Spread Spectrum | A spread spectrum transmission method which is also used by IEEE802.11b compatible devices. One bit of the signal is transmitted as a code word, which is equivalent to multiplying the transmission rate (spreading the transmission rate). |
DSTN | Double-layer Supertwist Nematic | This is a form of passive matrix LCD screen. |
DSTP | Data Space Transfer Protocol | used to index and categorize data using a XML based catalog. |
DSU | data service unit | A simplified modem for the transmission of digital data over a private line or for limited-distance communications over the PSTN, where it is not necessary to comply with all the requirements for a high-speed modem. |
DSU | Digital Service Unit | A user device interfacing to a digital circuit, such as DDS or T1 when com-bined with a CSU. The DSU converts the user’s data stream to bipolar format for transmission. |
DSVD | Digital Simultaneous Voice and Data | An all-digital technology for concurrent voice and data (SVD) transmission over a single analog telephone line. DSVD is endorsed by Intel, Hayes, U.S. Robotics |
DSX | Digital System Cross-connect frame | Digital System Cross-connect frame. DSX1: Digital Signal Cross-connect level 1 |
DTD | Document Type Definition | a type of file associated with SGML and XML documents that defines how the markup tags should be interpreted by the application presenting the document. |
DTDS | Disaster Tolerant Disk Systems | term from the RAID advisory board which describes server systems which must be divisible into two or more zones which cooperate to protect against loss of access to data in the event of one system's complete failure. |
DTE | Data Terminal Equipment | Devices acting as data source, data sink, or both |
DTM | ||
DTMF | Data Tone Multiple Frequency | Used with modems to put more data down one line. |
DTML | Document Template Mark-up Language | a subset of SGML and a superset of HTML used for creating documents that dynamically adapt to external conditions using its own custom tags and a little bit of Python. |
DTN | Disruption Tolerant Networking | a networking architecture that is designed to provide communications in the most unstable and stressed environments |
DTP | Desktop publishing | A system that processes the text and graphics and, by means of page layout software and a laser printer, produces high-quality pages suitable for printing or in-house reproduction. |
DTS | Digital Theater System | Special system used for encoding and decoding an audio signal on multiple channels, used in cinemas and home-use theater systems as well. Used for the first time by movie director Steven Spielberg, DTS' most common channel array comprises 5.1 channels (5 fullrange and one for the subwoofer). Dolby Digital is DTS' most notable competitor. |
DTR | Data Terminal Ready | It is a primary serial printer signal for hardware handshaking over a serial interface; connects to the DSR pin at the computer. |
DTTV | Digital Terestial Televison | broadcasts over earthbound circuits so sateliites aren't used for any part of the link between the broadcaster and the end user. |
du | disk usage | du is a standard Unix program used to estimate the file space usage—space used under a particular directory or files on a file system. |
DUAL | Diffusing Update Algorithm | Convergence algorithm used in Enhanced IGRP that provides loop-free operation at every instant throughout a route computation. Allows routers involved in a topology change to synchronize at the same time, while not involving routers that are unaffected by the change. |
DUL | Dial Up List | a list of dialups known to be used by spammers. Networks can use the list to automatically block all mail from those dialups. |
DUN | Dial-Up Networking | Creating a WAN over dial-up internet. |
DUNS | Data Universal Numbering System | A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. |
DUOW / DUW |
|
|
DUPS | Digital Unbundled Port Services | An element, not bundled with a loop or transport facility, which provides digital access to the functionality of a local switching system. |
DUV | Data Under Voice | The normally unused spectrum at the lower end of a radio channel used to provide a T1 (1.544 m bps) channel for digital services. |
DV | Digital video | A digital tape-recording format using approximately 5:1 compression to produce Betacam quality on a very small cassette. |
DVB-H | Digital Video Broadcasting - Handhelds | specification for bringing broadcast services to battery-powered handheld receivers that allows the receiving device to move freely while receiving the transmission. |
DVB-SH | Digital Video Broadcasting - Satellite services to Handhelds | a system used to deliver IP based media content and data to handheld terminals, like mobile phones or PDAs, via satellite. The DVB-SH system was designed for frequencies below 3 GHz, typically in the S-band. |
DVBMHP | Digital Video Broadcasting Multimedia Home Platform | Europe and South Korea Interactive TV |
DVCD | Double Video CD | CD capable of holding up to 99 minutes of video as well as audio data, with quality similar to VHS tape. |
DVD | Digital Versatile Disc | DVD is a storage medium capable of storing programs and data. |
DVMRP | Distance Vector Multicast Routing Protocol | an interior gateway protocol based on RIP that supports connectionless multicast data transmission to a group of hosts over a network. |
DVI | Digital Video Interface, originally Digital Video Disc | A specification for a computer monitor interface capable of carrying both analog and digital signals. DVI was developed by the Digital Display Working Group, an industry group formed by Intel and other vendors. |
DVRs | Digital video/Versatile recorders | A hard-drive-equipped set-top box that makes it easy for consumers to record TV programs, pause live TV, and skip commercials. |
DWDM | dense wave division multiplexing | A technology used to increase fiber-optic transmission capacity. In fiber-optic networks such as SONET, DWDM permits fibers to carry up to eight wavelengths of light, thus multiplying their capacity by the number of wavelengths carried. |
DWF | Design Web Format | Fast, efficient way to distribute design data to anyone who needs it. With Autodesk Express Viewer, a small, free, downloadable application, you can view and print that rich data |
DWM | Desktop Windows Manager | A windowing system in Windows Vista editions (all except Starter and Home Basic) that support Aero, which handles drawing of content to the screen. |
DWS | Dialable Wideband Service | Alternative name for Multirate ISDN, providing dialed data connectivity at desired bandwidth on per call basis (from 128 kbps through 1.536 Mbps in 64 kbps increments). |
DX | DirectX / Direct X | Microsoft DirectX software |
dxdiag | directx diagnostics | a utility program for testing DirectX under Windows. |
DXF | Drawing Interchange Format | used for Macintosh graphic files. The standard file-exchange format for 3-D and CAD programs. |
DXI | Data Exchange Interface | A variable length frame-based ATM interface between a DTE and a special ATM CSU/DSU. The ATM CSU/DSU converts between the variable-length DXI frames and the fixed-length ATM cells. |
dyld | dynamic link editor | The library manager for code in the Mach-O executable format. The dynamic link editor is a dynamic library that “lives” in all Mach-O programs on the system. |
D-4 | A digital multiplexer used to convert 24 voice grade analog or data channels into DS1. | |
DaFont | DaFont is an archive of freely downloadable fonts. Fonts are categorized by theme, and can also be sorted by name, date, and popularity.http://www.dafont.com/ | |
dark fiber | Fiber-optic cable deployments that are not yet being used to carry network traffic. (The word "dark" refers to the fact that no light is passing through the optical fibers.) | |
dashboard | A summary view of the status of multiple service level agreements (SLAs). Or a Web page that can contain one or more viewers that graphically represent business data. | |
Daughter Board | A circuit board that plugs into a larger circuit board, or motherboard. | |
dBi | A unit that is used to represent the gain of an antenna compared to the gain of an isotropic radiator. | |
deadlock | ||
debug | To detect, diagnose, and eliminate errors in programs. Checking the logic of a program to isolate and eliminate the mistakes from a computer program or other software. | |
Decryption | The act of restoring an encrypted file to its original state. | |
Deeper Sleep | an Intel power management technology. It helps to deliver longer battery life by minimizing the power consumption of the processor during brief periods of inactivity by the user including microseconds between keystrokes. | |
Default Route | Entry in a routing table that can redirect any frames for which the table has no definitive listing for the next hop. | |
desktop | A computer designed to sit on a desk (as opposed to a laptop). In Windows, it also means the screen you see when you aren't running any programs, with "My Computer", the Recycle Bin and so on. | |
dial-up | This is a telephone line that is connected to a server. When it is called, tones are exchanged between the server and the devise calling in order to attach. | |
DICT | dictionary network protocol created by the DICT Development Group | |
Dijkstra | Algorithm sometimes used to calculate routes given link and nodal state topology database. | |
directX | A set of multimedia APIs that Microsoft provides. | |
docking (station) | A hardware device that enables a mobile computer to function as a desktop computer. | |
DoCoMo | DoCoMo (meaning "anywhere" in Japanese) is a NTT subsidiary and Japan's biggest mobile service provider | |
domain | The unique name that identifies an internet site. Domain names always have two or more parts separated by dots. | |
drag | To move an image or a window from one place on the screen to another by grabbing it with a mouse or other pointing device and pulling it to a new location. | |
dropbox | Dropbox is a Web-based file hosting service operated by Dropbox, Inc. that uses cloud storage to enable users to store and share files and folders with others. http://www.dropbox.com/ | |
dual core | a CPU structure. The difference between a single core and dual core is that a dual core system has two CPU's that are electronically wired together. These two CPU's wired together in parallel gives twice the performance than that of its single core counterpart. | |
Due diligence | the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur. | |
dump | ||
Duplex | The ability to send and receive data over the same communications line. | |
Dynamic IP | Each computer or device connected to the internet needs its own IP address. Devices and sites that are constantly connected to the internet usually have a static IP address so the DNS can reliably route traffic to the right place. |
D
D for DNS
abbreviation / acronyms | Term | Definition |
---|---|---|
d-channel / D channel | ||
d-commerce | digital commerce | form of e-commerce by companies that sell news, documents, subscriptions, or any other content that can be delivered digitally over the Web. Under the ultimate "pay as you go" model, a d-commerce company acts as an electronic middleman: Users establish an account with a d-commerce company to purchase content from a variety publishers |
D&I | Drop And Insert | Refers to the cross connecting of Time-Division Multiplexing (TDM) circuits. It allows you to take 64Kb DS0 channels from one T1 and digitally cross connect them to 64Kb DS0 channels on another T1 |
D2D | disk-to-disk | backup technologies |
D2D2T | disk-to-disk-to-tape | backup technologies |
DA | Destination Address | Information sent in forward direction indicating address of called station or customer. |
DAA | Distributed Application Architecture | under design by Hewlett-Packard and Sun. A distributed object management environment that will allow applications to be developed independent of operating system, network or windowing system. |
DaaS | desktops-as-a-service | virtual desktop hosting |
DAB | Digital Audio Broadcast | Digital radio broadcast, providing better quality and a greater number of channels than traditional (analogue) radio. |
DAC | digital-to-analog converter | The digital-to-analog converter is for converting a digital signal into an output analog voltage. |
DAC / DACL | Discretionary Access Control List | Discretionary Access Control consists of something the user can manage, such as a document password.A DACL consists of a list of security identifiers (which identify users) and specific permissions for each |
DACS | Digital Access and Cross Connect System | A time-slot switch that allows T1 or E1 lines to be remapped electronically at the DS-0 (64 Kbps) level. Also called DCS or DXS. |
DAE | Disk Array Enclosure | The DAE is a JBOD (Just a Bunch Of Disk) enclosure without a storage processor (SP). The DAE supports up to 10 Fibre Channel drives per enclosure and is connected by dual Fibre Channel loops into the DPE. |
Daemon | Disk And Execution MONitor | Disk And Execution MONitor software |
DAFS | Direct Attached File System | an advanced methodology of a particular network data storage method. |
DAL | Dedicated Advertiser Location | A type of iTV ad in development, online advertisers are proposing Simple DALs and Complex DALs. A Simple DAL refers to the data that users reach on the screen, once they leave a video (TV) stream. Viewers will be able to leave a broadcast stream, beyond the duration of an ad, but will then get rapidly returned to it after navigating past some qualifier screens. |
DAM | ||
DAMA | demand assigned multiple access | Allocation of communication satellite time to earth stations as the need arises. |
DAML | DARPA Agent Markup Language | A language currently in development for presenting information on the WWW that will allow information objects to be tagged in a way that allows software applications, computer agents, and virtual assistants. |
DAO | Disk-At-Once | This is a single-session method of writing data to a CD-R/RW disc that creates a disc in a format suitable for commercial duplication. |
DAP | Directory Access Protocol | A derivative of the X.500 DAP standard, postulated by the ISO many years ago. DAP and X.500 remained unused for many years because of the complexity of the DAP access protocol. |
DAR | ||
DARPA | Defense Advanced Research Project Agency | the progenitor of the Internet. DARPA is where it all began. http://www.darpa.mil/ |
DAS | direct-attached storage | RAID storage that is internal and host-attached (both the RAID controller and software technologies and the hard disk drives are housed within the server) |
DAS | distributed antenna system | a way to efficiently distribute wireless connections inside a large building where steel columns and layers of concrete can interfere with wireless signals. A DAS can be used to get rid of "dead zones" by routing radio frequency (RF) signals through fiber or copper cabling from a single base station to multiple antennas located throughout the building. |
DASH | Desktop and mobile Architecture for System Hardware | Suite of specifications that takes full advantage of the Web Services for Management (WS-Management) specificationdelivering standards-based Web services management for desktop and mobile client systems |
DAST | Dynamic Application Security Testing | technologies designed to detect conditions indicative of a security vulnerability in an application in its running state |
DAT | digital audio tape | A magnetic tape that stores audio data in digital form. |
DAVID | Digital Audio Video Interactive Decoder | Digital Audio Video Interactive Decoder |
db | Decibel | A unit of power (sound, optical or electrical) increase or decrease that is proportional to the exponential increase or decrease of power. |
DB | Database | A collection of data organized in a structured manner so that information can be readily retrieved. |
DB2 | Database 2 | IBM's RDBMS offering, originally built for Multiple Virtual Storage (MVS) systems. It uses SQL as its data manipulation and definition language. IBM has released versions of DB2 for several other operating systems, such as Windows and Unix. |
DB9 | D sub-miniature 9 | Also called Dsub9, a 9 pin connector shaped like the leter ‘D’. They are used to connect serial devices together with a serial cable. |
DBA | database administrator | The person responsible for managing data, namely data set placement, database performance, and data recovery and integrity at a physical level. Also known as a "data administrator." |
DBCS | Double-Byte Character Set | One of a number of character sets defined for representing Chinese, Japanese, or Korean text. These character sets are often encoded in such a way as to allow double-byte character encodings to be mixed with single-byte character encodings. |
dBm | decibels milliwatt | used to measure signal strength on telephone lines |
DBMS | Database Management System |
In short, a DBMS is a database
program. Technically speaking, it is a software system that uses a
standard method of cataloging, retrieving, and running queries on data.
The DBMS manages incoming data, organizes it, and provides ways for
the data to be modified or extracted by users or other programs.
|
DBS | direct broadcast satellite | A wireless technology for broadcasting by transmitting a compressed high-speed signal via satellite. |
DCAP | Data Link Switching Client Access Protocol | Data Link Switching Client Access Protocol |
DCB | Data Center Bridging | a set of IEEE industry standards that delivers end-to-end congestion notification and quality of service throughout the network which allows customers to configure traffic classes and priorities to deliver a lossless Ethernet fabric such as Open FCoE. |
DCBU | D-channel backup | An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. |
DCC | ||
DCCP | Datagram Congestion Control Protocol | a minimal general purpose transport-layer protocol that minimizes the overhead of packet header size or end-node processing as much as possible. |
DCE | terminate a data transmission connection. Normally it refers to a modem. |
|
DCO | Device Configuration Overlay | Allows system vendors to purchase HDDs from different manufacturers with potentially different sizes, and then configure all HDDs to have the same number of sectors |
DCOM | Distributed Component Object Model | A version of Microsoft's COM that enables application components to be distributed over several computers through the use of a remote procedure call (RPC). |
DCT | Digital Cordless Telephone | A cordless telephone that uses digital transmission technology to provide more security and better sound quality than a traditional analog cordless telephone. |
DDAP | Digital Distribution of Advertising for Publications | User-driven organization working towards enabling the universal exchange of digital ads throughopen process integration and the use of accredited standards. See http://www.ddap.org |
DDBMS | Distributed database management system | A database management system (DBMS) that enables end users or application programmers to view a collection of physically separate databases as a logical single-system image. The concept that is most fundamental to the DDBMS is location transparency, meaning the user should not be conscious of the actual location of data. |
DDCMP | Digital Data Communications Message Protocol | A byte-oriented, link layer protocol that supports half- or full-duplex modes and either point-to-point or multipoint lines in a Digital Network Architecture network. |
DDD | Data Display Debugger | a popular graphical user interface for command-line debuggers such as GDB, DBX, JDB, WDB, XDB, the Perl debugger, and the Python debugger.DDD is licensed under the GNU GPL and is open source. |
DDE | Dynamic Data Exchange | A method of exchanging data between applications on MacOS, Windows, and OS/2 operating systems. |
DDI | ||
DDL | Data Definition Language | A language for describing data and its relationships in a database. |
DDN | Digital Data Network | A network service established in China in 1994, connecting Beijing, Tianjin, Shanghai and other provincial capitals. Each post and telecommunications administration in China has a department regulating DDN service in its region. |
DDNS | Dynamic Domain Name System | A technology that automatically updates the logical names of dynamically assigned IP addresses in the DNS server of an IP network. Specifications for a standard approach to DDNS were defined in Request for Comment 2136, introduced in 1997 |
DDoS | Distributed Denial of Service | attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. |
DDP | Datagram Delivery Protocol | In AppleTalk networks, a protocol that provides network connectivity by means of connectionless socket-to-socket delivery service on the internet layer. |
DDR | double-data-rate | A type of SDRAM that doubles the data burst cycle, improving system performance. |
DDS | ||
DDSA | digital data service adapter | In data communications, a device used when sending and receiving data using a nonswitched digital data service. |
DDT | Disk-to-Disk-to-Tape | Data storage and archive strategy. Data is initially stored on disk then, according to some criteria, it is copied to a secondary disk store pending archiving to tape. |
DEA | Data Encryption Algorithm | In Cryptographic Support, the equivalent to the Data Encryption Standard. |
DEC | Digital Equipment Corporation | a company whose products included the PDP-8, PDP-11, and VAX minicomputers, the VT-100 terminal, and the Alpha microprocessor. In 1998, Digital Equipment Corporation was aquired by Compaq, now part of Hewlett-Packard. |
DECT | Digital Enhanced Cordless Telecommunications |
An interface specification for
digital mobile telephony. DECT employs 10 carrier frequencies
between 1.88 GHz and 1.9GHz, and has a transmission speed
of 144 Kbps.
|
defrag | defragment | To optimize your hard drive, usually with a program that "cleans it up" |
DEK | data encryption key | Used for the encryption of message text and for the computation of message integrity checks (signatures). |
DEL | DELETE | the DELETE key on a computer keyboard |
Demarc | Demarcation Point | The point, jack or cross connect panel, at which ownership or responsibility for operating and maintaining facilities passes from one party to another. |
Demux | demultiplexer | A logic circuit that takes a single input and sends it to one of several outputs. |
DEN | Directory Enabled Network | term used in conjunction with an architecture and grouping of networking capabilities that are developed and driven by a central directory. |
DEP | business rules to dynamically generate attractive, personalized customer communications for delivery |
|
DES | ||
DET | Directory Entry Table | A table on every network volume that contains directory entries for each file on the volume. The table, stored in the server's memory, enables quick access to the location of every file |
DFM | |
|
DFI | Design for Innovation | DFI Inc. (Design for Innovation) |
DFL | design for logistics | A product design approach that considers logistical issues, such the manner in which the product will be stored or transported. |
DGC | Distributed garbage collection | garbage collection in a system where objects might not reside in the same address space or even on the same machine. |
DHA | directory harvest attack | an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. |
DHCP | Dynamic Host Configuration Protocol |
A network server uses this protocol to
dynamically assign IP addresses to networked computers. The DHCP
server waits for a computer to connect to it, then assigns it an IP
address from a master list stored on the server.
|
DHTML | Dynamic HyperText Markup Language | web pages that use a combination of HTML, JavaScript, and CSS to create features such as letting the user drag items around on the web page, some simple kinds of animation, and many more. |
DHX | Diffie-Hellman Exchange | an authentication method used by the Apple file service of Mac OS X Server. |
DIA | ||
DICOM | Digital Imaging and Communications in Medicine | a standard for handling, storing, printing, and transmitting information in medical imaging. |
DID | direct inward dial | Allows a user outside a company to dial an internal extension number without needing to pass through an operator or an attendant. The dialed digits are passed to the PBX, which then completes the call. |
DI/DO | Dispatch In/ Dispatch Out | Refers to the source of a reported trouble on a telephone circuit: |
DIF | Directory Interoperability Forum | Coalition formed in 1999 by IBM, Novell, Oracle, Lotus Development and Isocor to promote the use of LDAP by developers, and to accelerate directory interoperability standards. |
DiffServ | Differentiated Services | A protocol that helps support network quality of service. DiffServ enables data packet fields to carry information about the specific level of service a packet should receive on the network. |
Digerati | digital version of literati (Italian) | a reference to a vague cloud of people seen to be knowledgeable, hip, or otherwise in-the-know in regardsto the digital revolution. |
DIIOp | Dominio Internet Inter-Orb Protocol | allows external programs to attach to, and manipulate Domino databases |
DIMM | Dual In-line Memory Module | DIMM is a later version of memory than that of its earlier SIMM counterpart. A DIMM module was introduced for the Pentium processor because the Pentium processor needed a 64 bit path. The SIMM module only has a 32 bit path. |
DIPP | Dual Inline Pin Package | Refers to the physical geometry of an integrated circuit or other electronic package; rectangular, with pins on the two longer sides |
DIR | DIRectory | DIRectory |
Dirid | Directory identifier | A numeric identifier used within INF files to represent a disk directory. |
DISA | ||
Disc / Disk | DISKETTE | A thin, flexible, plastic, circular memory medium, coated on both sides with metal oxide and enclosed in a protective jacket. Data is stored magnetically in binary digital form on its surface(s). |
DIT | Directory Information Tree | A graphical display of an organization's directory structure, sites, and servers, shown as a branching structure. The top-level (root) directory usually represents the organization level |
DITTO | Data Interfile Transfer, Testing and Operations | An IBM licensed program that provides file-to-file services for card I/O, tape, and disk devices. |
Divx | DIgital Video Express | DVD (DVD-ROM) format being promoted by several large Hollywood companies, including Disney, Dreamworks SKG, Paramount and Universal. The idea was financed mainly by retail electronics giant Circuit City. |
DIX | Digital, Intel , Xerox | The first letter of the Digital Corp, the Intel Corp, and the Xerox Corp, which are the leading vendors defined the original Ethernet standards. |
DKI | Driver Kernel Interface | An interface between the UNIX system kernel and different types of drivers. DKI consists of a set of driver-defined functions that are called by the kernel. These functions are entry points into a driver. |
DKMS | Dynamic Kernel Module Support | Designed to create a framework where kernel dependent module source can reside so that it is very easy to rebuild modules as you upgrade kernels |
DL | ||
DLC | data link control | |
DLC | Digital Loop Carrier | Digital transmission system designed for subscriber loop plant. Multiplexes many circuits onto very few wires or onto single fiber pair. |
DLCI | data link connection identifier | A number of a private or switched virtual circuit in a Frame Relay network that tells the Frame Relay how to route the data. |
DLDP | Device Link Detection Protocol | detect the link status of a fiber cable or twisted |
DLE | data link escape | In BSC, a transmission control character used to indicate that the next character is a control character, not a data character. |
DLL | dynamic link library | A Windows mechanism that links executable code modules to an application program or process. A DLL is loaded at runtime by the application or process that invokes it. |
DLM | data life cycle management | a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted. |
DLOS | ||
DLP | ||
DLPBC | Dual Loop Port Bypass Circuitry | routing circuitry that makes it possible to add and remove nodes without disrupting the network. |
DLPI | Data Link Provider Interface | The SVR4 STREAMS-based kernel-level interface that supports the services of the Data Link Layer for both connection-mode and connectionless-mode services |
DLR | Design Layout Record | The layout for the local portion of a circuit at a particular location. |
DLT | Digital Linear Tape | A magnetic tape technology that uses half-inch, single-hub cartridges,writes 128 or 208 linear tracks, and provides capacities from 40 to80GB. A technology designed by DEC and sold to Quantum |
DM | Data Mining | Generic term for identifying possible relationships and trends between data items. Typically data mining is the statistical analysis of data to identify commonalities and patterns. |
DMA | Direct Memory Access | A technique of transferring data between the computer memory and a device on the computer bus without the intervention of the microprocessor. |
DMAA | Discrete Mathematics, Algorithms and Applications | Discrete Mathematics, Algorithms and Applications |
DMB | Dhtml Menu Builder | Used to idetify a DHTML/Javascript menu building tool called DHTML Menu Builder. Also used in the extension of the application's project files |
DMCA | Digital Millennium Copyright Act | A controversial reform of the U.S. copyright laws that is the first attempt to update those laws for the age of digital technology. |
DME | distributed management environment | A specification of the Open Software Foundation (OSF) for managing open systems. |
DMI | Desktop Management Interface | an API to enable software to collect information about a computer environment. |
DML | Data Manipulation Language | a family of computer languages used by computer programs or database users to retrieve, insert, delete and update data in a database. The currently most popular Data manipulation language is that of SQL, which is used to retrieve and manipulate data in a Relational database. |
DMO | Distributed Management Object | This OLE server exposes representations of SQL Server database objects (tables, stored procedures, server properties, and so on), many of which are usually modified through Transact-SQL |
DMS | Digital Multiplex Systems | System that combines number of digital circuits. |
DMT | Discrete Multi-Tone | an ADSL modulation technique that splits bandwidth usage usage into sub-channels for maximum data transfer. A channel is then optimized for modulation if certain channels cannot transmit data. |
DMZ | demilitarized zone | a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s. |
DNA | DNA is also Delivery Network Accelerator (BitTorrent), Dynamic Network Administration (Ericsson), Dynamic Network Analyzer (Lucent) |
|
DNIC | data network identification code | A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. |
DNLC | Directory Name Lookup Cache | Unix file cache |
DNR | Digital Noise Reduction |
Ensures superior picture quality by "cleaning" images and
reducing picture "noise". Particularly useful for older movies where
the source master has picture noise.
|
DNS | Domain Name Service / Server / System |
the way that Internet domain names are
located and translated into IP addresses. A domain name is a
meaningful and easy-to-remember "handle" for an Internet address.
|
DNSBL | DNS Based List, DNS Blacklist, or DNS Blocklist. | A published list of IP addresses that can be queried through the Internet. DNSBLs are used to publish IP addresses associated with e-mail spam and spamming. |
DNSSEC | Domain Name System SECurity extensions | Technique for securing the Domain Name System. It is a set of extensions to DNS, which provide end-to-end authenticity and integrity and was designed to protect the Internet from certain attacks. See also http://www.dnssec.net/ |
DOA | Dead On Arrival | |
DOCSIS | Data-over-Cable Service Interface Specifications | Defines technical specifications for equipment at both subscriber locations and cable operators' headends. Adoption of DOCSIS will accelerate the deployment of data-over-cable services and will ensure interoperability of equipment throughout system operators' infrastructures. |
DO-IT | Disabilities, Opportunities, Internetworking and Technology | Disabilities, Opportunities, Internetworking and Technology |
Dolly | Digital Dolly | a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files. It is similar to the Symantec product known as Ghost. |
DOM | ||
DOMAIN | Distributed Operating Multi Access Interactive Network | Distributed Operating Multi Access Interactive Network |
DOP | Dilution Of Precision | One of many quality measurements to evaluate solutions derived by a positioning receiver. This is a numeric value that relates relative geometries between positioning satellites as well as the geometries between the satellites and the receiver. |
DoS | denial of service | The inability of a Web site or other server to respond to legitimate connections. DoS attacks are used to block access to a target Internet site. |
DOS | Disk Operating System | A command-driven PC OS that resides in main memory and uses disks for data storage. It was once the standard OS for IBM-compatible PCs. Early versions of Microsoft Windows ran on top of DOS. |
DOV | Data-Over-Voice | A technique used in FDM allowing the combination of voice and data on the same line. DOV usually employs twisted pair cables assigning some of the unused bandwidth for data transmission. |
DPA |
|
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers. |
DPC | Destination Point Code | The part of a routing label that identifies where an SS7 signaling message should be sent. |
DPF | Database Partitioning Feature | A feature that can be used to improve the management of a large database by dividing it into multiple database partitions that are physically placed on one or more servers. |
DPI | ||
dpi | Dots Per Inch | An image measurement standard that measures an images resolution as it applies to printers. It measures the images pixels in one square inch. The higher the number the better the images resolution or quality. |
DPMA | Dynamic Power Management Architecture | This architecture allows computers to have a variety of advanced power management features. |
DPMI | Dos Protected Mode Interface | allow DOS programs to access the extended memory of PC architecture computers while maintaining system protection. DPMI defines a specific subset of DOS and BIOS calls that can be made by protected mode DOS programs. |
DPN | Data Packet Network | Network in which “bundles of information are transmitted, one after another. Differs from circuit network, in which entire circuit is dedicated to particular user. |
DPtoTP | Display Coordinates TO Tablet Coordinates | Coordinates conversion |
DPV | Distributed Partitioned View | Joins horizontally partitioned data from a set of member tables across one or more servers, making the data appear as if from one table |
DPW | Digital Pulse Wireless | also known as Ultra Wideband Radio. It is the revolutionary wireless technology for transmitting large amounts of digital data over a wide electromagnetic radiation spectrum of frequency bands with very low power. |
DQM | Data Quality Manager | Oracle CDH engine |
DR | disaster recovery | Methods and procedures for returning a system, network or data center to full operation after a catastrophic interruption — including the recovery of lost data, the use of alternative network channels if the primary channels are disconnected or malfunctioning. |
DRAC | Dell Remote Assistant Card | Interface card from Dell Inc that provides out-of-band management facilities. The controller has its own processor, memory, battery, network connection, and access to the system bus |
DRAM | Dynamic Random Access Memory | This is a common type of random access memory that is used in personal computing. The "dynamic" in its name is due to the fact that this memory needs to be refreshed as opposed to other SRAM that is "static". The DRAM is refreshed by the use of electrical current pulses that pass through all memory cells. DRAM needs to be periodically refreshed to retain the stored data. |
DRE | Document Rendering Engine | Collection of Java classes that can be used to define an abstract document and render it in PDF or HTML. A document consists of a collection of elements such as text, lists (bulleted, numbered, plain), tables, images, fonts, color, etc. |
DRF | Data Recovery Field | In NTFS file encryption keys are stored there |
DRi | Disaster Recovery Institute | DRI International was founded in 1988 in order to develop a base of knowledge in contingency planning and the management of risk, a rapidly growing profession. |
DRM | ||
DROP | delivery of real-time execution information protocol | feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions. |
DRP | ||
DRU | Disc Remastering Utility | Tool designed to create a customized copy of the Ubuntu Linux Distribution |
DRW | Defect Remediation Window | How long it takes to fx or “close” a defect |
DS | Differentiated Service | A IETF standard for a small, well-defined set of per-packet building blocks from which a variety of services may be built, thereby providing a framework for delivering QoS in networks |
DS0 | Digital Subscriber Level Zero | A 64 Kbps unit of transmission bandwidth. A worldwide standard speed for digitizing one voice conversation, and more recently, for data transmission. Twenty-four DS0s (24x64 Kbps) equal one Digital Signal Level 1 (DS1). |
DS1 | Digital Signal Level 1 | Framing specification used in transmitting digital signals at 1.544 Mbps on a T1 facility or 2.048 Mbps on an E1 facility. |
DSn | digital signal level n | A classification of digital circuits. The DS technically refers to the rate and the format of the signal, whereas the T designation refers to the equipment providing the signals. In practice, DS and T are used synonymously; for example, DS1 and T1, DS3 and T3. |
DSA | ||
DSAP | Destination Service Access Point | |
DSBM | Designated Subnet Bandwidth Manager | A device on a managed subnetwork that acts as the Subnet Bandwidth Manager for the subnetwork to which it is attached |
DSE | Directory Services Environment | Contains a list of Naming Contexts and Application Partitions maintained by a Domain Controller |
DSI | Dynamic Systems Initiative | Microsoft's technology strategy for products and solutions that help businesses enhance the dynamic capability of its people, process, and IT infrastructure using technology |
DSL | ||
DSLAM | DSL Access Multiplexer | a device that joins a high-speed computer network to a set of ordinary telephone lines in a telephone company central office. |
DSM | dependency structure matrix | Excellence tools Kit For Development Projects |
DSM-CC | Digital storage media command and control | a toolkit for developing control channels associated with MPEG-1 and MPEG-2 streams. |
DSML | Directory Service Markup Language | combines directory services technology (LDAP ) with XML syntax to provide an easy way to share and use personalized data across company and technology boundaries. |
DSN | dealer software network | A network-resident, standards-based environment that interconnects chains of applications and services. |
DSO | data source object | A DSO exploit is a form of spyware that takes advantage of data binding to gain access to the hard drive of a computer connected to the Internet. Such spyware can be difficult to detect and eradicate, and if it is successfully removed, it often returns. |
DSOM | Distributed System Object Model | a version of SOM that supports sharing binary objects across networks. DSOM is similar to Microsoft's competing standard called DCOM. |
DSP | digital signal processor | A specialized computer chip optimized for high data rates needed to process digitized wave forms, particularly those derived from analog sources. Often used in equipment requiring voice digitization. |
DSR | ||
DSS | igital Signature Standard | The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography. |
DSSA | Distributed System Security Architecture | a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. |
DSSS | Direct Sequence Spread Spectrum | A spread spectrum transmission method which is also used by IEEE802.11b compatible devices. One bit of the signal is transmitted as a code word, which is equivalent to multiplying the transmission rate (spreading the transmission rate). |
DSTN | Double-layer Supertwist Nematic | This is a form of passive matrix LCD screen. |
DSTP | Data Space Transfer Protocol | used to index and categorize data using a XML based catalog. |
DSU | data service unit | A simplified modem for the transmission of digital data over a private line or for limited-distance communications over the PSTN, where it is not necessary to comply with all the requirements for a high-speed modem. |
DSU | Digital Service Unit | A user device interfacing to a digital circuit, such as DDS or T1 when com-bined with a CSU. The DSU converts the user’s data stream to bipolar format for transmission. |
DSVD | Digital Simultaneous Voice and Data | An all-digital technology for concurrent voice and data (SVD) transmission over a single analog telephone line. DSVD is endorsed by Intel, Hayes, U.S. Robotics |
DSX | Digital System Cross-connect frame | Digital System Cross-connect frame. DSX1: Digital Signal Cross-connect level 1 |
DTD | Document Type Definition | a type of file associated with SGML and XML documents that defines how the markup tags should be interpreted by the application presenting the document. |
DTDS | Disaster Tolerant Disk Systems | term from the RAID advisory board which describes server systems which must be divisible into two or more zones which cooperate to protect against loss of access to data in the event of one system's complete failure. |
DTE | Data Terminal Equipment | Devices acting as data source, data sink, or both |
DTM | ||
DTMF | Data Tone Multiple Frequency | Used with modems to put more data down one line. |
DTML | Document Template Mark-up Language | a subset of SGML and a superset of HTML used for creating documents that dynamically adapt to external conditions using its own custom tags and a little bit of Python. |
DTN | Disruption Tolerant Networking | a networking architecture that is designed to provide communications in the most unstable and stressed environments |
DTP | Desktop publishing | A system that processes the text and graphics and, by means of page layout software and a laser printer, produces high-quality pages suitable for printing or in-house reproduction. |
DTS | Digital Theater System | Special system used for encoding and decoding an audio signal on multiple channels, used in cinemas and home-use theater systems as well. Used for the first time by movie director Steven Spielberg, DTS' most common channel array comprises 5.1 channels (5 fullrange and one for the subwoofer). Dolby Digital is DTS' most notable competitor. |
DTR | Data Terminal Ready | It is a primary serial printer signal for hardware handshaking over a serial interface; connects to the DSR pin at the computer. |
DTTV | Digital Terestial Televison | broadcasts over earthbound circuits so sateliites aren't used for any part of the link between the broadcaster and the end user. |
du | disk usage | du is a standard Unix program used to estimate the file space usage—space used under a particular directory or files on a file system. |
DUAL | Diffusing Update Algorithm | Convergence algorithm used in Enhanced IGRP that provides loop-free operation at every instant throughout a route computation. Allows routers involved in a topology change to synchronize at the same time, while not involving routers that are unaffected by the change. |
DUL | Dial Up List | a list of dialups known to be used by spammers. Networks can use the list to automatically block all mail from those dialups. |
DUN | Dial-Up Networking | Creating a WAN over dial-up internet. |
DUNS | Data Universal Numbering System | A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. |
DUOW / DUW |
|
|
DUPS | Digital Unbundled Port Services | An element, not bundled with a loop or transport facility, which provides digital access to the functionality of a local switching system. |
DUV | Data Under Voice | The normally unused spectrum at the lower end of a radio channel used to provide a T1 (1.544 m bps) channel for digital services. |
DV | Digital video | A digital tape-recording format using approximately 5:1 compression to produce Betacam quality on a very small cassette. |
DVB-H | Digital Video Broadcasting - Handhelds | specification for bringing broadcast services to battery-powered handheld receivers that allows the receiving device to move freely while receiving the transmission. |
DVB-SH | Digital Video Broadcasting - Satellite services to Handhelds | a system used to deliver IP based media content and data to handheld terminals, like mobile phones or PDAs, via satellite. The DVB-SH system was designed for frequencies below 3 GHz, typically in the S-band. |
DVBMHP | Digital Video Broadcasting Multimedia Home Platform | Europe and South Korea Interactive TV |
DVCD | Double Video CD | CD capable of holding up to 99 minutes of video as well as audio data, with quality similar to VHS tape. |
DVD | Digital Versatile Disc | DVD is a storage medium capable of storing programs and data. |
DVMRP | Distance Vector Multicast Routing Protocol | an interior gateway protocol based on RIP that supports connectionless multicast data transmission to a group of hosts over a network. |
DVI | Digital Video Interface, originally Digital Video Disc | A specification for a computer monitor interface capable of carrying both analog and digital signals. DVI was developed by the Digital Display Working Group, an industry group formed by Intel and other vendors. |
DVRs | Digital video/Versatile recorders | A hard-drive-equipped set-top box that makes it easy for consumers to record TV programs, pause live TV, and skip commercials. |
DWDM | dense wave division multiplexing | A technology used to increase fiber-optic transmission capacity. In fiber-optic networks such as SONET, DWDM permits fibers to carry up to eight wavelengths of light, thus multiplying their capacity by the number of wavelengths carried. |
DWF | Design Web Format | Fast, efficient way to distribute design data to anyone who needs it. With Autodesk Express Viewer, a small, free, downloadable application, you can view and print that rich data |
DWM | Desktop Windows Manager | A windowing system in Windows Vista editions (all except Starter and Home Basic) that support Aero, which handles drawing of content to the screen. |
DWS | Dialable Wideband Service | Alternative name for Multirate ISDN, providing dialed data connectivity at desired bandwidth on per call basis (from 128 kbps through 1.536 Mbps in 64 kbps increments). |
DX | DirectX / Direct X | Microsoft DirectX software |
dxdiag | directx diagnostics | a utility program for testing DirectX under Windows. |
DXF | Drawing Interchange Format | used for Macintosh graphic files. The standard file-exchange format for 3-D and CAD programs. |
DXI | Data Exchange Interface | A variable length frame-based ATM interface between a DTE and a special ATM CSU/DSU. The ATM CSU/DSU converts between the variable-length DXI frames and the fixed-length ATM cells. |
dyld | dynamic link editor | The library manager for code in the Mach-O executable format. The dynamic link editor is a dynamic library that “lives” in all Mach-O programs on the system. |
D-4 | A digital multiplexer used to convert 24 voice grade analog or data channels into DS1. | |
DaFont | DaFont is an archive of freely downloadable fonts. Fonts are categorized by theme, and can also be sorted by name, date, and popularity.http://www.dafont.com/ | |
dark fiber | Fiber-optic cable deployments that are not yet being used to carry network traffic. (The word "dark" refers to the fact that no light is passing through the optical fibers.) | |
dashboard | A summary view of the status of multiple service level agreements (SLAs). Or a Web page that can contain one or more viewers that graphically represent business data. | |
Daughter Board | A circuit board that plugs into a larger circuit board, or motherboard. | |
dBi | A unit that is used to represent the gain of an antenna compared to the gain of an isotropic radiator. | |
deadlock | ||
debug | To detect, diagnose, and eliminate errors in programs. Checking the logic of a program to isolate and eliminate the mistakes from a computer program or other software. | |
Decryption | The act of restoring an encrypted file to its original state. | |
Deeper Sleep | an Intel power management technology. It helps to deliver longer battery life by minimizing the power consumption of the processor during brief periods of inactivity by the user including microseconds between keystrokes. | |
Default Route | Entry in a routing table that can redirect any frames for which the table has no definitive listing for the next hop. | |
desktop | A computer designed to sit on a desk (as opposed to a laptop). In Windows, it also means the screen you see when you aren't running any programs, with "My Computer", the Recycle Bin and so on. | |
dial-up | This is a telephone line that is connected to a server. When it is called, tones are exchanged between the server and the devise calling in order to attach. | |
DICT | dictionary network protocol created by the DICT Development Group | |
Dijkstra | Algorithm sometimes used to calculate routes given link and nodal state topology database. | |
directX | A set of multimedia APIs that Microsoft provides. | |
docking (station) | A hardware device that enables a mobile computer to function as a desktop computer. | |
DoCoMo | DoCoMo (meaning "anywhere" in Japanese) is a NTT subsidiary and Japan's biggest mobile service provider | |
domain | The unique name that identifies an internet site. Domain names always have two or more parts separated by dots. | |
drag | To move an image or a window from one place on the screen to another by grabbing it with a mouse or other pointing device and pulling it to a new location. | |
dropbox | Dropbox is a Web-based file hosting service operated by Dropbox, Inc. that uses cloud storage to enable users to store and share files and folders with others. http://www.dropbox.com/ | |
dual core | a CPU structure. The difference between a single core and dual core is that a dual core system has two CPU's that are electronically wired together. These two CPU's wired together in parallel gives twice the performance than that of its single core counterpart. | |
Due diligence | the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur. | |
dump | ||
Duplex | The ability to send and receive data over the same communications line. | |
Dynamic IP | Each computer or device connected to the internet needs its own IP address. Devices and sites that are constantly connected to the internet usually have a static IP address so the DNS can reliably route traffic to the right place. |
E
E for Ethernet
abbreviation / acronyms | Term | Definition |
---|---|---|
E3 | Electronic Entertainment Expo | The annual video game conference and show at the Los Angeles Convention center. www.e3expo.com |
e- | Electronic | Electronic or online (for instance an e-zine is an online magazine published only in an electronic form). |
e-discovery | Electronic discovery | the collection, processing and review of large amounts of ESI within an enterprise to meet the mandates imposed by common law requirements for discovery. These demands may be due to civil or criminal litigation, regulatory oversight, or administrative proceedings. An independent group of consultants, legal scholars and vendors have created and put into the public domain an "E-Discovery Reference Model" ([EDRM]; www.edrm.net ) |
e-paper | Electronic paper | e-paper a range of display technology which are designed to mimic the appearance of ordinary ink on paper. |
E Phone | Emergency Phones. | telecom slang. |
E&M | recEive and transMit (or ear and mouth) | Trunking arrangement generally used for two-way switch-to-switch or switch-to- network connections. Cisco's analog E&M interface is an RJ-48 connector that allows connections to PBX trunk lines (tie lines). E&M also is available on E1 and T1 digital interfaces. |
E1 | A European digital communications line with a transmission speed of 2.048 Mbps, as defined under the E-carrier system. For DS1, 32 digital voice channels are multiplexed onto one E1 channel | |
E2 | A digital telecommunications connection category defined under the European E-carrier system. An E2 line has an aggregate capacity of 8.448 megabits per second. | |
E2E | End-to-End | Also known as "soup-to-nuts" it is an acronym for a sector of the industry that specializes in providing end-to-end solutions. |
E3 | A European digital telecommunications facility with a transmission speed of 34.368 Mbps. For DS3, 32 voice channels are multiplexed onto one E3 channel. | |
EA | ||
EAB | Enterprise Address Book | A collection of information about people, departments, and locations in an enterprise. Information about people may include telephone numbers, mailing addresses, and the department in which a person works. |
EAI | Enterprise application integration | EAI is a business computing term for the plans, methods, and tools aimed at modernizing, consolidating, and coordinating the computer applications in an enterprise. |
EAL | Evaluation Assurance Level | 4 Common Criteria certification of Watchguard firewall |
EAM | Event Aggregation Module | Tivoli Security Operations Manager module |
EAP | Extensible Authentication Protocol | a protocol for wireless networks that expands on authentication methods used by the PPP, a protocol often used when connecting a computer to the Internet. |
EAR | Emergency Assistance Request | usually an internal request within a company for technical assistance by their own support staff to assist with an end-user problem. Most of these problems are termed as BUGS by users and by the programmers as undocumented features. |
EARL | Enhanced Address Recognition Logic | a custom Catalyst 5000 family switch component similar to the learning bridge or content-addressable memory (CAM) of other types of network switches and routers |
EAS | enterprise application server | enterprise application server |
EASDAQ | European Association of Securities Dealers Automated Quotations | An electronic pan-European stock exchange founded by the Belgian Banking and Finance Commission, closely modeled on the NASDAQ exchange in the United States. In 2001, NASDAQ acquired a 58 percent stake in EASDAQ and renamed it NASDAQ Europe. |
EAT | End Around Test | Also known as a wrap test, returns output signal to input line |
EAX | Environmental Audio | A hardware and software audio standard developed by Creative Labs. It was originally used in SoundBlaster sound boards, and is supported by other companies as well now. |
EB | Exabyte | This is 2^60 bytes or 1024 petabytes. |
EBCDIC | Extended Binary Coded Decimal Interchange Code | It is also called the Extended ASCII Code. This is a common asynchronous code used by IBM. It is pronounced "ehb-suh-dik". Many corporation that have legacy applications and databases in IBM's OS/390 operating system use this code for the text files. The 8 bit character code is used to represent 256 different bit patterns. |
EBIF | Enhanced TV Binary Interchange Format | standard under the SelecTV brand announced in early 2010 |
EBML | Extensible Binary Meta Language | Simple, XML-like binary language for describing data in structured style. See http://ebml.sourceforge.net/ |
EBPP | Electronic Bill Presentation and Payment | An acronym that implies using the Internet to send, receive, and pay bills, this is considered by some people to be the next step in online banking. |
EBS | E-Business Suite | Oracle's order management hubs |
EC2 | Elastic Compute Cloud | Amazon EC2 allows customers to rent computers on which to run their own computer applications. EC2 allows scalable deployment of applications by providing a web services interface through which a customer can create virtual machines, i.e. server instances, on which the customer can load any software of their choice. |
ECB | ||
ECC | ||
ECEM | enterprise carbon and energy management | A corporatewide system of record for monitoring, managing, and reporting energy use and carbon emissions. ECEM is a Forrester term, which we feel best describes the systems' functionality and customer requirements. |
ECHS | Extended Cylinders, Heads, Sectors | Enables use of hard drives up to 8.4 GB in size |
eCI | eCommerce integrator | A service provider that offers strategy, marketing, design, and technical services for eBusiness. Technical services are custom development, commerce package implementation, and application integration, not hosting or network services. |
ECM | Enterprise content management | a set of tools and methods that obtain, organize, store and deliver information crucial to its operation. The fundamental objectives of ECM are to streamline access, eliminate bottlenecks, optimize security, maintain integrity and minimize overhead. |
ECMA | European Computer Manufacturers Association | An industry trade group headquartered in Geneva. The ECMA has developed more than 200 computer standards. |
ECMP | Equal Cost Multipath Routing | distributes traffic across multiple high-bandwidth links to increase performance. One company's OSPF implementation supports multiple equal-cost paths between points and divides traffic evenly among the available paths. |
ECO | Engineering Change Order | Hardware minor revisions, usually in the days of minicomputers, where a change wasn't made to the PCB layout (which would probably carry the major revision number/letter) |
ECP | electronic check presentment | The electronic presentation of check data to processing banks. In the first ECP phase, one bank presents a second bank with electronic check information based on the check's MICR line, which states the correct customer account and the amount of the payment. |
ECS | Extended Character Set | An industry acronym for a specialized ASCII character set. The main differences are in the control characters and the decimal character representations of decimal 128-255. |
ECTF | Enterprise Computer Telephony Forum | Brings together the best industry thinkers on the planet to deliver on a shared vision in the computer telephony industry to allow for open access to a diversity of communications products and services. See also http://www.ectf.org/ |
E_D_TOV | error detect timeout value | The time that a switch waits for an expected response before declaring an error condition. This value is adjustable in 1 microsecond increments from 2 - 10 seconds. |
ED2K | eDonkey2000 | a decentralized, mostly server-based, peer-to-peer file sharing network best suited to share big files among users, and to provide long term availability of said files. |
EDA | event-driven architecture | EDA is a software architecture pattern that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke. |
EDC | ||
EDI | electronic data interchange | The exchange of structured electronic data between computer systems according to predefined message standards. |
EDIFACT | Electronic Data Interchange For Administration, Commerce and Transport | international EDI standard developed under the United Nation, also named UN/EDIFACT |
EDO | Extended Data Output | a type of dynamic random access memory. EDO memory is much faster than DRAM because it can access more than one block of information at a time. EDO memory accesses a block of memory and as it is sending the information from one block it starts accessing another block to fetch information. |
EDGE | Enhanced Data Rates for GSM Evolution | A radio interface technology with enhanced modulation designed to provide GSM and time division multiple access (TDMA) networks with the capacity to rival third-generation (3G) cellular networks. |
EDI | Electronic Data Interchange |
The process of automating the exchange
of business information such as purchase orders, delivery notes and
invoices over a data network.
|
EDM | ||
edress | e-mail address | e-mail address |
EDS | Electronic Data Systems | A multibillion-dollar system integration and IT services firm, founded in 1962 and headquartered in Plano, Texas. Acquired by HP. |
EDW | enterprise data warehouse | enterprise data warehouse |
EEPROM /EPROM | Electrical Erasable Programmable Read Only Memory | This type of memory can be reprogrammed and erased electronically repeatedly by using a device programmer which provides an electric surge. |
EF | Expedited Forwarding | A Per-Hop Behavior in the Differentiated Service standard, used to create a virtual leased line service |
EFI | Extensible Firmware Interface | Software that runs automatically when an Intel-based Macintosh first starts up. It determines the computers hardware configuration and starts the system software. |
EFM | Enterprise fraud and misuse management | saves users money by enabling operational efficiencies, and by stopping fraud and misuse that occur across multiple channels, accounts or products |
EFT | Electronic Funds Transfer | A system where money is transferred electronically from one bank account to another, without the need for any paper work such as the traditional cheque. |
EFS | ||
EGA | Enhanced Graphics Adapter | A computer display standard that provides a resolution of 640 by 350 pixels, a palette of 64 colors, and the ability to display as many as 16 colors at one time. |
EGL | Enterprise Generation Language | A high-level language that allows developers to focus on business logic as they create complex business applications for deployment in any of several environments, including the Web. |
EGNOS | European Geostationary Navigation Overlay Service | a satellite based augmentation system developed by the European Space Agency. |
EGP | Exterior Gateway Protocol | A reachability routing protocol used by gateways in a two-level internet. EGP is used in the Internet core system. |
EH&S | Environmental, Health and Safety |
EH&S compliance systems capture product or process data according to a regulatory authority's standards, forms and procedures for compliance with laws related to occupational health and safety; hazardous materials management and product genealogy/content; and environmental management. |
EHA | Ethernet Hardware Address | MAC address, a unique identifier assigned to network interfaces for communications on the physical network segment. |
EHR | Electronic Health Record | n electronic record of health-related information on an individual that conforms to nationally recognized interoperability standards and that can be created, managed, and consulted by authorized clinicians and staff across more than one health care organization. |
EIA | ||
EIGRP | Enhanced Interior Gateway Routing Protocol | Cisco proprietary routing protocol loosely based on their original IGRP. EIGRP is an advanced distance-vector routing protocol, with optimizations to minimize both the routing instability incurred after topology changes |
EII | enterprise integration information |
data integration |
EIM | ||
EIRP | Effective Isotropic Radiated Power | The effective power radiated from a transmitting antenna when an isotropic radiator is used to determine the gain of the antenna |
EIS | enterprise information system | |
EIST | Enhanced Intel SpeedStep Technology | an advanced means of enabling very high performance while also meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. |
EJB | Enterprise JavaBeans | A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications |
EKTS | electronic key telephone set | Any key telephone with a built-in microprocessor which allows access to PBX-like features as well as access to multiple CO lines and uses two- to four-pair wiring. |
ELAN | Emulated Local Area Network | A logical network initiated by using the mechanisms defined by LANE (LAN Emulation). This could include ATM and legacy attached end stations. |
ELM | Expertise location and management | the identification of human expertise, determining the status of that resource and integrating that person into the interaction process. |
ELT | extract, load, and transform | The process of extracting data from one or more sources, loading it directly into a relational database, and then using the database engine to run data transformations. |
EMA | Enterprise Management Associates | leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. www.enterprisemanagement.com |
EMC | Electromagnetic Compatibility | capability of systems or equipment to be tested in the intended environment at designed levels of efficiency without degradation due to electromagnetic interactions |
EMF | ||
EMI | ||
EMOTICON | EMOTion ICON | A group of symbols used to indicate emotions in email or newsgroups. |
EMPI | Enterprise Master Patient Index | EMPI is a database that contains a unique identifier for every patient in the enterprise. |
EMR | electronic medical record | A system used to compile computerized patient healthcare information. EMRs generally deal with information only in the form of document images or text formatted for output to a printer or video display. |
EMS | ||
EMV | Europay-MasterCard-Visa | An emerging general payment standard for smart cards. |
ENIW | Web-enabled Ethernet Networking Interface | module presents additional remote Web capabilities by providing read/write access via the Internet. |
ENQ | Enquiry | A control character used in the ASCII code set to request identification status. |
ENS | enterprise nervous system | Gartner's term for the intelligent network that provides unifying connectivity among people, application systems and devices in different locations and business units across a virtual enterprise. |
ENTL | Electronic New Hire/Termination/Leave of Absence | electronic document used to set up new staff, termination, or leave. |
ENUM | electronic numbering / Electronic Number Mapping system |
ENUM is an IETF standard
for mapping the public telephone number address space into the DNS.
|
ENX | European Network Exchange | the communications network of the European automotive industry. www.enxo.com |
EOF | end-of-file | |
EOL | End Of Life | It usually refers to the time period of support for a software product after a new revision has been placed into use. From time to time, hardware vendors also use the term to describe a time period of support for a given hardware item. |
EoS / EoSDH | Ethernet over SONET / Ethernet Over SDH | EoS is a set of protocols which allow Ethernet traffic to be carried over synchronous digital hierarchy networks in an efficient and flexible way.Ethernet frames which are to be sent on the SDH link are sent through an "encapsulation" block to create a synchronous stream of data from the asynchronous Ethernet packets.. |
EPABX | Electronic Private Automatic Branch Exchange | refer to PABX |
ePC | electronic product code | a vision for using next-generation technology to supplant the bar code based Universal Product Code (UPC) system for identifying supply chain objects such as vehicle and pallet loads, case loads and individual articles. |
EPG(s) | electronic program guides | two-way television services |
EPIC | Explicitly Parallel Instruction Computing | designed to fully incorporate all of the features of the Itanium series of processors from Intel. The uniquely designed EPIC architecture allows the highest possible performance via new levels of parallelism for enterprise and technical applications. |
EPGs | electronic program guides | two-way television services |
EPL | Ethernet Private Line | A point-to-point service that employs dedicated SONET channels over a shared SONET infrastructure |
EPM | Enterprise Performance Management | Oracle Fusion release |
EPN | Extended Port Network | A remote switching module of a telephone switch. Different vendors use different names. EPN is specific to Avaya and Definity line of PBXs. |
ePO | EPolicy Orchestrator | McAfee tool that delivers real-time information and application integration for network, desktop, and server security |
EPO | emergency power off | A means of turning off power during an emergency, referring usually to a switch. |
EPOC | Electronic Piece of Cheese | A 32-bit operating system designed by Symbian and written in C++. It is used in mobile phones and PDAs, including PDAs manufactured by Psion. |
EPP | ||
EPR | ||
EPS | ||
EPU | Energy Processing Unit | ASUS EPU utilizes innovative technology to digitally monitor and finetune the CPU power supply with improved VR responses in heavy or light loadings. |
ERL | Echo Return Loss | A frequency-weighted measure of return loss over the middle of the voiceband (approximately 560 to 1965 Hz) where talker echo is most annoying. |
ERMS | electronic records management systems | electronic records management systems |
ERP | ||
ERR | ERRor | ERRor |
eRX | e-Prescribing | a type of computer technology whereby physicians use handheld or personal computer devices to review drug and formulary coverage and to transmit prescriptions to a printer or to a local pharmacy. |
ES-IS | End System to Intermediate System | The International Organization for Standardization's Open Systems Interconnection (OSI) protocol by which end systems announce themselves to intermediate systems. |
ESA | Enthusiast System Architecture | Nvidia ESA is the industry’s first open-standard PC monitoring and control protocol for real-time communication and control of system thermal, electrical, acoustic and operating characteristics. http://www.nvidia.com/object/nvidia_esa.html |
ESB | enterprise service bus | ESB brings flow-related concepts such as transformation and routing to a Service-Oriented Architecture. |
ESCD | Extended System Configuration Data | Setup data that is stored in a Plug-and-Play-compatible system BIOS. It consists of the system resource requirements of legacy (non-PNP) devices, and the last working configuration of Plug-and-Play-compliant devices. |
ESCON | Enterprise Systems Connection | an IBM fiber optic connection technology that interconnects S/390 mainframe computers, workstations and network-attached storage devices across a single channel and supports half duplex data transfers. |
ESDI | Enhanced Small Device Interface | This was a popular form of hard drive and controller interface before IDE took over the PC market. |
ESE | Extensible Storage Engine | Stores all active directory objects |
ESF | Extended Superframe Format | A T1 framing format that uses the framing bit to provide mainte-nance and diagnostic functions. |
ESG | Enterprise Strategy Group | an integrated, full-service IT analyst and business strategy firm, world-renowned for forward-looking market intelligence, analysis, and consulting services that deliver proven, measurable results. www.enterprisestrategygroup.com |
ESI | Edge Side Include | A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network. |
ESL | electronic shelf labels | programmable wireless electronic device that can be affixed to store shelves/shelf channels |
ESM | Enterprise Security Manager | |
ESM | Enterprise Service Management | consists of solutions and related professional services in the IT management areas |
ESN | electronic serial number | Unique identification number embedded in a wireless phone by the manufacturer to prevent fraud. |
ESP | ||
ESPN | Entertainment and Sports Programming Network | ESPN is an American global cable television network focusing on comprehensive sports coverage. http://espn.go.com/ |
ESRB | Entertainment Software Rating Board | a non-profit, independent organization established in 1994 that reviews entertainment software and web sites and assigns standardized ratings based on suitability for children. www.esrb.org |
ESS | ||
ETA | Embedded Transport Acceleration | Intel ETA is the ability to deliver high-performance server communication |
ETAS | Encrypted Transaction Audit System | This technology, developed by Computer Support Group, is used within many business websites. I-Biz and Ecommerce software are to enable security and special transaction auditing and tracking. |
etc | Essential Text Configuration | In any unix (and variants like linux) system the /etc directory |
ETC | Enhanced Throughput Cellular | Cellular modem protocol by AT&T |
ETN | electronic tandem network | A private telecommunications network in which calls are automatically switched over specific trunks. |
ETL | Extract, Transform and Load | Used to refer to sets of tools or processes for extracting data from a data warehouse, transforming data in a data warehouse or loading data into a data warehouse. |
ETRN | Extended Turn | an extension to the SMTP mail delivery protocol that allows an SMTP server to request from another SMTP server any e-mail messages it has for a specific domain. |
ETSI | European Telecommunications Standardisation Institute | produce the telecommunications standards that will be used throughout Europe and beyond. European Telecommunications Standardisation Institute |
ETTb/ETTh | Ethernet To The Business/Home | Telecommunications carrier service providing Ethernet to a business subscriber (ETTb) or home subscriber (ETTh). |
ETX | end-of-text character | The BSC transmission control character used to end a logical set of records that began with the start-of-text character. |
EUC | Extended UNIX Code | A protocol that can support sets of characters from 1 to 4 bytes in length. EUC is a means of specifying a collection of code pages rather than actually being a code page encoding scheme itself. |
EUEM | end user experience monitoring | end user experience monitoring |
EULA | End-User License Agreement | The standard license agreement delivered with each copy of a Microsoft software product, describing the software rights that pertain to the user of that particular copy |
EUP | Enterprise Unified Process | EUP is a software development methodology that helps companies create software in an structured and organized manner. It is an extension of the Rational Unified Process (RUP), adding two new development phases -- Production and Retirement. |
Eutelsat | European Telecommunications Satellite Organization | A Paris-based European satellite network operator. It offers capacity on 23 satellites for television and radio broadcasting, data networks, Internet services and mobile communications. |
EVA | Enterprise Virtual Array | enterprise storage disk array sold by Hewlett-Packard. |
EVDO | Evolution Data Only/Evolution Data Optimized | Provides fast wireless broadband 3G internet service to your lap via pcmci slot. You can take the internet with you in your car, airport, train, anywhere your service provider supports in order to surf the web at your convenience. |
EWS | Early Warning Status | System that alerts the host system if drive performance approaches unacceptable reliability levels |
EX | exchange | |
EXE | EXEcutable | common filename extension denoting an executable file (a program) in the DOS, OpenVMS, Microsoft Windows, Symbian, and OS/2 operating systems. |
EXIF | EXchangeable Image File format | Standard for storing interchange information in image files, especially those using JPEG compression. Most digital cameras now use the EXIF format. See also http://www.exif.org/ |
E-book readers | a class of devices the primary purpose of which is to enable the reading of "trade books" and other content not dependent on color, rich graphics or video. |
|
eBay | eBay Inc. (NASDAQ: EBAY) is an American internet consumer-to-consumer (c2c) corporation that manages eBay.com, an online auction and shopping website. http://www.ebay.com/ | |
Echelon | an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. Monitored transmissions are said to include up to 3 billion communications daily. | |
Eclipse | Open-source application development tools, www.eclipse.org | |
Electronic paper | several reflective display technologies that do not require a backlight and can be viewed in conditions of moderate to good ambient illumination. | |
emulate / emulation | ||
encapsulation | A software design technique in which data and procedures related to the data are undled together within a single entity, called the object. | |
encrpytion | The process of converting data into an unreadable format so that unauthorized views of the data can be blocked. | |
Erlang | In telecommunications, a unit of traffic intensity. One Erlang is the intensity at which one traffic path would be continuously occupied. | |
ethernet | Baseband LAN specification invented by Xerox Corporation and developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps. more... | |
Ethical Hacker | The dream job for a generation of hackers: A company paying you to break into its network. By simulating attacks from the net or from an internal source, ethical hackers locate weak spots in a company's network. | |
exit plan | The plan developed for coping with the end of the contract -- whether because the term is up or because termination clauses have been invoked. | |
exploit | an attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders. Used as a verb, the term refers to the act of successfully making such an attack. | |
extract | A data synopsis from a given system which is passed to another system to complete processing. | |
Extranet | ||
eyeballs | an industry term for the raw number of people who look at a website. |
F
F for Flash
abbreviation / acronyms | Term | Definition |
---|---|---|
FA | Foreign Agent | Node in a mobile IP network that enables roamed users to register on the foreign network. The FA will communicate with the HA (Home Agent) to enable IP datagrams to be transferred between the home network and the roamed user on the foreign network |
FACCH | Fast Associated Control Channel | the channel derived by preempting information in a traffic channel. It is used to send handoff and similar messages. |
FAN | File Area Network | A File Area Network (FAN) enhances standard network and storage infrastructure. FAN technology provides centralized, heterogeneous, and enterprise-wide network file management and control. |
FAQ | Frequently Asked Questions | Most Internet sites and many ISP areas will have a "FAQ" section to explain what is in the area and how to use its features. While many FAQ areas are true compilations of users' questions, some are attempts at anticipated questions. |
FAR | false acceptance rate | one of the most important specifications in any biometric system, is defined as the percentage of identification instances in which false acceptance occurs. This can be expressed as a probability. |
FARE | Film Automatic Retouching and Enhancement | Canon film scanner technology |
FASS | Fast Access Station Switching | a concept in the WiMAX network, is a method by which an MS can change its access station from frame to frame depending on the station selection mechanism. |
FAST | |
|
FAT | file allocation table | An index for mapping logical files to physical locations on a disk storage device. Each FAT entry is 16- or 32-bits long (depending on whether it is FAT16 or FAT32). |
favicon | favorites icon | A small image or icon used by most recent web browsers (Internet Explorer 5 and above). It can be displayed in a number of different places depending on which browser you're using. |
FAW | Frame Alignment Word | a unique digital word used by codecs to allow them to resynchronize to the framing structure in the event of errors. |
FAX | FACSimile | FACSimile |
FBA | fixed-block architecture | An architecture for a logical device that specifies the format of and access mechanisms for the logical data units on the device. The logical data unit is a block. |
FBD | Fully Buffered DIMM | Fully Buffered DIMM (or FB-DIMM) is a memory technology which can be used to increase reliability, speed and density of memory systems. Conventionally, data lines from the memory controller have to be connected to data lines in every DRAM module. |
FBGA | Fine-pitch Ball Grid Array | FBGA is a chip-scale package option for AMD flash devices. |
FBSS | Fast Base Station Switching | defined in the IEEE 802.16-2005 (mobile WiMAX) network, is a method to allow switching between any type of access stations |
FC / FCS | Fibre Channel (Standard) | The Fibre Channel Standard (FCS) [1] defines a high-speed data transfer interface that can be used to connect together workstations, mainframes, supercomputers, storage devices and displays. |
FC-AL | Fibre Channel Arbitrated Loop | A ring-style network topology comprising 125 nodes, usually configured as a double loop to protect the system against device failure. |
FCC | Federal Communications Commission | the agency of the U.S. government that regulates all equipment that produces radio-frequency signals, including computers. http://www.fcc.gov |
FCCH | Frequency Correction Channel | the logical channel in GSM systems used to transmit a frequency correction data burst of all "zeros". The resulting frequency shift seen by the mobile is then used for frequency correction. |
FCD | Floating car data or floating cellular data | a method to determine the traffic speed on the road network. |
FCH | Frame Control Header | a field in the IEEE802.16-2004 WIMAX protocol. The FCH specifies the burst profile and the length of one or more DL bursts that immediately follow the FCH. |
FCIP | Fibre Channel over Internet Protocol | FCIP mechanisms enable the transmission of Fibre Channel (FC) information by tunneling data between SAN facilities over IP networks; this capacity facilitates data sharing over a geographically distributed enterprise |
FCL | Framework Class Library | A collection of classes which are part of Microsoft's .NET platform |
FCoE | Fibre Channel over Ethernet | FCoE is a proposed standard designed to enable Fibre Channel communications to run directly over Ethernet. Thus, FCoE makes it possible to move Fibre Channel traffic across existing high-speed Ethernet infrastructures and extend the reach and capability of storage area networks (SANs). This ability allows organizations to protect and extend existing investments in their storage networks. |
FCP | Fibre Channel Protocol | he serial SCSI command protocol used on Fibre Channel networks. |
FCPGA | Flip Chip Pin Grid Array | the package of certain Intel Celeron, Pentium III, and Pentium 4 microprocessors. FC-PGA processors fit into Socket 370 or Socket 478 motherboard sockets. |
FCS | ||
FCSI | Fibre Channel Systems Initiative | formed by Hewlett-Packard, IBM, and Sun in 1993. |
FDD | Frequency Division Duplex | used in cellular communication systems such as GSM, is a radio technology using a paired spectrum. |
FDDI | Fiber Distributed Data Interface | A standard for transmitting data on optical fiber cables at a rate of around 100,000,000 bits-per-second (10 times as fast as 10-BaseTEthernet, about twice as fast as T-3). |
FDE | Full-disk encryption | FDE is encryption at the hardware level. FDE works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to “undo” the conversion. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. |
FDM | ||
FDS | Fraud Detection System | VeriSign's product, acquired by Symantec in the middle of 2010 |
FDX | Full Duplex | Simultaneous two-way communication path. |
FE | ||
FEC | Fast Etherchannel | A proprietary technology developed by Cisco that creates a team of two to four 10/100 Ethernet adapters or ports to increase transmission and reception throughput. |
FEC | Forward Error Correction | Sending redundant data so that if data loss occurs, data recovery is possible without retransmission |
FECN | Forward Explicit Congestion Notification | A bit sent by a frame relay network to notify an interface device (DTE) that congestion avoidance procedures should be initiated by the receiving device |
FEFO | First Ended, First Out | A message ordering in which, among messages of the same priority level, the messages which are finished first will be transmitted first. |
FEMA | Failure mode and effects analysis | provide an analytical approach, when dealing with potential failure modes and their associated causes. |
FEP | Front-End Processor | telephony and computer term. A FEP communications computer associated with a host computer that manages the lines and routing of data through the network. |
FER | Frame Erasure/Error Rate | a measure of the number of frames of data that contained errors and could not be processed. FER is usually expressed as a percentage or exponent. |
FERPA | Family Educational Rights and Privacy Act | federal legislation in the US that protects the privacy of students' PII. The act applies to all educational institutions that receive federal funds. |
FET | field effect transistor | A transistor in which the current between a source terminal and a drain terminal is controlled by a variable electric field. |
FEXT | Far End Cross Talk | This is a term used in network cable troubleshooting. It is a displayed symptom of electrons traveling the network and bouncing around there for lack of anywhere else to go. |
FFD | Flicker Free Display | A computer screen that has a fast enough refresh rate that no flicker can be detected; this kind of display is easier on the eyes. |
FFPF | fairly fast packet filter | an alternative platform for network monitoring under Linux. It is a stream-based networking subsystem for Linux that spans from hardware to userspace to offer high-speed communication paths to all applications. |
FFT | Fast Fourier Transform | an efficient algorithm to compute the discrete Fourier transform (DFT) and its inverse. FFTs are of great importance to a wide variety of applications, from digital signal processing to solving partial differential equations to algorithms for quickly multiplying large integers. |
FGA/B/C/D | feature group A/B/C/D | The different types and qualities of public switched network connection between local telephone companies and long distance companies. |
FHS | Fan Heat-Sink | Fan Heat-Sink, see also HSF. |
FHSS | Frequency Hopped Spread Spectrum | a spread-spectrum method of transmitting signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is used in WLAN 802.11 physical layer. |
FICON | Fiber Connection | IBM's fiber optic channel technology that extends the capabilities of its previous fiber optic channel standard, ESCON. |
FIDNET | Federal Intrusion Detection Network | extensive computer monitoring system, developed by the Federal Bureau of Investigation (FBI), to protect U.S. government and private data networks from being attacked by terrorists or hostile foreign governments. |
FIFO | first in, first out | A network queuing method, wherein data packets are dealt with in a simple queue on a first-come, first-served basis. No packets are given preferential treatment; all are queued in the order in which they are received. |
FIGS | Figures Shift | A control character used in the Baudot Code to enable the printing of symbols and numbers by actually allowing a physical shift of the carriage. |
FIM | federated identity management | an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group. The use of such a system is sometimes called identity federation. |
FINDDEST | Find Destination | An internal service in IMS used for finding certain IMS resources, most of which represent IMS destinations. For searches other than CVBs and CCBs, if the block is not found, then if requested, a search for an LU 6.2 descriptor is made. |
FINRA | Financial Industry Regulatory Authority | an association that regulates its members through the adoption and enforcement of rules and regulations governing business conduct of member firms. www.finra.org |
FiOS | Fiber Optic Service |
FiOS is a data communications service
provided by Verizon that uses fiber optic cables to transfer data. FiOS
is called a "Fiber to the Premises," or FTTP service, since it brings
fiber optic data transmission to residential homes as well as
businesses.
|
FIPS | Federal Information Processing Standards | Standards that are publicly recognized by the U.S. Federal Government; also for use by non-government agencies and contractors. |
FIR | Finite Impulse Response | a technique used to characterize electrical circuits and networks in the time domain. |
FIRST | Forum of Incident Response and Security Teams | A nonprofit volunteer group whose goal is to foster cooperation and coordination in incident prevention across diverse sectors, and prompt rapid reaction to incidents. Through an annual conference and its Web site at www.first.org |
FISMA | Federal Information Security Management Act | defines a comprehensive framework to protect government information, operations, and assets against natural or humanmade threats. FISMA was signed into law part of the Electronic Government Act of 2002. |
FIX | Financial Information Exchange | A messaging standard for the electronic exchange of securities transactions. FIX is a public-domain specification owned and maintained by FIX Protocol, Ltd. |
FLAC | Free Lossless Audio Codec | a popular free audio compression codec that is lossless. Unlike lossy codecs such as MP3 and AAC, it does not remove any information from the audio stream and is suitable both for everyday playback and for archiving audio collections. http://flac.sourceforge.net/ |
FLAG | Fiber Link Around the Globe | An undersea fiber-optic cable network connecting Europe to the Asia/Pacific region. It became operational in 1997. |
FLOGI | fabric login | The process by which a device gains access to the fabric. |
FLOPS | Floating Point Operations Per Second | A slightly more meaningful measure of processor speed than MIPS. Computers essentially work with integer numbers. Decimal values are harder to process, particularly if the figures after the decimal point are not fixed. |
FM | Frequency Modulation | A process by which, say, music is transmitted using a radio signal. Input audio-frequency signals modify the frequency of the transmitted signal around its nominal value. |
FM-200 | Firemaster / Fire Master 200 | Fire Master (FM-200) is gas-based fire suppression systems |
FMA99 | Financial Services Modernization Act of 1999 | Signed into U.S. law in November 1999, this legislation — also known as the "Gramm-Leach-Bliley Act," after the senators who sponsored it — allowed many financial institutions to engage in a broader spectrum of activities. |
FMC | fixed-mobile convergence |
FMC is the trend towards seamless
connectivity between fixed and wireless telecommunications networks. The
term also describes any physical network that allows cellular telephone
sets to function smoothly with the fixed network infrastructure.
|
FMEA | Failure Mode and Effects Analysis | analytical methods used to identify potential weaknesses. FMEA is mainly employed in the design and development of new products and processes. |
FMH | function management header | |
FMV | Full-Motion Video | Video that runs at the same rate at which it was filmed. Moving video images and sound available on a computer; usually stored on CD-ROM because of the large size of the files. |
FOC | Field Oriented Control | Field Oriented Control |
FoIP | Fax Over Internet Protocol | enables the transmission of fax messages over a VoIP line. In this technology, every digital message is distributed into various packets and then relayed through the Internet. |
FOIRL | FiberOptic InterRepeater Link | Fiberoptic communication signaling methodology based loosely on the IEEE 802.3 fiberoptic specification and 10Base-F guideline. FOIRL is a forerunner of the 10Base-FL specification, which is designed to enhance and replace it. |
FOMA | Freedom of Mobile Multimedia Access | the brand name for the 3G services being offered by Japanese mobile phone operator NTT DoCoMo. FOMA was the world's first W-CDMA 3G service when launched in 2001. |
FOP | Formatting Objects Processor | an XSL-FO processor written in Java, which provides the feature to convert XSL-FO files to PDF or direct-printable-files. |
FORTRAN | formula translation | the oldest computer language in the world. It is typically compiled and is quite fast. Its primary drawbacks are portability and ease-of-use -- often different FORTRAN compilers on different platforms behave quite differently in spite of standardization efforts in 1966 (FORTRAN 66 or FORTRAN IV), 1978 (FORTRAN 77), and 1991 (FORTRAN 90). |
FOSS | Free and open source software | software developed by informal collaborative networks of programmers. The source code is licensed free of charge, encouraging modifications and improvements. |
FOSSIL | Fido Opus Seadog Standard Interface Layer | Fido Opus Seadog Standard Interface Layer |
FOT | Fiber Optic Terminal | Connects optical fiber to copper wire. |
FOTS | Fiber Optic Transmission System | Fiber Optic Transmission System |
FPA | Floating Point Accelerator | Special hardware for performing mathematical calculations with floating point numbers; the FPA may function as a coprocessor to the central processing unit. |
FPP | Full Product Package | Full Product Package. |
FPS | frames per second | A video transmission metric. |
FPA | Function point analysis | a method used to gauge the size and complexity of computer software, employing a function point as a unit of measure. Function points are a unit measure for software size, much like an hour is to measure time. |
FPE | Forefront Protection for Exchange | a e-mail security software solution that runs on Exchange |
FPGA | Field Programmable Gate Array | A microchip that can be made with thousands of programmable logic gates. FPGAs are often used for prototype or custom designs, including DSP and logic emulation. |
FPM | Fast Page Mode | A kind of DRAM memory. Fast page mode improved upon the original page mode memory by eliminating the column address setup time during the page cycle. |
FpML | Financial Products Markup Language | A programming language — based on XML — introduced by J.P. Morgan and PricewaterhouseCoopers in June 1999. |
FPS | Flexible Payments Service | Amazon's payment services |
FPU | floating point unit | a part of a CPU specially designed to carry out operations on floating point numbers. Not all CPUs have a dedicated FPU. |
FQDN | Fully Qualified Domain Name | The official name assigned to an individual computer. |
FR | frame relay | A network technology that transmits data packets at high speeds across a digital network encapsulated in a transmission unit called a frame. It requires a dedicated connection during the transmission period. It is used on wide area networks and also in private network environments with leased lines over T1 lines. |
FRAD | Frame Relay Access Device | A combination of hardware and software that is used to convert communications packets from formats like TCP, SNA, IPX, and others into frames that can then be sent over a frame relay network. |
FRAG (21) | Financial Reporting & Auditing Group Guidelines | Financial Reporting & Auditing Group Guidelines |
FRDS | Failure Resistant Data Systems | term from the RAID advisory board which describes server systems which are designed to protect against data loss due to any single component failure within the system and against loss of data to single disk failure. |
FRED | Fair Random Early Detection | A variation of Random Early Detection (RED) |
FreeBSD | Free Berkeley Software Distribution | a Unix-like free operating system descended from AT&T UNIX via the BSD branch through the 386BSD and 4.4BSD operating systems. It runs on processors compatible with the Intel x86 family, as well as on many other processors such as AMD64 and PowerPC processors. |
freeware | free software | several kinds of computer software that can legally be copied and given free of charge to other users |
FRR | fast retransmit and recovery | congestion control algorithm that makes it possible to quickly recover lost data packets. |
FRS | File Replication Service | A service on Windows Servers (2000 and later) that is responsible for replicating policies and scripts to clients. |
FRU | field-replaceable unit | An assembly that is replaced in its entirety when any one of its components fails. |
FSAA | Full Screen Anti-Aliasing | A method used by 3D graphics cards to provide anti-aliasing to all objects in a 3D environment. This acts to smooth out the jagged appearance of edges on some 3Dobjects. |
FSAM | Federated Storage Area Management | HP naturally scalable environment of pooled, federated (i.e., available when needed), modular, multivendor storage resources |
FSB | frontside bus | The FSB connects the computer's processor to the system memory (RAM) and other components on the motherboard. These components include the system chipset, AGP card, PCI devices, and other peripherals. |
FSM | finite state machine | a model of behavior composed of states, transitions and actions. A state stores information about the past, i.e. it reflects the input changes from the system start to the present moment. |
FSML | Financial Services Markup Language | A language developed by the Financial Services Technology Consortium to control the identification and processing of electronic checks. |
FSMO | Flexible Single Master Operations | a feature of Microsoft's AD. The schema master FSMO role holder is the domain controller responsible for performing updates to the directory schema. |
FSN | Full-Service Network | A video network that makes it possible for the television to work like a computer, through the use of special equipment; users have access to video, home shopping, interactive games, and other services. |
FSS | File system server | The StorNext File System term for the computer that manages metadata in a SAN. In Xsan, this is called a metadata controller. |
FSSS | Fast Serving Station Switching | refers to the serving station switching with which a Moble Station (MS) can change its serving station from frame to frame depending on the serving station selection mechanism. |
FSPF | fibre channel shortest path first | A routing protocol used by fibre-channel switches. |
FSTC | Financial Services Technology Consortium | A nonprofit organization whose membership includes banks, government agencies, universities, and high-tech businesses; FSTC is interested in developing e-commerce and making it practical. www.fstc.org |
FTA | failure to acquire | a biometrics term that is used to describe a biometric system's failure to extract usable identification data from a biometric sample. |
FTAM | File Transfer Access and Management | The International Organization for Standardization's OSI remote file service and protocol |
FTDS | Failure Tolerant Data Systems | term from the RAID advisory board which describes server systems which must offer continuous data availability in the event of any single system component failure. |
FTNS | Fixed Telecommunication Network Services | FTNS are telecommunications services provided between fixed points. |
FTP | File Transfer Protocol | |
FTTB | Fiber to the building |
This technology involves bringing fiber
all the way to the building. Inside the building,
signals would be carried over the existing copper wire or
coaxial cable, or over optical fiber.
|
FTTN | Fiber to the neighborhood |
This technology involves bringing fiber
into the neighborhood. From there, signals would be
carried to businesses and residences via the existing
copper wiring.
|
FR | Frame Relay |
A technology for transmitting data
packets in high-speed bursts across a digital network encapsulated in a
transmission unit called a frame. Frame relay requires a dedicated
connection during the transmission period.
|
FTAM | File Transfer, Access, and Management | an application layer protocol for file transfer and remote manipulation (ISO 8571). |
FTBFS | Fails To Build From Source | Fails To Build From Source in computer programming |
FTL | Flash Translation Laye | new software layer that redirects each update to an empty block which is already erased and copies other valid data to a new location. |
FTP | File Transfer Protocol |
The usual way you send files to your
server (or receive some). Using FTP, you can also update (delete,
rename, move, and copy) files at a server. People who create Web home
pages use FTP to get their files to the server where they will be
accessed.
|
FUD | Fear, Uncertainty, and Doubt | A set of sales tactics employed by market leaders to cast aspersion on competing computer products. |
FUSC | Fully Used SubChannel | also known as Fully Used SubCarrier, is a method used in the WiMAX network that uses all the subchannels and employs full-channel diversity by distributing the allocated subcarriers to subchannels using a permutation mechanism. |
FW | Firewall | A boundary that helps keep computers on the Internet private. Firewall software helps prevent users from coming to a secure site, or conversely, keeps users inside the firewall from going out. Firewalls can also verify websites, helping to ensure they originate from an authorized source. |
FWA | Fixed wireless access | also known as wireless local loop, is a wireless system in which office or home users directly connect with the switching center of the telecommunications carrier or the inter-exchange channel to use the system. |
FX | foreign exchange | |
FXO | Foreign Exchange Office | An FXO interface connects to the PSTN central office and is the interface offered on a standard telephone. Cisco's FXO interface is an RJ-11 connector that allows an analog connection at the PSTN's central office or to a station interface on a PBX. |
FXP | ||
FXS | Foreign Exchange Station | An FXS interface connects directly to a standard telephone and supplies ring, voltage, and dial tone. Cisco's FXS interface is an RJ-11 connector that allows connections to basic telephone service equipment, keysets, and PBXs. |
face recognition | A biometric technique that uses the geometry of a person's face to authenticate identity. Limited deployments, such as those for check cashing, are in place. | |
failover | Failover is a backup operational mode in which the functions of a system component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. | |
FastIP | An IP switching protocol developed by 3Com. Fast IP differs from other IP switching in that the end user initiates the process, not a router or switch. | |
Fault-tolerance | Ability of a system or component to continue normal operation despite equipment failures, power outages or other catastrophic events. | |
Federation | A technical approach where one security domain has a system to authenticate users and another security domain has a system that trusts the authenticating system | |
female connector | A cable connector that has holes and plugs into a port or interface to connect one device to another. | |
fetch | The process of 'fetching' a data or instruction item from memory and writing it to a register. The 'fetched' item is then either executed (instruction), or acted upon (data). | |
fiber optics | A technology that transmits infrared and visible light frequencies through strands of glass or plastic fiber. | |
File extension | .gif .txt .doc .log etc. are all examples of file extensions. These are the letters after the period in a file name that indicates the type of file. | |
FileZilla | FileZilla is free, open source, cross-platform FTP software, consisting of FileZilla Client and FileZilla Server. Binaries are available for Windows, Linux, and Mac OS X. It supports FTP, SFTP, and FTPS (FTP over SSL/TLS). http://filezilla-project.org/ | |
Finger | ||
Fire Fighting | Desperately working to fix bugs to avoid being fired. | |
firewire | technology that allows a computer to have an almost unlimited number of devices running without using up all the hardware interrupts. the registered trademark of Apple's IEEE 1394 digital connection. | |
Firmware | A computer program or software stored permanently in PROM or ROM or semi-permanently in EPROM. Software stored in PROM, ROM or EPROM; essential programs that remain even when the system is electrically turned off. Firmware is considerably easier to modify than hardware but more permanent than software stored on disk or volatile memory. |
|
five 9s | The five 9s of accuracy: 99.999% accuracy | |
flash | ||
flatrate | pricing plan for Telco | |
flooding | An attack that attempts to cause a failure in (especially, in the security of) a computer system or other data processing entity by providing more input than the entity can process properly. | |
footer | A formatting style designated in HTML by a specific tag and used at the end of an HTML file. | |
forest | A collection of one or more domain trees with a common schema and implicit trust relationships between them. | |
fork | ||
frame | ||
Frixo | UK road travel reporting website, that provides our users with the most up-to-date road traffic information. Our data is updated every 5 minutes using sensors placed on motorways and common A / B roads. www.frixo.com | |
fuzzy logic | a formal system of reasoning developed by Lotfi Zadeh in which the values “true” and “false” are replaced by numbers on a scale from 0 to 1. |
G
G for gateway
abbreviation / acronyms | Term | Definition |
---|---|---|
G | giga | Prefix for 10 power 9 (or, in IT parlance, 2 power 30) |
G2C | Government to Citizen | Lagan's underlying platform for the Government CRM solution for contact centers and citizen self-service |
GAIA | GUI Application Interoperability Architecture | GAIA is acronym of GUI Application Interoperability Architecture |
GAMS | General Algebraic Modeling System | high-level modeling system for mathematical programming problems. The program itself consists of a language compiler and a group of integrated solvers. |
GAP | Groups, Algorithms and Programming | A System for Computational Discrete Algebra, with particular emphasis on Computational Group Theory. http://www.gap-system.org/ |
GAPE | Google Apps Premier Edition | Google's web-based messaging and collaboration apps require no hardware or software and need minimal administration, creating tremendous time and cost savings for businesses. http://www.google.com/apps/intl/en/business/details.html |
GARP | Generic Address Resolution Protocol | An IEEE standard for a generic method by which various devices (e.g., clients, servers, and bridges) can automatically disseminate attribute information across a bridged LAN. GARP is a Layer 2 (i.e. Data Link Layer) protocol used extensively in VLANs. |
Gas | GNU Assembler | the default GNU Compiler Collection (GCC) back-end and is used to compile Linux and other operating systems such as the GNU operating system. It is a part of the GNU Binutils package. It runs and assembles on and for a number of different architectures. |
gb | Giga bit | 1,024 megabits or 1 billion information bits. |
GB | Gigabyte | Approximately 1 billion bytes of data (actually 1,073,741,824 bytes) |
GBIC | GigaBit Interface Converter | A transceiver that converts between electrical and optical signals for high-speed networking |
GBP | group buffer pool | A coupling facility cache structure that is used by a data sharing group to cache data and to ensure that the data is consistent for all members. |
Gbps | gigabits per second | A measure of data transmission speed |
GCC | GNU Compiler Collection | the free compiler that made the free Linux operating system possible. The GCC C/C++ language tools support the cross-compiler requirements for a number of target processors families and their variants. |
GCD | Grand Central Dispatch | a technology for executing asynchronous tasks concurrently. GCD is available in Mac OS X v10.6 and later and is not available in iPhone OS. |
GCGID | graphic character global identifier | A 4- to 8-character alphanumeric identifier assigned to a registered graphic character. Each graphic character that is to be assigned a code point must have a GCGID. |
GCI | General Communication Inc. | a telecommunications corporation operating in Alaska http://www.gci.com/ |
GD&T | geometric dimensioning and tolerancing | a symbolic language used on engineering drawings and computer generated three-dimensional solid models (CAD) for explicitly describing nominal geometry and its allowable variation. |
GDB | GNU debugger | GNU debugger |
GDI | Graphics Device Interface | GDI provides a common set of drawing routines (including both text and graphics). The GDI can be used to draw to most devices, such as screens, printers, plotters or bitmap images. Central to the GDI is the concept of a Device Context (DC) which is a handle to the specific device to be written to. |
GDM | global delivery model |
the model of applications testing services |
GDP | Gateway Discovery Protocol | Gateway Discovery Protocol |
GDPS | Geographically Dispersed Parallel Sysplex | An application that integrates Parallel Sysplex technology and remote copy technology to enhance application availability and improve disaster recovery. |
GDS | Global data synchronization | consists of technology and applications used to receive, approve and manage product, price, forecast, promotion and contract data from suppliers via the GDSN, in support of standards from the Global Commerce Initiative. |
GDSN | Global Data Synchronization Network | Global Data Synchronization Network |
GDTs | Global data types | The enterprise service interface is defined based on standard data types, and GDTs are the basic data building blocks. |
GEAR | Gigabyte Enhanced Agp Riser | Used to provide AGP support for PCI-E motherboards |
GEDCOM | GEnealogical Data COMmunication | A common file format used to exchange computerized genealogical data between different genealogy programs. |
GEMMS | Global Enterprise Manufacturing Management System | A process manufacturing product once offered by Datalogix (which was acquired by Oracle in 1997). |
GEnie | General Electric Network for Information Exchange | An online service from GE Information Services, with news, sports, business, computer technical support, games, software downloads, reference services, chat, bulletin boards, email, and fax. |
GEO / GEOS | Geo-Stationary Earth Orbit System | A system that communicates with satellites in geosynchronous orbit some 22,300 miles above the earth. |
GEOS | graphic environment operating system | a lightweight OS with a GUI. It runs on several different processors, including the 65xx, the x86 and numerous different PDAs, embedded devices, and hand-held machines. |
GERAN | GSM(GPRS)/EDGE Radio Access Network | the 3GPP standards for GSM(GPRS)/EDGE radio access, which has been specified to connect the A, Gb and Iu interfaces to the CN (Core Network). The architecture allows two BSS (Base Station Subsystem) to be connected to each other. |
gfortran | GNU Fortran compiler | GNU Fortran compiler is part of the GNU compiler collection. http://gcc.gnu.org/fortran/ |
GFP | Generic Framing Procedure | a multiplexing technique defined by ITU-T G.7041. This allows mapping of variable length, higher-layer client signals over a transport network like SDH/SONET. |
GFS | Grandfather, Father, Son | Backup methodology |
GGP | Gateway-gateway protocol | protocol on the Internet. |
GGSN | Gateway GPRS Support Node | a gateway from a cellular network to an IP network that allows mobile cell phone users to access the public data network (PDN) or specified private IP networks. |
GHC | Glasgow Haskell Compiler | also known as Glorious Haskell Compiler, is an open source native code compiler for the functional programming language Haskell which was developed at the University of Glasgow. |
Ghost | General Hardware-Oriented Software Transfer | a disk cloning program, originally produced by Binary Research, but purchased by Symantec in 1998. |
GIAC | Global Information Assurance Certification | Certification programs designed to serve the people who are or will be responsible for managing and protecting important information systems and networks. See also http://www.giac.org/ |
GiB / gib | gibibyte | 1,073,741, 824 bytes. 1024 mebibytes. |
GID | group identification number | A 4 byte, unsigned integer (GID) that is used to identify a group profile. |
GIF | Graphic Interchange Format | A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG. |
GIFT | GNU Image Finding Tool | a Content Based Image Retrieval System (CBIRS). The GIFT is based on Viper, the result of a research effort at the Vision Group at the computer science center of the University of Geneva. The GIFT is an open framework for content-based image retrieval. It is designed to accommodate new ways of querying the framework. |
GIGO | Garbage In, Garbage Out. |
It means that if invalid data is entered
in a computer program, the resulting output will also be invalid. So
if a program asked you to enter a letter of the alphabet and you
decided to be funny and enter "3.14159", there's a good chance the
results you would get back would be pretty messed up, or "garbage."
Because we computer users aren't always smart enough to enter valid
data, programmers have to take extensive mesaures to prevent GIGO
errors.
|
GIMP | Gnu Image Manipulation Program | Freely distributed piece of software suitable for such tasks as photo retouching, image composition and image authoring. See www.gimp.org |
GINA | Graphical Identification and Authentication | the subsystem that handles the logon presentation to the user. The Microsoft GINA is represented by the logon screen that pops up on the PC when the user presses Ctrl+Alt+Delete. |
GINI | Gateway Interface for Network Initialization | A process on large Enterprise systems to set up an entire network from another network. |
GIOP | General Inter-ORB Protocol | A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages. |
GIS | Geographical Information System |
A computer application involving maps and the storage and manipulation of data associated with them.
|
GIX | Global Internet eXchange | A routing exchange point that helps networks all over the world to connect to the Internet. |
GKTMP | Gatekeeper Transaction Message Protocol | A proprietary Cisco protocol used for communication between the Cisco IOS Gatekeeper and external applications. |
GLA | Generic Log Adapter | A tool that allows generic data collection from multiple heterogeneous data sources by converting individual records and events into the Common Base Event format. |
GLB / GLBA | Gramm-Leach-Bliley (Act) | covers the financial services industry, basically defining financial institutions as depository institutions and their holding companies, security firms and broker/dealers. |
GLONASS | Global Navigational Satellite System | A satellite-based geographic-location system run by the Russian government. |
GLPK | GNU Linear Programming Kit | a software package intended for solving large-scale linear programming (LP), mixed integer programming (MIP), and other related problems. |
GLUT | openGL Utility Toolkit | a window system independent toolkit for writing OpenGL programs. It implements a simple windowing API for OpenGL |
GMA | Gmail Drive | A free shell namespace extension ("add-on") for Microsoft Windows Explorer, makes it possible to create a new network share on the workstation. In order to use this add-on, you need a Gmail account from Google Gmail. |
GMM | GPRS Mobility Management | a GPRS signaling protocol that handles mobility issues such as roaming, authentication, and selection of encryption algorithms. |
GMR | Giant Magneto Resistance | A technology for a read/write head which uses thin film layers to get a greater change in resistance, and is more sensitive than MR (Magneto Resistance). |
GMRP | Garp Multicast Registration Protocol | It allows a device to declare membership of a Layer 2 multicast group |
GMRS | General Mobile Radio Service | GMRS has been transformed from the now antiquated Class A section of the Citizens Radio Service to the personal radio service available for conducting an individual's personal and family communications. |
GMS | ||
GMSK | Gaussian Minimum Shift Keying | a modulation technique involving Gaussian filtering of the input data prior to its application to the phase modulator. |
GMX | Global Mail eXchange, in Germany: Global Message eXchange | GMX Mail is a German-based free webmail service provided by GMX.http://www.gmx.com/ |
GNAT | GNU NYU Ada Translator | the GNU Ada Compiler based on GNU Compiler Collection (GCC). The front-end and runtime are written in Ada, and are licensed using the General Public License. |
GNN | Global Network Navigator | A collection of free services on the Internet, including The Whole Internet Catalog, the Internet Help Desk, and NetNews. |
GNOME | GNU Network Object Model Environment | the most popular graphical desktop environment for Linux, based on the X WINDOW SYSTEM and similar in look and feel to Windows 95 and 2000 |
GNSO | Generic Names Supporting Organization | ICANN Supporting Organization responsible for developing policy for the DNS gnso.icann.org |
GNU | GNU's not Unix | An ongoing project by the Free Software Foundation to create a free, freely distributable, set of UNIX like utilities.
Relevant links: |
GOCA | Graphic Object Content Architecture | An architecture that provides a collection of graphics values and control structures used to interchange and present graphics data. |
GOLC | Growth Opportunity License Charge | An IBM software pricing program. |
GOMS | Goals, Operators, Methods, and Selection rules | a kind of specialized human information processor model for human computer interaction observation. |
GOPS | Giga (billion) Operations Per Second | A unit of measurement of computing speed. |
GOS | Grade of Service | a measure of the success a subscriber is expected to have in accessing a network to complete a call. |
GOSIP | Government OSI Profile | A standard issued by the National Institute of Standards and Technology. GOSIP specifies the details of an interoperable OSI configuration for networking products procured by the U.S. government. |
GOW | Gears of War God of War | Gears of War is a military science fiction third-person shooter video game developed by Epic Games and published by Microsoft Game Studios. http://www.gearsofwar.com/ God of War is an action adventure video game for the PlayStation 2 first released by Sony Computer Entertainment's Santa Monica division in March 2005. http://www.godofwar.com/ |
GPF | General Protection Fault | an error that arises in Microsoft Windows when a program tries to access a location in memory that is not allocated to it. GPFs are usually caused by programming errors such as uninitialized pointers. |
GPL | General Public License | Normally taken to the mean the GNU GPL. A license statement from GNU, used on most of their software and on many free software packages from other sources. www.gnu.org/copyleft/gpl.html - Full text of the GNU General Public License. |
GPIO | general-purpose I/O | Customizable input/output pins on a microcontroller. |
GPO | Group Policy Object | In the Windows 2000 operating system, a GPO is a collection of settings that define what a system will look like and how it will behave for a defined group of users. Microsoft provides a program snap-in that allows you to use the Group Policy MMC. |
GPRS | general packet radio service | GPRS is a packet-oriented overlay to GSM networks supporting connection- and connectionless-oriented services and diverse quality-of-service mechanisms. The theoretical maximum speed is 171.2 Kbps, but real-life user throughput is expected to be 56 Kbps or less. |
GPS | ||
GPSL | General Purpose Scripting Language | General Purpose Scripting Language |
GPSS | General Purpose Simulation System | A powerful general purpose simulator which provides a wide range of capacities for discrete system modeling. |
GPU | Graphics Processing Unit | Like the CPU (Central Processing Unit), it is a single-chip processor. However, the GPU is used primarily for computing 3D functions. |
GPWW | group practice without walls | An umbrella organization for a group of independent physician practices that performs certain business operations, such as technology procurement. |
GRC | governance, risk and compliance | GRC reflects a new way in which organizations can adopt an integrated approach to these three areas. |
GRCM | GRC management | the management, measurement and reporting of IT controls, and the distribution and attestation of policies, compliance reporting and risk assessment. |
GRC.SQ | Governance, Risk Management, Compliance, Security, and Data Quality | used often by Data Governance and Data Quality programs to acknowledge the interdependencies of these five disciplines in managing data. |
GRE | generic routing encapsulation | Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. |
grep | global-regular-expression-print | a UNIX utility that allows the user to search one or more files for a specific string of text and outputs all the lines that contain the string. |
GROW | GNU Remote Operations Web | An architecture for building networked applications and services using WWW. |
GRT | Granular Recovery Technology | a single-pass backup while maintaining full DR and individual email, folder or mailbox restores |
GSAM | generalized sequential access method | A database access method that allows batch application programs to access a sequential data set record that is defined as a database record. |
GSC | Gecko System Connect | a bus used in many of the HP 9000 workstations and servers. The GSC bus was 32-bit and reached 40MHz in its final iterations. |
GSI | Gigascale Integration | Gigascale integration is a long-term goal of making chips with billions of components on them. |
GSK | Global Security Kit | A toolkit for managing digital certificates used in implementing Secure Sockets Layer (SSL) security. |
GSM | Global System for Mobile communication |
Acronym for the digital cellular radio
system based on pan-European specifications. Originally stood for
Groupe Speciale Mobile, now Global System for Mobile communication.
|
GSO | global sign-on | A flexible single sign-on solution that enables the user to provide alternative user names and passwords to the back-end Web application server. |
GSR | Gigabit Switch Router | A family of router products from Cisco Systems. |
GTL | Gunning Transceiver Logic | A low-power standard for electrical signals used in CMOS circuits which allows for low electromagnetic interference at high speeds of transfer. |
GTM | ||
GTP | GPRS Tunneling Protocol | protocol used by the GPRS backbone network for packet switching. GTP is a protocol defined on both the Gn and Gp interfaces between GSNs in a GPRS network. |
GTS | Generic Traffic Shaping | A mechanism to control the traffic flow on a particular interface. |
GTT | Global Title Translation | GTT is a process that allows dialed digits to be translated into a network node address and an application address. The process is performed in the SS7 network by the STP. |
GUA | graphical user authentication | A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a GUI. |
GUI | Graphical User Interface |
Pronounced goo-ee. A pictorial 'front end' program to
simplify the operation of computers like the IBM PC and the Apple
Macintosh. Documents are stored in pictures ('icons') of drawers or
filing cabinets (which represent files or directories in disk drives).
|
GUID | Globally Unique Identifier | a 128-bit number used by Microsoft WINDOWS to identify a user, software component, or other entity. GUIDs are most often written as groups of hexadecimal digits in braces. |
GUTBN | Globally Unique Time Based Number | applies to a "code" that is unique in all the world. Globally unique time based numbers are globally unique identifiers (GUID) that you can create by yourself and that are registered for you. |
GVN | Global value numbering | compiler optimization based on the SSA intermediate representation. It sometimes helps eliminate redundant code that common subexpression evaluation (CSE) does not. |
GVPN | Global Virtual Network Service | Global Virtual Network Service is a multi-network international service proposed by the ITU. GVNS allows service providers to offer subscribing customers a service with features and functionality similar to that of a private network without requiring the customers to purchase and manage the networks. |
GVRP | Generic VLAN Resolution Protocol | a GARP application that provides registration services in a VLAN context. |
GVU | Graphic, Visualization, and Usability | Graphic, Visualization, and Usability |
GWEN | Ground Wave Emergency Network | communications system that the US military constructs. It operates in a very-low-frequency range, with transmissions between 150 and 175 kHz. |
GWT | Google Web Toolkit | Open source Java software development framework that makes writing AJAX applications like Google Maps and Gmail easy for developers who don't speak browser quirks as a second language |
GXA | Global XML Web Services Architecture | an announcement by Microsoft in 2002 of several proposals for extensions to SOAP. Some of the components of GXA were developed into standards in combination with other companies, including IBM. |
GXS | Global eXchange Services |
delivers global B2B e-commerce integration solutions www.gxs.com |
gzip | GNU zip | a GNU free software file compression program. It was created by Jean-loup Gailly and Mark Adler. gzip is based on the DEFLATE algorithm, which is a combination of LZ77 and Huffman coding. |
G.7xx | A series of ITU standards for voice and data communications. e.g. G.703: Specifications for plesiochronous digital hierarchy | |
gain | Gain refers to the ratio of the output amplitude of a signal to the input amplitude of a signal. This ratio typically is expressed in dBs. | |
gateway | ||
Gesture Recognition | involves determining the movement of a user's fingers, hands, arms, head or body in three dimensions through the use of a camera; or via a device with embedded sensors that may be worn, held or body-mounted. | |
Ghost site | a Web site that remains live but is no longer updated or maintained or only done so very infrequently. | |
Go Daddy | Go Daddy is an Internet domain registrar and Web hosting company that also sells e-business related software and services. http://www.godaddy.com/ | |
googling | searching through the Google search engine | |
Googol | 1 googol = 10 raised to the power 100. The number was named in 1983 by Milton Sirotta after his uncle (the mathematician Edward Kasner) asked him to think up a name for the number. The search engine Google is rumoured to be named as a play on the word Googol. | |
green IT | Technology assets, services, and operational best practices that allow organizations to reduce harmful environmental impacts while at the same time achieving their financial and risk imperatives within and outside of IT. | |
Grid computing | applying the resources of many computers in a network to a single problem at the same time - usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. | |
groupware |
|
H
H for http
abbreviation / acronyms | Term | Definition |
---|---|---|
h-menu | Hierarchical menu | A pull-down menu that has sub-menus. The sub-menus are indicated by arrows. Putting the pointer on the item that has an arrow opens up the sub-menu. |
H/S LAN | High-Speed Local-Area Network | A LAN operating at 4 Mbits per second or more to facilitate rapid exchange of files, mail, etc., within a broader departmental or divisional environment. |
H&H | Hoot & Holler | A dedicated point-to-point voice facility between international offices of a trading facility. |
H3C | (previous) Huawei Technologies—3Com | HP company, supplier of routers, Ethernet switches, wireless LAN, security and Voice/Video over IP and network management systems www.h3c.com |
HA | high availability | |
HAAT | Height Above Average Terrain | a measure of an antenna's height above average terrain. This value is used by the FCC in determining compliance with height limitations and transmitting powers for high sites. |
HACMP | High-Availability Cluster Multi-Processing | Software that provides host clustering, so that jobs are moved to other hosts within the cluster if one host fails. |
Hactivism | from "hack" and "activism" | the concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message. |
HAD | Holographic Autostereoscopic Display | Simple conversion of LCD technology, replacing the LCD's backlight with an HOE (holographic optical element) |
HADR | high availability disaster recovery | A disaster recovery solution that uses log shipping and provides data to a standby system if a partial or complete site failure occurs on a primary system. |
HAE | Height Above Ellipsoid | Vertical difference between a reference ellipsoid model and the known, or derived, elevation at a given spatial location (typically in meters). |
HAL | Hardware Abstraction Layer | A translation protocol in Windows NT for porting NT to another platform. |
HAN | home area network | a network contained within a user's home that connects a person's digital devices, from multiple computers and their peripheral devices to telephones, VCRs, televisions, video games, home security systems, "smart" appliances, fax machines |
HARC | Hitachi Asynchronous Remote Copy | A remote copy function for HDS storage products. HARC allows movement of large amounts of data over any distance with full data integrity and minimal impact on performance. |
HARQ | Hybrid Automatic Repeat reQuest | a sheme wherein information blocks are encoded for partial error correction at receiver and additional, uncorrected errors are retransmitted. |
HASP | Houston Automatic Spooling Program | A mainframe spooling program that provides task management, job management, and data management functions. |
HAT | Heap Analysis Tool | Tool for tracking down heap problems in Java programs |
HAVi | Home Audio Video interoperability | a vendor-neutral audio-video standard aimed specifically at the home entertainment environment. |
HBA | host bus adapter | An adapter used to connects a host computer to a storage network. |
HCI | ||
HCL | Hardware Compatibility List | A list of computers and peripherals that have been tested by Microsoft to work with Windows NT or Windows 2000. |
HCM | human capital management | Social software covers a range of functionality, from wikis and blogs to social networks and social bookmarking. |
HCO | High-Capacity Optical | HCO drives use blue-laser technology and standard 120-millimeter CD/DVD-size discs for as much as six times the capacity of traditional 5.25-inch magneto-optical (MO) technology. |
HCR | Huffman Codeword Reordering | MPEG-4 Audio Error Resilience (ER) technique that avoids error propagation within spectral data |
HCT | hardware compatibility tests | A suite of tests from WHQL to verify hardware and device driver operations under a specific operating environment. These tests exercise the combination of a device, a software driver, and an operating system under controlled conditions. |
HD / HDD | Hard Disk Drive | permanent storage medium used on computers. A HDD consists of a number of rigid discs that store all of the computer programs and data on the computer, even when the power to the computer is switched off. |
HD DVD | high-density DVD | a high-density optical disc similar to, but not compatible with, BLU-RAY DISC, formerly marketed by Toshiba but discontinued in 2008. |
HDA | Head Disk Assembly | The mechanical parts of a disk drive, including the read/write heads, platters, and other non-electronic components. |
HDCP | High-bandwidth Digital Content Protection | a specified method from Intel for protecting copyrighted digital entertainment content that uses the DVI by encrypting its transmission between the video source and the digital display (receiver). |
HDLC | High Level Data Link Control | An ITU-TSS link layer protocol standard for point-to-point and multi-point communications. |
HDMI | High-Definition Multimedia Interface | HDMI is a digital interface whose purpose is to permit the transmission of audio and video signals through a single cable, while supporting faster data rates than its normal counterparts. http://www.hdmi.org/ |
HDML | Handheld Device Markup Language | Specifications allow Internet access from wireless devices such as handheld personal computers and smart phones. |
HDR | header label | |
HDR | host-discovered resource | A set of storage hardware resources that are attached to a host system and are available on the operating system. |
HDS | Hitachi Data Systems | A vendor of enterprise and modular storage systems and software. HDS is a wholly owned subsidiary of Tokyo-based electronics firm Hitachi, Ltd. |
HDSL | High bit-rate Digital Subscriber Line | Provides repeaterless digital transmission at 2Mbit/s for about 12000 feet (4km) over twisted pair. |
HDTP | Handheld Device Transport Protocol | It presents the HDML to the HDML interpreter in an appropriate format. Developed by HTTP://WWW.PHONE.COM for use in wireless applications. |
HDTV | High Definition television |
High Definition television means broadcast of television
signals with a higher resolution than traditional formats allow. It's a
step change in television technology which provides far clearer and
more detailed pictures than normal "standard definition" TV.
|
HDx / HD | Half duplex | A device can either receive or send data at a given time. |
HE-AAC | High Efficiency Advanced Audio Coding |
Lossy data compression scheme for streaming audio. It combines three techniques: AAC, Spectral Band Replication (SBR), and Parametric Stereo (PS) |
HEC | Header Error Control | Using fifth octet in ATM cell header, ATM equipment may check for error and correct contents of header. Check character is calculated using CRC algorithm allowing single bit error in header to be corrected or multiple errors to be detected. |
HEL | Hardware Emulation Layer | This provides software-based emulation of features that are not directly available in hardware. |
HEP | horizontal enterprise portal | A portal that serves a broad population of users across an enterprise — unlike a VEP, which serves only a specific segment of this population |
HERF | high energy radio frequency | A HERF gun is used to disrupt digital equipment such as computers by blasting them with HERF emissions. |
HFC | Hybrid Fiber Coax | second generation cable TV infrastructure. HFC networks combine both optical-fiber and coaxial cable lines. Optical fiber runs from the cable head end to neighborhoods of 500 to 2,000 subscribers. |
HFS | Hierarchical File System |
HFS is the file system used for
organizing files on a Macintosh hard disk. When a hard disk is
formatted for a Macintosh computer, the hierarchical file system is
used to create a directory that can expand as new files and folders are
added to the disk.
|
HFS+ | Hierarchical File System Plus | The Mac OS Extended file-system format. This format was introduced as part of Mac OS 8.1, adding support for filenames longer than 31 characters, Unicode representation of file and directory names, and efficient operation on very large disks. |
HGFS | Host-Guest File System | VMware's name for the guest-visible aspect of a Shared Folder. |
HGML | Hypertext General Markup Language | A formatting code for marking up text files, which makes up part of SGML. |
HHO | Hard Hand Off | used in CDMA systems, describes a hand-off involving a frequency change. |
HHT | Hand-Held Terminal | Hand-held programming terminal to communicate with a programmable logic controller (PLC) on the fly |
HID | ||
HIDAM | hierarchical indexed direct access method | A database access method used for indexed access to records in a hierarchic direct organization. It provides indexed access to the root segments and pointer access to subordinate segments. |
HIDS | Host based Intrusion Detection System | A system for detecting unauthorised access to a single computer. A HIDS may monitor logs or activity on network ports, or use other techniques to detect possible intrusions |
HiFD | HIgh-capacity Floppy Disk | Sony term. |
HighMAT | High-performance Media Access Technology | a set of standards co-developed by Microsoft and Matsushita (Panasonic) for CDs and DVDs that are created on personal computers but played back on consumer electronic devices such as CD players and DVD-equipped television sets. |
HIL | Hardware-in-the-Loop | applications used by design and test engineers to evaluate and validate vehicle components during development of new systems |
HIMEM | HIgh MEMory | A DOS and Windows extended memory manager. |
HIP | Host Identity Protocol | host identification technology for use on IP networks, such as the Internet. |
HIPAA | Health Insurance Portability and Accountability Act | An act passed by the U.S. congress in August 1996. HIPAA's directives call for the use of EDI in healthcare transactions, and for protecting the privacy of patient healthcare information. |
HiPerLinks | High-Performance Links | A high-speed coupling-link technology introduced by IBM in 1997 for its S/390 mainframes. |
Hiperspace | High-Performance Space | Introduced with ESA/370, a hiperspace is, in essence, an address space occupied only by data and to which access is controlled by hardware via special instructions. |
HIPPI | HIgh Performance Parallel Interface | A high-speed communications bus used with supercomputers or high-speed LANs. |
HIS | healthcare information system | A system or application used to manage hospital or other healthcare-related operations (such as financial, registration, scheduling and back-office functions); also called a "hospital information system." |
HISAM | hierarchical indexed sequential access method | A database access method used for indexed access to records in a hierarchic sequential organization. |
HITECH | Health Information for Economic and Clinical Health | Act collectively refers to the health information technology provisions included at Title XIII of Division A and Title IV of Division B of the ARRA. |
HIToolbox | Human Interface Toolbox | A collection of procedural APIs that apply an object-oriented model to windows, controls, and menus for Carbon applications. |
HKCC | HKey_Current_Config | Windows NT Registry key |
HKLM | HKey_Local_Machine | Windows NT Registry key |
HL7 | Health Level 7 | HL7 is a standard interface for exchanging and translating data between computer systems. HL7 is also a not-for-profit organization accredited by the American National Standards Institutes (ANSI) that develops standards for data transfer. http://www.hl7.org/ |
HLA | High Level Architecture | a general purpose architecture for distributed computer simulation systems. Using HLA, computer simulations can communicate to other computer simulations regardless of the computing platforms. |
HLLAPI | High Level Language Application Programming Interface | used with IBM mainframes to allow PC's to communicate with the mainframe using an emulator. |
HLR | Home Location Register | a database residing in a local wireless network that checks the identity of a local subscriber. HLR contains information about subscribers to a mobile network and registers subscribers for a particular service provider. |
HMA | High Memory Area | Method to access the first 64kB segment above the 1MB boundary in DOS/Windows 16-bits |
HMD | Head Mounted Display | A helmet with stereoscopic goggles for the wearer's eyes, and stereo headphones over the ears; used as an interface through which the wearer can experience a virtual reality environment. |
HMP | Hybrid Multiprocessing | refers to a kind of multitasking which provides some elements of symmetric multiprocessing, using add-on IBM software called MP/2. IBM OS/2 supports HMP. |
Honeynet | A network of honeypots. | A network of honeypots. |
HOSED | Hardware Or Software Error Detected | General error not yet diagnosed. |
HP | ||
HPA | High Performance Addressing | A kind of display used on some multimedia notebook computers, that delivers high-quality graphics comparable to Active Matrix (TFT) Displays. |
HPB | High Ping Bastard | Network multiplayer games attribute |
HPC | High Performance Computing | HPC is a generic and relative term since the desktop computers of today are capable of the same performance as supercomputers from a few years back. |
HPF | High Pass Filter | a telephony term. A signal filter which would be installed in a customer premises ADSL modem (ATU-R), which only allow higher frequency data to be delivered to the modem. |
HPFS | High Performance File System | The file system for IBM OS/2. |
HPGL | Hewlett-Packard Graphics Language | HP Language to describe vector graphics (usually for plotters) |
HPIB | Hewlett Packard Interface Bus | Is a version of GPIB (also known as IEEE.488) and was used on Hewlett Packard (Now Aligent Technologies) lab equipment. Early versions used a different connector |
HPNA | Home Phoneline Networking Alliance | An alliance to advance technologies for high-speed local-area networking over conventional phone wires. It was founded in 1998 by 3Com, AMD, AT&T Wireless Services, Compaq, Conexant Systems, HP, IBM, Intel, Lucent and Tut Systems. |
HR | horizontal rule | tag used in HTML to indicate a horizontal rule. |
HR/DSSS | High Rate/Direct Sequence Spread Spectrum Physical Layer | the enhanced physical layer defined by IEEE 802.11b which supports data transfer at up to 11Mbps. |
HRAA | High Resolution Anti Aliasing | Technology found in the nVidia GeForce3 Chip |
HRC | Hitachi Remote Copy | A controller-based remote-copy capability used in Hitachi Data Systems storage products. |
HRMS | human resource management system | Business applications for the management of human resource (HR) transactions, best practices and enterprise reporting. Functions typically include core HR tracking, payroll and benefits. |
HRPD | High Rate Packet Data | also known as TIA/EIA IS-856 or 1xEV-DO, is a packet data protocol in the 3G mobile communicaitons network based on CDMA2000. |
HPR | High-Performance Routing | IBM's technology to enable users to send SNA traffic over frame and cell-based networks, making for more efficient communications. |
HSB / HSV | Hue, Saturation, Brightness (or Value) | HSV is a way of defining a colour based on a colour wheel. Hue measures the angle around the colour wheel. The saturation indicates the radius on the colour wheel so indicates the proportion between dark to pure colour to white. Value indicates the brightness. |
HSCSD | High Speed Circuit Switched Data | a circuit-linked technology for higher transmission speeds -- up to 57 kilobits per second -- primarily in GSM systems. |
HSD | High Speed Data | Interface normally using V.35 or EIA53 standards. |
HSDPA | High-Speed Downlink Packet Access | also called 3.5G, a packet-based data service in W-CDMA downlink with data transmission up to 8-10 Mbit/s (and 20 Mbit/s for MIMO systems) over a 5MHz bandwidth in WCDMA downlink. |
HSF | ||
HSIL | Host Side Igmp Library | Cisco term |
HSM | ||
HSO | Hot Spot Operator | A company that sets up and operates commercial hot spots in cafes, airports, hotels, train stations, convention centers and office buildings. An HSO typically installs one or more access points and an access control device along with a high speed Internet connection to the location. |
HSR | Horizontal Scan Rate | The number of scan lines displayed per second on a computer monitor, expressed in kHz. |
HSRP | Hot Standby Router Protocol | Provides high network availability and transparent network topology changes. HSRP creates a Hot Standby router group with a lead router that services all packets sent to the Hot Standby address. The lead router is monitored by other routers in the group, and if it fails, one of these standby routers inherits the lead position and the Hot Standby group address. |
HSS | Home Subscriber Service | a key component in the IP Multimedia Subsystem (IMS), refers to a system including the master user database and software that supports IMS network entities that handle calls and sessions. |
HSSDC | High Speed Serial Direct Connect | A type of connector used on Fibre Channel optical cables. |
HSSI | High Speed Serial Interface | Standard for a serial interface at high speeds (64 Kbps and higher up to 52 Mbps) between DTE and DCE equipment over very short distances. Used for a physical connection between a router and a DSU. |
HSUPA | High-Speed Uplink Packet Access | part of the specifications for 3GPP Release 6. It improves upstream data bit rates on 3G systems and complements High-Speed Downlink Packet Access (HSDPA), theoretically up to a maximum 5.8 Mbps uplink data rate at the cell level. |
HT | ||
HTC | formerly High Tech Computer Corporation | a Taiwan-based manufacturer of smartphones http://www.htc.com/ |
HTML or HTM | HyperText Markup Language |
The coding language used to create Hypertext documents
for use on the world wide web. HTML looks a lot like old-fashioned
typesetting code, where you surround a block of text with codes that
indicate how it should appear. Additionally, in HTML you can specify
that a block of text, or a word, is linked to another file on the
Internet.
|
HTML5 | HyperText Markup Language 5 | a whole set of new elements that make it much easier to structure pages, which commenced in 2004, is currently being carried out in a joint effort between the W3C HTML WG and the WHATWG. |
HTT | Hyper-Threading Technology | Implementation of simultaneous multithreading on Intel Pentium 4, Mobile Pentium 4, and Xeon processors |
HTTP | HyperText Transport Protocol |
The protocol for moving hypertext files across the
internet. Requires a HTTP client program on one end, and an HTTP server
program on the other end. HTTP is the most important protocol used in
the world wide web (WWW).
|
HTTPS | Secured HTTP or HTTP Secure | An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet. |
HTTPS | HTTP over SSL | A Web protocol for secure transactions that encrypts and decrypts user page requests and pages returned by the Web server. |
HUD | Head Up Display | A display that is usually projected to a position where the user only has to look up to see. |
HURSE | Hasp Unit Record SErvice | IBM term. To get a punch or print of your cards |
HWS | high watermark setup | A method to allocate a minimum number of unique device types that fulfill the requirements for each job step. Devices used in one step can be released and used again in later steps. |
HXRC | Hitachi Extended Remote Copy | A remote-copy function for Hitachi Data Systems storage products. HXRC uses an asynchronous copy approach to deliver high data integrity with minimal disruption and performance impact to the primary system. |
Hz | hertz | A unit of frequency equal to one cycle per second. |
H.x | A series of computing standards from the ITU. e.g. H.323: a standard in 1996 to promote compatibility in videoconference transmissions over IP networks. | |
Hack / hacker | ||
Handshake | Exchange of predetermined signals between two devices establishing a connection. | |
hard-coded | Referring to instructions that are written directly into a program and therefore cannot be easily modified, rather than instructions that can be modified by a user. | |
Hardening | Hardening is the process of identifying and fixing vulnerabilities on a system. | |
Haptic | Haptic is the science and physiology of the sense of touch. more... | |
hash | A scrambled, or encrypted, form of a password or other text. | |
header | A formatting style designated in HTML by a specific tag and used to set titles and subtitles apart from plain text. | |
heat sink | A metal plate on some processors that helps dissipate heat. | |
Heuristics | Heuristics means 'rule based'. Normally, for an Anti-Virus product to detect a virus, the virus must have been seen before, analyzed and detection added to the signature update files. | |
hex dump | a hexadecimal view of computer data, from RAM or from a file or storage device. | |
hi5 | hi5 is a social networking website based in San Francisco, California. http://hi5.com/ | |
hit | As used in reference to the world wide web, hit means a single request from a web browser for a single item from a web server | |
honeypot | a trap for people who tamper with computers maliciously through the Internet, just as a pot of honey traps flies. | |
host | ||
hot potato routing | A form of routing in which the nodes of a network have no buffer to store packets in before they are moved on to their final predetermined destination. | |
Hot Swap | A hot swap is the replacement of a hard drive, CD-ROM drive, power supply, or other device with a similar device while the computer system using it remains in operation. The replacement can be because of a device failure or, for storage devices, to substitute other data. | |
Hotmail | Windows Live Hotmail, formerly known as MSN Hotmail and commonly referred to simply as Hotmail, is a free web-based email service operated by Microsoft. http://www.hotmail.com/ | |
hotspot | A wireless Internet connection available for public use. Beyond mere convenience, hotspots offer broadband Internet access with connection speeds similar to cable and DSL. While some hotspots charge for access, more and more are opening their networks for free. | |
hourglass | In computing, especially by means of the Windows operating system, an icon that replaces the pointer when the computer is performing a function and cannot receive new input. | |
hub | Generally, a term used to describe a device that serves as the center of a star-topology network. | |
Human Augmentation | sometimes referred to as "Human 2.0", creating cognitive and physical improvements as an integral part of the human body. | |
hunting | ||
Hybrid network | A hybrid network is one that doesn't just rely on a singly type of bearer or leased line. | |
Hype Cycle | A Gartner model designed to help clients make intelligent decisions about when to implement emerging technologies. | |
Hypertext | Generally, any text that contains links to other documents - words or phrases in the document that can be chosen by a reader and which cause another document to be retrieved and displayed. | |
hypervisor | a form of control software layer that enables multiple operating systems to run on the same physical hardware. The oldest hypervisor is IBM's VM — but this only runs on S/370-style hardware (where it hosted MVS, VSE, and other operating systems). |
I
I for IP address
abbreviation / acronyms | Term | Definition |
---|---|---|
I²C | Inter-Integrated Circuit | a multi-master serial computer bus invented by Philips that is used to attach low-speed peripherals to a motherboard, embedded system, or cellphone. The name is pronounced eye-squared-see or eye-two-see. |
I/O | Input/Output | Input/Output |
I2 | Internet2 | next-generation Internet refers to consortium and government efforts to define a next-generation high-speed Internet with strong educational tools. |
I2C | Inter-Integrated Circuit | 2-wire bus developed by Philips Semiconductors in the early 1980's for efficient inter-IC communications. |
IA-32/64 | Intel Architecture - 32/64 | acronym used in the names of Intel processor architectures. |
IaaS | integration as a service | integration as a service |
IAB | Internet Architecture Board (previous Internet Activities Board) | The group that administrates the development of the Internet suite of protocols TCP/IP. The IAB has two investigative task forces, the IRTF and the IETF. http://www.iab.org/ |
IAD | integrated access device | A network device that collects multiple types of traffic (such as voice, data or video) at an enterprise site for transmission over a service provider's network. |
IAM | Identity and Access Management | IAM is an authoritative association of people with identifiers such as ID numbers and ID cards, access credentials such as usernames/passwords and authorization to access data and services. Identity and access management is fundamental for providing access to university services. |
iAMT | Intel Active Management Technology | Hardware-based technology for remotely managing and securing PCs out-of-band |
IANA | Internet Assigned Numbers Authority | they manage IP address space, root nameservers and domain names among other things. They're being replaced by ICANN. http://www.iana.org/ |
IAP | Internet Access Provider | a company that provides access to the Internet. IAPs generally provide dial-up access through a modem and PPP connection, though companies that offer Internet access with other devices |
IAS | Internet Authentication Service | a RADIUS Server which performs connection authentication and accounting for remote access. |
IAT | Inside Air Temperature | This is used in the electronics industry to mean the ambient air temperature of the air mass within the unit in discussion. |
IB | Interface Bus | IB stands for Interface Bus |
IBM | International Business Machines | Known informally as "Big Blue," IBM is one of the largest, most well-known corporations that designs and manufactures computer systems, software, networking systems, storage devices, and microelectronics. www.ibm.com |
IBG | interblock gap | |
IBO | industry business unit | SAP's Public Services Solution Management |
IBR | intelligent browser referencing | Web acceleration function |
IBS | Internet Banking System Group |
IBS is term for Internet Banking System |
IBSG | Internet Business Solutions Group |
Cisco IBSG, company's global consultancy, helps CXOs from the world's largest public and private-sector organizations solve their most pressing challenges. |
IBT | ||
IC | ||
ICA | ||
ICANN | Internet Corporation For Assigned Names and Numbers |
The ICANN is an non-profit corporation
that is responsible for allocating IP address and managing the domain
name system. Every computer connected to the Internet, from servers to
home PCs, has an IP address. http://www.icann.org/
|
ICC | Internet Commerce Corporation | Provides business-to-business electronic commerce services like Internet EDI, EDI fax, web commerce, infosafe document management and subsidiary services. www.icc.net |
ICCs | integration competency centers | SOA COEs, ICCs rely on metadata repositories and service registries to help them manage the ever-changing SOA and integration scenarios. |
ICDL | International Computer Driving Licence | The ICDL Foundation works to promote an International certification of industry-standard computing skills. See http://www.ecdl.com |
ICE | ||
ICF | Internet Connection Firewall |
ICF is a Windows XP feature that
protects computers connected to the Internet from unauthorized access.
When ICF is enabled, Windows keeps a log of incoming requests from
other systems on the Internet. If the request is something the user has
requested, like a Web page, the transmission will not be affected.
|
ICI | ||
ICM | incentive compensation management | applications automate functions for calculating and reporting on commissions and associated variable compensation methods for sales channels |
ICMP | Internet Control Message Protocol |
When information is transferred over the Internet, computer systems send and receive data using the TCP/IP
protocol. If there is a problem with the connection, error and status
messages regarding the connection are sent using ICMP, which is part of
the Internet protocol.
|
ICMS | incentive compensation management system | A system that provide the sales manager with decision support tools to model various compensation scenarios, measure the impact of those plans on sales performance and effectively communicate incentive compensation objectives |
ICP | Internet Content Provider | ICP license is a permit issued by the Chinese Ministry of Industry and Information Technology to permit China-based websites to operate in China. The ICP license numbers for Chinese websites can often be found on the bottom of the front webpage. |
ICPP | Intel Channel Partner Program | a program that provides benefits and support to registered members selling Intel products, or solutions based on Intel products. The ICPP provides its members with resources and support to help build, promote, sell, and service Intel technologies. |
ICQ | I Seek You | Instant messenger program |
ICRA | Internet Content Rating Association | an organization that promotes voluntary labeling of the content of web pages so that filter software can prevent access to objectionable sites. See www.icra.org. |
ICS | ||
ICSA | International Computer Security Association | International Computer Security Association |
ICSI | Institute for Clinical Systems Improvement | ICSI is a non-profit organization that brings together diverse groups to transform the health care system so that it delivers patient-centered and value-driven care. http://www.icsi.org/ |
ICT | information and communication technology | A categorical term sometimes used (particularly in Europe) to refer the combined fields of computing and communications. More commonly, "information technology" (IT) is used in this sense, since the latter term, by definition, includes both types of technology. |
ICU | International Components for Unicode | an Open Source set of C/C++ and Java libraries for Unicode and software internationalization support. For information, see http://www.icu-project.org/ |
ID | identifier | |
IDA | (Verizon) Internet Dedicated Access | Verizon's IDA offers permanently open, high bandwidth, dedicated connections to a global Internet backbone network via access circuits |
IDARS | integrated document archive and retrieval system | IDARS is a consolidated system for
storing, accessing, managing, distributing and viewing fixed content, which includes print-stream-originated reports, images and other fixed content. |
IDC | Internet data center | A data center containing Internet-related facilities for the use of enterprises, Internet service providers, ASPs, e-commerce companies and other firms. IDSs typically provide server outsourcing, hosting and colocation services, Internet connectivity, VPNs, and other network and transport services. |
IDD | international direct dial / dialing | The placement of international calls by dialing them directly, rather than using operator assistance. |
IDE | ||
IDEA | International Data Encryption Algorithm | Patented, symmetric block cipher that uses a 128-bit key and operates on 64-bit blocks. |
I-DEAS | Integrated-Design Engineering Analysis Software | a CAD/CAM software package of SDRC which was bought in 2002 by EDS and now merged into UGS's product NX (Unigraphics). |
IDEMA | International Disk drive Equipment and Materials Association | International not-for-profit trade association that represents the Hard Disk Drive (HDD) industry and its infrastructure. See also http://www.idema.org/ |
iDEN | integrated digital enhanced network | A Motorola-enhanced mobile radio network technology that integrates two-way radio, telephone, text messaging, and data transmission into a single network. |
IDIM | Identity Information Management | A set of principles, practices, policies, processes and procedures that are used within an organization to manage identity information and realize desired outcomes concerning identity |
IDIOT | Intrusion Detection In Our Time | Project to develop a new approach to efficient misuse detection methods. Its design made use of a new classification of intrusion methods based on complexity of matching and temporal characteristics |
IDIQ | indefinite delivery/indefinite quantity; | Contracts that enable government customers to buy IT services from pre-selected vendors at pre-negotiated rates. These contracts, developed and administered by individual government organizations to meet their own IT service requirements, are usually available to all federal agencies for a small administrative fee. |
IDL | Interface Definition Language | A language used to describe the interface to a software component or routine in a manner that is not dependent on a particular programming language or operating system. |
IDM | Internet Download Manager | IDM is a tool to increase download speeds by up to 5 times, resume and schedule downloads. http://www.internetdownloadmanager.com/ |
IDOL | Intelligent Data Operating Layer | heart of Autonomy's infrastructure |
IDOM | integrated document and output management | Gartner's term for an integrated collection of technologies, architectures and services aimed at applying the value of information in documents to business practices. IDOM takes a digital approach to reducing the burden and cost of paper-based documents. |
IDQ | Informatica Data Quality | Informatica Data Quality Solution delivers pervasive data quality |
IDR | Intelligent Disaster Recovery | Backup exec option for tape-based system recovery |
IDS | intrusion detection system | |
IDT | (originally) International Discount Telecommunications | a telecommunications and energy company headquartered in Newark, New Jersey. http://www.idt.net/ |
iDTV | Interactive digital television | A digital television broadcast linked to a return path that enables consumers to send and receive individualized messages in real time on their television set. |
IDU | interface data unit | interface data unit |
IE | Internet Explorer | Microsoft Internet Explorer. cf IE4, IE5, IE6, MSIE. |
IEC | www.iec.ch. |
|
IEE | Institution of Electrical Engineers | See them at HTTP://IEE.ORG |
IEEE | Institute of Electrical and Electronics Engineers |
An organization of engineers,
scientists and students involved in electrical, electronics and
related fields. IEEE 802 standard is the most widely recognized in the
computer industry. See also: http://www.ieee.org/
|
IES | Integrated Environmental Solutions | The IES SketchUp plug-in is a toolbar that sits within the Google SketchUp application and gives direct access to all of Integrated Environmental Solutions (IES) building simulation tools. |
IETF | Internet Engineering Task Force | This subgroup of the Internet Society is responsible for recommending protocols and procedures used over the Internet. It comprises representatives from vendor, government and academic communities, and is divided into six subcommittees. http://www.ietf.org/ |
IFB | Internet Free/Busy | Microsoft Outlook feature |
iFCP | Internet Fibre Channel Protocol | an emerging protocol dealing with backup and storage. It is a gateway-to-gateway protocol for the implementation of a Fibre Channel fabric in which TCP/IP switching and routing elements replace Fibre Channel components. |
IFL | Integrated Facility for Linux | an IBM mainframe processor dedicated to running the Linux operating system, with or without z/VM. |
iFrame | inline frame | a browser feature that enables an HTML page to be displayed within its own rectangle anywhere on another HTML page. When necessary, inline frames contain horizontal and vertical scrollbars to enable users to view all of the page's contents within the frame. |
IFRS | International Financial Reporting Standards | principles-based Standards, Interpretations and the Framework (1989)[1] adopted by the International Accounting Standards Board (IASB). |
iGEMS | Integrated Global Enterprise Management System | AT&T system correlates network events to predict and solve potential problems before they impact clients’ applications. |
IGF | Internet Governance Forum | a multi-stakeholder forum for policy dialogue on issues of Internet governance. Its establishment was announced by the UN Secretary General in July 2006. It first convened in October/November 2006. |
IGMP | Internet Group Management Protocol | The TCP/IP protocol that permits Internet hosts to take part in IP multicasting. It is an efficient means of broadcasting messages to groups of end-stations |
IGP | interior gateway protocol | A type of network protocol used by interior routers to move information within an autonomous system or group of networks under the control and authority of a single entity. IGPs transfer packets from one network to an adjacent one. |
IGRP | Interior Gateway Routing Protocol | Kind of IGP which is a distance-vector routing protocol invented by Cisco, used by routers to exchange routing data within an autonomous system |
IGS | IBM Global Services | IBM Global Services |
IHS | Integrated Heat Spreader | The top surface of the IHS is designed to be the interface for contacting a HS/HSF. Allows more effecient heat transfer out of the package to an attached cooling device. Transform non-uniform heat from the die to the top of the IHS for more uniform spread |
IHV | Independent hardware vendor | a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. |
IIOP | Internet Inter-ORB Protocol | a protocol that extends TCP/IP by adding CORBA defined messages for objects to connect to each other over the network. |
IIS | Internet Information Server | Microsoft's Hypertext Transport Protocol (HTTP) server, originally packaged with the Windows NT operating system. |
IKE | Internet Key Exchange | an IETF standard approach to exchanging keys for communications, typically used with implementations of IPSec. |
ILEC | Independent Local Exchange Carrier | These companies are the historical "Independents" who operate a local telephone business. |
ILEs | Immersive learning environments | learning situations that are constructed using a variety of techniques and software tools including game-based learning, simulation-based learning and virtual worlds. |
ILM | ||
iLO | Integrated Lights-Out | Remote management feature on HP servers. |
ILP | initial loader program | reads an existing file containing database records; also called a boot-loader |
IM | ||
IMAC | installations, moves, adds and changes | General term for the routine work performed on computer equipment in an enterprise, including installations, relocations and upgrades |
IMAP | Internet Message Access Protocol |
It is a method of accessing e-mail
messages on a server without having to download them to your local hard
drive. This is the main difference between IMAP and another popular
e-mail protocol called "POP3." POP3 requires users to download messages
to their hard drive before reading them. The advantage of using an
IMAP mail server is that users can check their mail from multiple
computers and always see the same messages.
|
IMAPI | Image Mastering Application Programming Interface | Allows an application to stage and burn a simple audio or data image to CD-R or CD-RW devices |
IMC | Center |
management/visibility and integration of traditionally separate management tools |
IME | Input Method Editor | A program that performs the conversion between keystrokes and ideographs or other characters, usually by user-guided dictionary lookup. |
IMEI | International Mobile Equipment Identifier | Unique code given to mobile phones to identify them. The code is locked to the phone and not the sim. |
IMS | ||
IMSI | International Mobile Subscriber Identity | A unique number within the SIM card that identifies the subscriber to the system |
IMUX | Inverse Multiplexer | Inverse Multiplexer |
INAP | Intelligent Network Application Protocol | Allows applications to communicate between various nodes/functional entities of an intelligent network. The protocol defines the operations required to be performed between nodes/functional entities for providing intelligent network services |
INC | International Network of Crackers | one of the premier cracking/releasing warez for the IBM PC during the very late 1980s and early 90s. |
InfoSec | Information Security | Protection of information to insure confidentiality, integrity, and availability. |
INI file | initialization file | Commonly used in Microsoft Windows 3.x and earlier, INI files have been used by both the operating system and individual applications to store persistent settings related to an application, driver, or piece of hardware. |
Inmarsat | International Maritime Satellite Organization | A global mobile satellite communications operator with headquarters in London. Originally formed as an intergovernmental organization, Inmarsat became a limited company in 1999. |
INTAP | Interoperability Technology Association for Information Processing | The technical organization that officially develops Japanese OSI profiles and conformance tests |
Intel | INTegrated ELectronics | CPU market leader. |
InterNIC | Internet Network Information Center |
he InterNIC is an organization created
by the National Science Foundation to provide Internet information and
domain name registration services. While the InterNIC was started as a
joint effort between Network Solutions and AT&T, it is now run by
the Internet Corporation For Assigned Names and Numbers (ICANN).
|
IOA | input/output adapter | |
IOCA | Image Object Content Architecture | |
IOD | in-order delivery | In fibre-channel technology, a parameter that, when set, guarantees that frames are either delivered in order or dropped. |
iODBC | Independent Open DataBase Connectivity | Open source, platform independent implementation of both the ODBC and X/Open specifications. It is rapidly emerging as the industry standard for developing solutions that are language, platform and database independent. See also http://www.iodbc.org/ |
IOM | Integrated Object Model | a set of object-based interfaces to features or services that are provided by Base SAS software. IOM enables application developers to use industry-standard programming languages, programming tools, and communication protocols to develop client programs that access these services on IOM servers. |
IONL | Internal Organization of the Network Layer | The ISO/OSI standard for the architecture of the network layer. The IONL divides the network layer into subnetworks interconnected by convergence protocols (internetworking protocols), resulting in a catenet or internet |
IOP | Interoperability | Ability of equipment from different manufacturers (or different implementations) to operate together. |
IOPS | Input/Output operations per second | Input/Output operations per second. |
IoS | Internet over Satellite | This technology allows a user to access the Internet via a satellite that orbits the earth. From a fixed position (also referred to as GEOS), the statellite is able to maintain a reliable connection to the antennas on the earth. It orbits the earth at the exact speed of the earth's rotation. |
IOS | international operator services (IOS Telecom) Internetwork Operating System |
call center operator-services providers in the U.S. http://www.iostelecom.com/ the software used on the vast majority of Cisco Systems routers and current Cisco network switches. |
IOTP | Internet Open Trading Protocol | an IETF specification which defines a way to create a business trading environment that is more reliable and personal than existing methods by giving the consumer more opportunities to interact directly with all parties of a transaction. |
I-PNNI | Integrated Private Network-Network Interface | PNNI-compatible protocol used to exchange information between routers that augment or replace protocols such as OSPF and IPX. |
IP | ||
IP address /number | Internet Protocol addresss /number | Internet Protocol address (IP address) is a unique number consisting of 4 parts separated by dots, e.g. 165.113.245.3 Every machine that is on the Internet has a unique IP number. |
IP PBX | Internet Protocol private branch exchange | IP PBX vendors replace the traditional TDM/PCM circuit switching and offer a IP-switching platform for voice communications. The communication servers provide true multimedia capability and offer many advantages for high bandwidth applications. |
IP telephony | Internet Protocol telephony | Voice traffic or data traffic that has traditionally been treated like voice traffic — it is transmitted over an IP network. Three distinct types of IP telephony traffic exist: real-time voice, non-real-time voice and fax. |
IPA | intelligent process automation | The automation of repeatable operational decisions within business process sets |
IPAM | ||
IPC | interprocess communication | |
IPL | initial program load | |
IPL / IPLC | international private line / international private leased circuit | point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world. |
IPM | Internetwork Performance Monitor | Cisco network response time and availability troubleshooting application |
IPMX | IP management exchange | A service, residing in the network, operated by a neutral provider that mediates quality of service, revenue settlement, and performance management among different carrier networks. |
IPP | Internet Printing Protocol | A client-server protocol for printing over the Internet. The Mac OS X printing infrastructure and the Mac OS X Server print service that’s built on it support IPP. |
IPPP | Internet presence provider and promoter | a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it. |
IPR | Intellectual Property Rights | a legal field related to creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. |
IPRM | intellectual property rights management | IPR management |
IPRR | Intellectual property rights and royalties | software lets companies with digital
media assets monetize those assets by issuing contracts that license the use of their IP for
distribution, incorporation with advertising, use in consumer products, or display through traditional and digital means in vehicles other than those owned by the copyright holder. |
IPS | intrusion prevention system | Beyond an IDS, an IPS takes the additional step of blocking the attempted intrusion. IPS monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. |
IPSec | IP Security | |
IPT | ||
IPTV | Internet Protocol Television | |
IPv4 | Internet Protocol, version 4 | The most widley used version of the IP. IPv4 allows for a theoretical maximum of approximately four billion IP Numbers (technically 232), but the actual number is far less due to inefficiencies in the way blocks of numbers are handled by networks. |
IPv6 | Internet Protocal version 6 |
Every computer system and device
connected to the Internet is located by an IP address. The current
system of distributing IP addresses is called IPv4. This system assigns
each computer a 32-bit numeric address, such as 120.121.123.124.
|
IPv6CP | IPv6 PPP Control Protocol | responsible for configuring, enabling and disabling the IPv6 protocol modules on both ends of a PPP link. |
IPX | Internetwork Packet Exchange |
It is a networking protocol used to
connect networks based on Novell's NetWare. IPX is "connectionless,"
meaning it doesn't require connections to be maintained during an
exchange of packets, like a phone call does.
|
IR | ||
IRC | Internet Relay Chat | Basically a huge multi-user live chat facility. There are a number of major IRC servers around the world which are linked to each other. Anyone can create a channel and anything that anyone types in a given channel is seen by all others in the channel. |
IRF | Intelligent Resilient Framework | HP frankwork built to fail over to other switches in case of an outage or other disaster. |
iRMC | Integrated Remote Management Controller | Implementation of a Remote Access Card (RAC) by Fujitsu |
IRP | I/o Request Packet | Data structure used by Windows to communicate to kernel-mode device drivers |
IRQ | Interrupt Request | PCs use interrupt requests to manage various hardware operations. Devices such as sound cards, modems, and keyboards can all send interrupt requests to the processor. |
IRS | Interrupt Source | Synonymous with bad guys, snakes, nightmares, ulcers, high blood pressure, audits and system crashes! See them at HTTP://WWW.IRS.GOV |
IRTF | Internet Research Task Force | a group focused on researching Internet protocols, applications, architecture and technology http://www.irtf.org/ |
IRU | Indefeasible Right of Use | a contractual agreement between the operators of a communications cable, such as submarine communications cable |
IS | Information Systems | the department that is in charge of information services, information management and computing in general in larger businesses. |
ISA | ||
ISACA | Information Systems Audit and Control Association | See http://www.isaca.org/ |
ISAM | Indexed Sequential Access Method | a popular form of record retrieval from files on larger systems. This method was consistent with IBM's method of dealing with multiple users in the same file at the same time. |
ISATAP | Intra-Site Automatic Tunnel Addressing Protocol | an IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes |
ISC | Internet Software Consortium | a nonprofit corporation dedicated to production-quality software engineering for key Internet standards http://www.isc.org/ |
iSCSI | Internet SCSI | A proposed network transport standard — supported by a group of vendors that include Cisco Systems, Adaptec and IBM — designed to enables SANs to be built using SCSI protocols. It works by encapsulating SCSI data in IP packets for transport over IP-based networks. |
ISDN | Integrated Services Digital Network |
A technical standard and design
philosophy for digital networks. ISDN provides
high-speed, high-bandwidth channels to subscribers via the
public switched telephone network, achieving end-to-end digital
functions with standard equipment interface devices.
|
IS-IS | Intermediate-System-to-Intermediate-System | A routing method among intermediate systems that requires the end systems, rather than the intermediate systems, to be responsible for providing error correction. It reduces complexity and overhead of routing protocols. |
ISIS | Image and Scanner Interface Specification | A common interface standard that allows consistent scanner control dialogue. Created by Pixel Translations (now part of ActionPoint), ISIS has become a popular standard for document-imaging scanners. |
ISL | inter-switch link | The physical connection that carries a protocol for interconnecting multiple routers and switches in a SAN. |
ISM | industrial, scientific and medical | The industrial, scientific and medical (ISM) radio bands. |
ISN | Initial Sequence Numbers | A number, created by an operating system, that computers use to reconstruct data sent over the Internet. |
ISO | International Organization for Standardization | ISO followed by a number is used to identify one of the published ISO standards. www.iso.org - ISO Home Page |
ISOC | Internet SOCiety | Based in Herndon, Virginia, the Internet Society promotes the Internet and coordinates standards. You can visit their site (http://www.isoc.org/) |
ISP | Internet Service Provider | An institution that provides access to the Internet in some form, usually for money. |
ISR | interrupt service routine | A small piece of software executed in response to a particular interrupt. |
ISS | Internet Security Systems | An security software vendor headquartered in Atlanta. acquired by IBM |
ISTG | InterSite Topology Generator | Managing active directory replication |
ISUP | ISDN User Part | part of the SS #7 which is used to set up telephone calls in PSTN |
ISV | independent software vendor | A software producer that is not owned or controlled by a major IT vendor. An ISV is a company whose primary function is to distribute software. |
IT | Information Technology | broad subject concerned with technology and other aspects of managing and processing information, especially in large organizations. |
ITAD | IT asset disposition | Processes to redeploy, remarket, donate, recycle, or dispose of IT assets in compliance with data security, environmental, and industry regulations. |
ITAM | IT asset management | A systematic approach to managing IT assets throughout their life cycle, from procurement through retirement and disposal. |
ITC | IT consolidation | IT consolidation |
ITCAM | IBM Tivoli Composite Application Monitoring | IBM Tivoli IT management sofware |
ITCM | IT Change Management | tool functionality governs documentation, review, approval, coordination, scheduling, monitoring and reporting of RFCs. The basic functional requirements begin in the area of case documentation, with industry-standard assignment capabilities of classification and categorization. |
ITCS | Intermodal Transport Control System | Performance-minded transport system place high demands on the quality of their transport network. |
ITeS | Information Technology Enabled Services | outsourcing of processes that can be enabled with information technology and covers diverse areas like finance, HR, administration, health care, telecommunication, manufacturing etc. Armed with technology and manpower, these services are provided from e-enabled locations. |
ITIL | Information Technology Infrastructure Library | An initiative developed by the Central Computing and Telecommunications Agency consultancy for the government of the United Kingdom. It offers a set of best practices in 24 service delivery and IT service support areas, including help desk, problem management, change management, software distribution and cost control. |
ITL | Instructional Technology Lab | The ACCC's ITL, which helps faculty and computer support staff work with instructional technology. see the ITL home page. |
ITLA | Incremented Three Letter Acronym | at one time IBM ran out of TLAs. In order to move to four letter acronyms, they had to come up with a four letter acronym to replace TLA. So ITLA was adopted as the "standard" to describe all four letter acronyms! |
ITO | IT outsourcing | The contractual vehicle through which enterprises use external sources to provide life cycle service and support operations for their IT infrastructure. Outsourcing can be partial or total, and can involve not only operations but also the acquisition of customer assets and personnel. |
ITOM | IT operations management | IT operations management |
ITU | International Telecommunication Union |
This is an international organization,
headquartered in Geneva, Switzerland, within which
governments and the private sector coordinate global
telecommunications networks and services. See also: http://www.itu.int/
|
ITWAB | IT Workload Automation Broker Tools | technology designed to overcome the static and manual nature of scheduling jobs. It's capable of managing mixed workloads based on business policies, where resources are assigned and unassigned in an automated fashion to meet service-level objectives. |
ITXC | Internet Telephony Exchange Carrier | a US based wholesale provider of VoiP, Internet-based phone calls. acquired by Teleglobe Bermuda Ltd. in 2004 |
IVANS | International Value Added Network Services | IVANS is an external public telecommunication service which provides customers with enhanced services such as electronic mailbox messaging, data interchange or database access and retrieval etc. |
IVDT | Integrated Voice and Data Terminal | A dual function device incorporating both a terminal keyboard/display and voice telephone. |
IVIS | in-vehicle information system | A system that enables intelligent vehicles to provide the functionality to increase the productivity and safety of the driver. |
IVR | interactive voice response |
This function enables callers to push
buttons in response to voice prompts to listen to
recorded information, or have their calls automatically routed to an
appropriate queue or party.
|
IXC | Interexchange Carrier | Any individual, partnership, association, joint-stock company, trust, governmental entity or corporation engaged for hire in interstate or foreign communication by wire or radio between two or more exchanges. |
IXS | Integrated xSeries Server | An Intel server that fits inside System i products to support larger Windows application demands. |
icon |
|
|
Idea management | a structured process of generating, capturing, discussing and improving, organizing, evaluating and prioritizing valuable insight or alternative thinking that would otherwise not have emerged through normal processes. | |
IGN | IGN is an entertainment website that focuses on video games, films, music and other media. http://www.ign.com/ | |
index | ||
iLink | iLink is the registered trademark of Sony's IEEE 1394 digital connection. | |
insourcing | The process of separating the IS organization from the enterprise, usually as a business unit measured by its own profit and loss. The insourced IS organization provides the enterprise with IT services on a business-rules basis. | |
interface | ||
Internet | The word "internet" literally means "network of networks". In itself, the Internet is comprised of thousands of smaller regional networks scattered throughout the globe. | |
Internet telephony | Use of Internet protocols for transmitting two-way audio signals in real time, as an alternative to traditional telephone carriers. | |
InterNIC | the entity that controls the registration of most domain names on the Internet. The InterNIC is a cooperative activity between the National Science Foundation, Network Solutions, Inc. and AT&T. HTTP://WWW.INTERNIC.NET. | |
intranet | An intranet is a constrained version of the Internet usually owned and controlled by a single company or organisation. Intranets can still be world-wide, use TCP/IP protocols, and be structured as a collection of networks but the greatest difference is that access is limited to a set of authorised users using firewalls and other mechanisms. | |
IsoHunt | isoHunt is a BitTorrent index with over 1.7 million torrents in its database and 20 million peers from indexed torrents. http://isohunt.com/ | |
iOS | a mobile operating system developed by Apple for its iPhone devices, but now used for other Apple products such as the iPod Touch, iPad tablet and Apple TV | |
Itanium | A new processor generation introduced by Intel in 2001, based on IA-64 architecture. |
J
J for Java
Abbreviation | Term | Definition |
---|---|---|
J-code | Japan code | a slang nickname for the software written in Japanese companies, which has a reputation for being overly complex. J-code is also slang for rules that are enforced only to preserve a hierarchy of management. This refers to the multiple layers of management in Japanese business culture. |
J2EE | Java 2 Platform, Enterprise Edition | A Sun Microsystems platform specification and branding initiative that provides a unifying umbrella for enterprise-oriented Java technologies. J2EE focuses on server-side, multitier services. J2EE includes the Java Server Pages, Java Servlets and Enterprise JavaBeans programming models, a number of protocols and application programming interfaces, a reference implementation, a test suite, and an application model. |
J2ME | Java 2 platform, Micro Edition | refer to J2EE |
J2SE | Java 2 platform, Standard Edition | refer to J2EE |
JAAS | Java Authentication and Authorization Service | a package that enables services to authenticate and enforce access controls upon users. It implements a Java version of the standard Pluggable Authentication Module (PAM) framework, and supports user-based authorization |
JACK | JACK Audio Connection Kit | soundserver or daemon that provides low latency connections between so-called jackified applications. It is created by Paul Davis and others and licensed under the GPL. JACK is free audio software. |
JAD | joint application development | a RAD (Rapid Application Development) concept, which involves cooperation between the designer of a computer system and the end user to develop a system that exactly meets the user's needs. |
JAMES | Java Apache Mail Enterprise Server | a 100% pure Java server, designed to be a complete and portable enterprise mail engine solution based on currently available open protocols |
JAR | Java Archive | a file containing a collection of Java class files that can be downloaded more efficiently than would be possible if each file were downloaded separately. |
JBIG | Joint Bi-level Image experts Group | This was (and is) a group of experts nominated by national standards bodies and major companies to work to produce standards for bi-level image coding. See also http://www.jbig.org/ |
JBL | Jame B. Lansing | (Jame B. Lansing) Speakers |
JBOD | Just a Bunch of Disks | refers to drives that reside in their own enclosure external to the server, but contain no RAID intelligence. JBOD drives are dependent on the server for RAID functionality. |
JCA | Java Connector Architecture |
Java interoperability techniques |
JCAHO | Joint Commission on Accreditation of Healthcare Organizations | An U.S. independent, not-for-profit organization devoted to healthcare standards setting and accreditation. |
JCB | job control block | A group of data containing the execution-control data and the job identification when. |
JCL | Job Control Language | JCL is a set of control statements punched onto computer cards used to direct the execution of computer programs and describe the input/output devices used on IBM computers running the OS/360 and later operating systems. JCL serves as a means of communication between the user's program and the system. |
JCP | Java Community Process | A program created by Sun Microsystems to provide an open forum for Java developers, licensees and other members. JCP's charter is to develop Java technology specifications, reference implementations and technology compatibility kits. |
JDBC | Java DataBase Connectivity | An application program interface specification for connecting programs written in Java to the data in a database. It is a Java API that enables Java programs to execute SQL statements and interact with any SQL-compliant database. |
JDK | Java Development Kit | A software development package from Sun Microsystems that implements the basic set of tools needed to write, test and debugJava applications and applets |
JEDEC | Joint Electronic Devices Engineering Council | An international body of semiconductor manufacturers that set IC standards. |
JES | Job Entry Subsystem | An IBM licensed program that receives jobs into the system and processes all output data that is produced by jobs. |
JFK | Just Fast Keying | a simple protocol for establishing VPN sessions |
JFS | Journaling File System | |
JIA | Joint Innovation Assessment | an engagement whereby a full audit of a client’s and a supplier's innovation capabilities can be assessed in order to prepare future joint innovation work or a joint innovation program. |
JIT | Just-in-time | This is a type of Java compiler that interprets a class file, then compiles the information into native code. |
JITA | Just In Time Activation | Allows an objects to tell COM+ that its work is done and that it can be destroyed |
JITT | just-in-time training | A training methodology in which users are trained in a technology just when they begin using it. |
JJ | Josephson Junction | A thin insulating layer surrounded by superconducting material in a superconducting circuit. |
JMS | Java Messaging Service |
part of the Java EE specifications |
JMX | Java Management eXtensions |
Java API |
JNI | Java Native Interface | A technology for bridging C-based code with Java. |
JOA | Joint Opportunity Assessment | an engagement whereby a service provider helps his client elicit the requirement and the potential impact of a large project or an outsourcing project. JOA's typically include but are not limited to: strategic guidelines to improve work efficiency, business processes, TCO, etc |
JOLAP | Java Interface for OLAP | A Java application programming interface for the J2EE environment. JOLAP supports the creation and maintenance of OLAP data and metadata, independent of vendor. |
JPDL | jBoss process definition language | based on a model of nodes, transactions and actions. jPDL specifies an xml schema and mechanism to package all process definition related files. |
JPEG / JPG | Joint Photographic Experts Group | JPEG (pronounced JAY-peg) is most commonly mentioned as a format for image files. JPEG format is preferred to the GIF format for photographic images as opposed to line art or simple logo art. |
JRE | Java Runtime Environment |
The JRE is developed by Sun
Microsystems (the creator of Java) and includes the Java Virtual
Machine (JVM), code libraries, and components, which are necessary to
run programs written in Java. The JRE is available for multiple
computer platforms, including Mac, Windows, and Unix.
|
JS | JavaScript | a language that allows a web page to include commands to be executed by the web browser. For example, you may wish your web page to have dialog boxes that appear when the user clicks on certain places. |
JSON | JavaScript Object Notation | A format for exchanging data that are structured as a collection of name-value pairs or an ordered list of values. JSON.org |
JSP | Java Server Page |
This standard was developed by Sun
Microsystems as an alternative to Microsoft's active server page (ASP)
technology. JSP pages are similar to ASP pages in that they are
compiled on the server, rather than in a user's Web browser. However,
JSP is Java-based, whereas ASP is Visual Basic-based.
|
JSR | Java Specification Request |
worked in the Java community |
JTAG | Joint Test Action Group | the common name used for the IEEE 1149.1 standard entitled Standard Test Access Port and Boundary-Scan Architecture for test access ports used for testing printed circuit boards using boundary scan. |
JTC | Join Transitive Closure | Allows the DBMS optimizer to consider a join order other than those made available explicitly by the query's WHERE clause |
JTC1 | Joint Technical Committee | created by ISO and IEC. It is comprised of standards organizations from over 75 countries, and is involved with setting standards for information processing. |
JTRS | Joint Tactical Radio System | a software radio that will work with many existing military and civilian radios. |
JVM | Java virtual machine | JVM s a set of computer software programs and data structures that use a virtual machine model for the execution of other computer |
JVT | job volume table | A table that contains volume information obtained from data definition (DD) statements. |
J# | pronounced “J sharp”, a programming language very similar to JAVA but implemented in the Microsoft .NET Framework; essentially a combination of Java and C#. | |
jabber | ||
jack | A connecting device having springs which make electrical contact with mating contacts of a plug. | |
Jailbreaking | the act of bypassing the App Store as a means for distributing applications after installing unsupported software. | |
Java | A high level programming language, developed by Sun Microsystems. Compiled Java code can run on most computers because Java interpreters and run time environments, known as Java VMs. http://www.java.com | |
JavaScript | A scripting language targeted specifically to the Internet. It is the first scripting language to fully conform to ECMAScript, the Web's only standard scripting language. Despite its name, JavaScript is not a derivative of Java; its origin is Netscape's Livescript language. | |
Jitter |
A slight movement of a transmission signal in time or phase, which can introduce errors
and loss of synchronization for high-speed, synchronous communications. |
|
Joe job | an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source. A Joe job is sometimes conducted as an act of revenge on someone who reports a spammer to their ISP or publicly advocates anti-spam legislation. | |
Joomla! | a free, open source content management system written with PHP for publishing content on the world wide web and intranets using a MySQL database. | |
jQuery | a library that makes it quicker and easier to build JavaScript webpages and web apps. Often with jQuery you can write a single line of code to achieve what would have taken 10-20 lines of regular JavaScript code. jQuery | |
jQuery Countdown | A jQuery plugin that sets a div or span to show a countdown to a given time. | |
jumbo frames | Jumbo frames are large IP frames used in high-performance networks to increase performance over long distances. | |
Junk Mail | Unsolicited email. | |
Jython | an implementation of PYTHON based on JAVA. See www.jython.org. |
K
K for key
Abbreviation | Term | Definition |
---|---|---|
k | kilo | This is 210 or 1024 in computer terminology. |
k-map | knowledge map | A representation of concepts and their relationships (e.g., hierarchy, taxonomy and network). A K-map is a navigational aid that enables a user to hone in rapidly on the desired concept, and then follow links to relevant knowledge sources (information or people). |
kaid | Kai console daemon | a service that provides tunneling for console games that do not have an inherent connection to the Internet. Although the label refers to XBOX, the daemon works well with PS2, and Gamecube consoles as well |
Kb | Kilobit | One thousand bits (103) or 1024 bits (210). A unit of measurement of the capacity of memory integrated circuits. |
kB | Kilobyte | One thousand bytes (103) or 1024 (210) bytes. A unit of measurement used for computer file sizes. |
KBE | knowledge-based engineering | A system that encapsulates design knowledge that can be recalled, reused and extended to create product designs. |
Kbps | Kilobits Per Second |
Don't confuse this with Kilobytes per
second (which is 8 times more data per second). This term is commonly
used in describing data transfer rates. For example, two common modem
speeds are 33.6 Kbps and 56 Kbps.
|
KBS | Knowledge-Based System | A computer system that is programmed to imitate human problem-solving by means of artificial intelligence and reference to a database of knowledge on a particular subject. |
KBMS | KeyBoard/MouSe | Connector. It's simply a duplicate of the PS/2 ports and it's used to connect other devices that use the PS/2 without having to give up the keyboard and mouse, and also is convenient for things that you need to mount internally |
KBW | keyboard wedge | KBW can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader ( MSR ) into keyboard strokes for a computer. The software form of a keyboard wedge intercepts the dignal signals from the reader when they arrive at the computer and instantly translates them into keyboard strokes. |
KCC | Knowledge Consistency Checker | A domain service that creates and modifies the replication topology of AD |
KDC | Key Distribution Center | A network service that provides tickets and temporary session keys. The KDC maintains a database of principals (users and services) and their associated secret keys. |
KDD | Knowledge Discovery in Databases | A branch of Artificial Intelligence Artificial-Intelligence. |
KDE | K Desktop Environment | KDE is an open source graphical desktop environment for Unix workstations. Initially called the Kool Desktop Environment, KDE is anongoing project with development taking place on the Internet and discussionsheld through the official KDE mailing list, numerous newsgroups, and IRC channels. |
KDSI | thousand (K) Delivered Source Instructions | It is a measure of a programmer's productivity or a project productivity. |
keychan | Key changer | a small program/software, that can change a software license key to another key. A key changer is not illegal, since it only changes a key |
keygen | Key Generator | Refers to a program that will automatically generate a registration or serial number. Its usual purpose is to eliminate software piracy. |
keylogging | keystroke logging | the act of recording the keys that a person presses as he or she uses a computer. Keystroke logging is often done surreptitiously by malicious SPYWARE in an attempt to capture passwords. |
KGD | Known Good Die | a process where customers can get fully tested, bare-die flash devices. No additional packaging, like a TSOP, is provided. |
KiB | kibibyte | 1024 bytes. |
KIPS | Thousands of instructions per second | a unit used to measure the speed at which a processor executes instructions. See also MIPS. |
KIS | Knowbot Information Service | A directory retrieval service for Internet addresses, that uses intelligent agents to process requests. Also called netaddress. |
KISS | Keep It Simple, Stupid | The New Hacker's Dictionary, edited by Eric Raymond, says that the KISS Principle is sometimes cited on a development project to fend off feature creep. The somewhat related idea of Ockham's razor is about always looking for the simplest explanation. |
KLOC | thousands of lines of code | a traditional measure of how large a computer program is or how long or how many people it will take to write it. The code measured is usually source code . Since a higher-level source language compiles into more lines of machine code than a lower-level language, a KLOC of C++ statements would generate a larger program than a KLOC of assembler language statements. |
KM | knowledge management | A business process that formalizes the management and use of an enterprise's intellectual assets. KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets. |
KML | Keyhole Markup Language | KML is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth). In fact, KML was initially developed for use with Google Earth. When Google acquired Keyhole in 2004, that project came with it and eventually became Google Earth. |
KMS | ||
KNI | Katmai New Instructions | This is the original code-name for Intel’s SSE instruction set, named after the first Pentium III processor core, code-named “Katmai.” |
knowbot | Knowledge robots | designed to search files on the Internet "a robotic librarian." It is a registered trademark of the Corporation for national Research Initiatives. |
KOLs | Key opinion leaders | more discerning in who they accept information from and with whom they will work. |
KPCMS | Kodak Precision Color Management System | Kodak Precision Color Management System |
KPN | (formerly) Koninklijke PTT Nederland | a Dutch landline and mobile telecommunications company http://www.kpn.com |
KPI | key performance indicator | KPIs are applied in BI to gauge business trends and advise tactical courses of action. |
KPO | Knowledge Processing Outsourcing | he combination of BPO, Research Process Outsourcing (RPO) and Analysis Proves Outsourcing (APO). KPO business entities provide typical domain-based processes, advanced analytical skills and business expertise, rather than just process expertise. |
KSAM | Keyed Sequential Access Method | Accessing a flat file using a simple or compound key |
ksh | Korn shell | |
KSR | Keyboard Send/Receive | A teletypewriter transmitter and receiver operated by means of a keyboard, with no monitor. |
KSU | Key Service Unit | a telephony term. A central control cabinet serving many multi-button key telephones. Contains equipment which enables the user to pick up and hold PABX or Central Office (CO) lines and provide flashing line, steady, busy and wink hold signals. Dial intercom service is also an option. May all be contained in a computer-like device cabinet or chassis. |
KTM | kernel transaction manager | A transaction management service that enables you to create a transaction processing system (TPS) in user mode or kernel mode (or both). |
KTS | Key Telephone System |
The KTS provides communications
services to small businesses that require typically
between 2 and 100 telephones and have a large number of
internal intercom calls in relation to the number of inbound or
outbound calls. Unlike a PBX, a key telephone system is
not a switch.
|
KUIP | Kernel User Interface Package | the human interface to PAW PAW. |
KVA | Kilo Volt Amp | A term describing power in a relationship of both thousands of volts |
KVM | ||
kW | kilowatt | A unit of electrical power, equal to 1,000 watts. |
KWH | KiloWatt Hour | A measure of the amount of watts of energy used. Electricity is measured in units of power called watts. |
KYC | Know Your Customer | a broad variety of products designed to help companies avoid initiating or maintaining commercial relationships with parties that are regulatory-inappropriate or otherwise undesirable. |
Ka-Band | the bandwidth of electromagnetic wave between 33 GHz to 36 GHz, which is primarily used in satellites operating at 30 GHz uplink and 20 GHz downlink for mobile voice communications. | |
keiretsu | a collection of companies that band together for mutual benefit. This Japanese word came into popular use as venture capitalists began building startup keiretsu, companies that benefit from each other's success. | |
Kerberos | derived from Greek mythology which refers to the three-headed dog that guarded the gates of Hades. Kerberos is most widely used in a network to provide secure network authentication. Usually to authenticate users of the network. | |
kermit | ||
kernel | The heart of an operating system. The kernel is the part of the operating system that interconnects with the hardware. | |
key | In cryptography, a key is a value that determines the output of an encryption algorithm when transforming plain text to encrypted text. | |
Key logging | Key logging software runs in the background, in a stealth mode that isn't easy to detect on a PC. It collects every keystroke and hides that information in a file. | |
Keyboard Wedge | a hardware device installed between a computer's keyboard and POS terminal that translates digital signals from a barcode reader or magnetic strip reader into keyboard strokes | |
killer app (application) | a computer program that is so useful or desirable that it proves the value of some underlying technology, such as a gaming console, operating system, or piece of computer hardware or deploying an entire network. Killer applications are very rare. | |
Kiosk | Free-standing, interactive devices installed for customer self-service. Besides the computer monitor, a kiosk can have a keyboard or scanner attached for input and a printer attached for output. | |
Klez | pronounced KLEHZ, an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients. It is not necessary for a user to explicitly open an attachment in order for Klez to execute. There have been more than a half-dozen variations of Klez since it was first reported in October of 2001. | |
Ku-Band | the bandwidth of electromagnetic wave between 12 GHz to 14 GHz, which is primarily used in satellites operating at 14 GHz uplink and 11 GHz downlink in supporting braodband TV and DBS system (DSS). |
L
L for Linux
Abbreviation / acronyms | Term | Definition |
---|---|---|
l10n | localization | There are ten letters between the "l" and the "n" |
L1 / L2 cache | level-1/2 cache | L1: the memory cache that is closest to the CPU or included within it. L2: a memory cache outside the CPU |
L2CAP | Logical Link and Control Adaptation Protocol | a Bluetooth Specific Protocol |
L2F | Layer 2 Forwarding | a tunneling protocol from Cisco Systems. L2F has been submitted to the IETF for approval as a standard. |
L2S | Layer 2 Switch | Layer 2 Switch |
L2TP | Layer 2 Tunneling Protocol | A protocol that combines the features of Microsoft's PPTP and Cisco Systems' L2F to support multiprotocol or private-address IP traffic across a public IP network. L2TP is a mature Internet Engineering Task Force standard that has been widely implemented. |
L3F | Layer 3 Forwarding | a tunneling protocol from Cisco Systems. L3F has been submitted to the IETF for approval as a standard. |
L3S | Layer 3 Switch | Layer 3 Switch |
L3TP | Layer Three Tunneling Protocol | an extension to the PPP protocol that enables ISPs to operate VPNs. L3TP merges the best features of three other tunneling protocols |
LA | Load Address | LA is an IBM term |
LAC | L2tp Access Concentrator | Device attached to the switched network or located on an end system supporting L2TP to pass PPP traffic |
LACNIC | Latin American and Caribbean Internet Addresses Registry | one of four regional Internet registries that supply and administer IP addresses. |
LACP | Link Aggregation Control Protocol | Part of an IEEE specification (802.3ad) that allows to bundle several physical ports together to form a single logical channel |
LADDR | Layered Device Driver | s SCSI device driver architecture used in early versions of OS/2. |
LAI | Location Area Identity | the information carried in the SIM of GSM handsets that identify the subscriber's home area. This is used for billing and sub-net operation purposes. |
LAIPE | Link And In Parallel Execute | a high-performance package for scientific and engineering computing, programmed in MTASK. http://www.equation.com/ |
LAMP | Linux, Apache, MySQL and PHP | Also defined as Linux, Apache, MySQL and Pythor or Perl. The term LAMP is used to describe a web based solution produced using PHP (scripting), MySQL (database), Apache (web-server) under Linux (operating system), each of which are free to download. It therefore describes a website using free off-the-shelf components. |
LAN | Local Area Network |
A network of interconnected
workstations sharing the resources of a single processor or server
within a relatively small geographic area. Typically, this might be
within the area of a small office building.
|
LANE | Local Area Network Emulation | A set of services and protocols that provide for the emulation of LANs, using ATM as a backbone to allow connectivity among LAN and ATM attached end stations |
LAPD | Link Access Procedures on the D channel | specified in ITU-T Q.920 and ITU-T Q.921, is the second layer protocol on the ISDN protocol stack in the D channel. |
LAS | logical application structure | A structure of the application to be deployed that is made up of software definitions. |
laser | light amplification by stimulated emission of radiation | Analog transmission device in which a suitable active material is excited by an external stimulus to produce a narrow beam of coherent light that can be modulated into pulses to carry data. Networks based on laser technology are sometimes run over SONET. |
LASINT | laser intelligence | Technical and geolocation intelligence derived from laser systems; a subcategory of electro-optical intelligence. |
LAT | Local Address Table | A table containing the IP address range that is inside a firewalled network |
LATA | Local Access and Transport Area | Denotes a geographical area established for the provision and administration of communications service. It encompasses one or more designated exchanges, which are grouped to serve common social, economic, and other purposes. |
LBA | Logical Block Addressing | a method of accessing hard disk drives. It allows IDE disks larger than 504 megabytes (1024 cylinders) in size to be fully partitioned using the MS-DOS fdisk command. |
LBAC | label-based access control | A security mechanism that uses security labels to restrict user access to individual table rows and columns. |
LBS | Location-based service | Services or applications that center around a user’s location in a mobile environment. Services include finder applications that let mobile phone users locate friends or family, businesses or landmarks. |
LBG | load balancing group | A grouping of Fast Path input messages that are ready for balanced processing by one or more copies of a Fast Path program. |
LBO | line buildout | Abbreviation for line buildout. Synonym building out. |
LCC / LLCC | Leaded Chip Carrier / Leadless Chip Carrier | |
LCC | Limited combustible cable | also called CMP-50 cable, is fire-resistant cable with insulation made of a synthetic material called fluorinated ethylene propylene (FEP). |
LCD | liquid crystal display | A low-powered, flat-panel display technology. LCD displays create images using liquid crystal molecules controlled by an electrical field. |
LCI | local component installer | In IBM Tivoli Kernel Services, the component that pulls and runs native code, shared libraries, and installation scripts that are needed for deploying components. |
LCM | Life Cycle Management | the management of the entire life of a program including the three typical phases: transition, transformation & end-state |
LCN | local communication network | A communication network within a TMN (telecommunications management network) that supports data communication functions (DCFs) normally at reference points q1 and q2. |
LCO | language context object | A context server object that mediates the routing of inbound customer interactions as well as the supply of outbound responses in a language-appropriate manner. |
LCOS | Liquid Crystal On Silicon | TV technology for flat screen displays; a technology that most major technology and equipment manufacturers have shunned after experimentation. |
LCP | Link Control Protocol | Part of the PPP to establish, configure, and test data link connections |
LCR | ||
LCS | Communications Server |
|
LD | Laser Disc | An optical disc which stores information that can be read by a laser beam. Laser discs can be used to store data, but are usually used for video and audio together. Laser discs come in 8" and 12" diameters. |
LDA | Local delivery agent | A mail service agent that transfers mail messages from incoming mail storage to the email recipient’s inbox. |
LDAP | Lightweight Directory Access Protocol |
If you want to make directory
information available over the Internet, this is the way to do it. LDAP
is a streamlined version of an earlier directory standard called
X.500. What makes LDAP so useful is that it works great over TCP/IP networks, so information can be accessed through LDAP by anyone with an Internet connection.
|
LDCM | LANDesk Client Manager | developed by Intel, is a management tool that constantly monitors networked personal computers and workstations for hardware problems. |
LDIF | LDAP Data Interchange Format | a file format that is widely used for building a database of directories that are stored on multiple servers, for adding large numbers of directories to a directory database, and for synchronizing the contents of those directories. The servers on which the directories are stored must support the LDAP protocol. |
LDM | limited distance modem | limited distance modem |
LDP | Label Distribution Protocol | A fundamental concept in MPLS is that two Label Switching Routers must agree on the meaning of the labels used to forward traffic between and through them |
LDPC | low-density parity-check code | an error-correcting code and a method of transmitting a message over a noisy transmission channel. |
LDR | Light Dependent Resistor | This is a special type of resistor and is sometimes called a photoconductor. LDRs are made so that their resistance decreases as the level of light falling on them increases. |
LDS | logical data stream | In bidirectional text representation, a stream of data that is organized in a readable sequence. |
LDT | Lightning Data Transfer (Bus) | An interconnection standard introduced by AMD that allows for fast data transfers among the Northbridge part of a chipset, the PCI bus(es), and the Southbridge part. |
LEAP | Lightweight Extensible Authentication Protocol | also known as Cisco-Wireless EAP, is a Cisco security technology that builds on Wi-Fi's WEP encryption. |
LED | light-emitting diode | A semiconductor that produces light when activated. |
LEED | Leadership in Energy and Environmental Design | LEED) consists of a suite of rating systems for the design, construction and operation of high performance. |
LEL | Link, Embed and Launch-to-edit | Lotus term |
LEO | Low Earth Orbit | the orbit between 700 and 2,000 kilometers above the Earth for Mobile communications satellite. |
LER | Label Edge Router | Converts IP packets into MPLS packets, and MPLS packets into IP packets. On the ingress side, the LER examines the incoming packet to determine whether the packet should be labeled. |
LF | Line Feed | Feeding the paper through the printer just far enough to print the next line. Also, a button or computer instruction that activates a line feed |
LFB | look-ahead-for-busy | Information concerning network resources available to support higher precedence calls. |
LFS | Linux From Scratch | Project that provides you with the steps necessary to build your own custom Linux system |
LGA | Land Grid Aray | also known as socket T,means that the pins are on the Motherboard, not the Processor. The Prescott is using the LGA 775 socket. |
LGPL | Lesser General Public License (GNU) | An evolution of the Library GNU |
LID | local identifier | |
LIDE | Light emitting diode In-Direct Exposure | Scanner technology by Canon |
LIFO | last in, first out | A type of message queuing that puts the last message received first in line. |
LINAC | Linear Accelerator | a particle accelerator commonly used for external beam radiation treatments of cancer patients. LINAc uses microwave technology to accelerate charged particles. |
Lion / Li-ion | Lithium-ion | a type of rechargeable battery widely used in portable computers. |
LION | Lower Indian Ocean Network | LION cable system |
LIP | Loop Initialization Process | The process by which a Fibre Channel arbitrated loop network initializes when started up, or recovers after a failure occurs or a new device appears on the network. |
LIPS | Logical Inferences Per Second | In artificial intelligence, the speed at which an application can process instructions. The human brain works at about 2 LIPS. |
LIS | Laboratory information system | a class of software which handles storing information generated by laboratory processes. These systems often must interface with instruments and other information systems such as HIS. |
Lisp | List Processor or List Processing | A programming language developed at MIT in the 1950s by John McCarthy. |
LKM | Loadable Kernel Modules | allow for the adding of additional functionality directly into the kernel while the system is running. |
LL | local loop | A generic term for the connection between the customer’s premises (home, office, etc.) and the provider’s serving central office |
LLC | Logical Link Control | IEEE 802.2 LAN protocol that specifies an implementation of the LLC sublayer of the data link layer. |
LLDP | Link Layer Discovery Protocol | LLDP is a vendor-neutral Layer 2 protocol that allows a network device to advertise its identity and capabilities on the local network. |
LLDP-MED | Link Layer Discovery Protocol-Media Endpoint Discovery | LLDP-MED is an enhancement to the LLDP that is designed to allow auto-discovery of LAN policies |
LLI | ||
LLTD | Link Layer Topology Discovery | A feature that helps users to troubleshoot their networks. LLTD automatically detects multiple network devices and gives a graphical presentation of the connected hardware to identify configuration errors. |
LLU | local loop unbundling |
LLU is the process of allowing
competitive telecommunications operators to use the
twisted-pair telephone connections from the incumbent telephone
exchange's central office to the customer premises. This local
loop is owned by the ILEC.
|
LMA | Lightspeed Memory Architecture | nVidia term |
LMDS | Local Multipoint Distribution Services | This is a fixed point (non-mobile) wireless technology that operates in the 28 GHz band and offers line of sight coverage over distances up to 5 kilometers. It can deliver data and telephony services to 80,000 customers from a single node. |
LMP | Link Manager Protocol | a data link layer protocol in the Bluetooth protocol stack. LMP carries out link setup, authentication, link configuration and other protocols. |
LMPP | Lighttpd/MySQL/PHP/Python | A web application stack based upon lighttpd, MySQL, , and/or (compare to LAMP). |
LMS | Learning Management System | a software package, that enables the management and delivery of learning content and resources to students. Most LMS systems are web-based to facilitate "anytime, anywhere" access to learning content and administration. |
LNA | ||
LNIB | like new, in box | slightly used but supplied with original packaging |
LNO | Loop Nest Optimization | a special case of loop transformation which deals with nested loops that makes possible large reductions in the cache bandwidth necessary for some pervasive algorithms. |
LNP | Local Number Portability | Subscribers' ability to switch local or wireless carriers and still retain the same phone number, as is possible now with long-distance carriers. |
LNS | L2tp Network Server | Maintains L2TP sessions with whatever is connected to the LAC |
LOB | large object | |
LOB | Line-of-Business | Used to refer to a business critical application, i.e. an application that is essential to the trading or survival of a business. Normally written as "LOB app" or "LOB application". |
LOC | Lines of Code | A measure of the size of a program. |
LOCK | local object creator and killer | In IBM Tivoli Kernel Services, the component that starts, monitors, stops, and restarts an ORB. |
LODA | Lombardi On-Demand Assistance | IBM Websphere On-Demand Delivery |
LOFS | LOopback File System | A file system type that lets the user create a new virtual file system. The user can access files using an alternative path name |
LOM | LAN On Motherboard | This is a network device that is built onto the motherboard (or baseboard) of the machine |
Loran | long-range radio navigation | A long-range radio navigation position-fixing system consisting of an array of fixed stations that transmit precisely synchronized signals to mobile receivers. |
LOS | ||
LPA | ||
LPAR / LP | logical partition | |
LPB | Low Ping Bastard | Network multiplayer games attribute |
LPC | ||
LPD | line printer daemon | |
LPDA | Link Problem Determination Aid | A series of procedures used by products to test modem or other DCE operations, and to provide information about the DCE and the data link. |
LPF | ||
LPFM | low-power FM radio | A broadcast service that permits the licensing of 50- to 100-watt FM radio stations within a service radius of up to 3.5 miles and 1- to 10-watt FM radio stations within a service radius of 1 to 2 miles. |
LPI | ||
LPP | Land Pre-Pits | Addressing aid in writing DVD-R |
LPPL | Latex Project Public License | http://www.latex-project.org |
LPR | line printer requester | |
LPT | line print terminal | The designation for a parallel connection to a printer or other parallel device. |
LPTV | low-power television | A broadcast service that permits program broadcasting via television translators operating with low power. LPTV service includes the existing translator service and operates on a secondary basis to regular television stations. |
LPWA | Lucent Personalized Web Assistant | Anonymous web browsing service |
LPX | Low Profile eXtension / Extended | a motherboard form factor used for low-profile computer cases. LPX boards use a riser card arrangement for expansion cards, which means that installed expansion cards are parallel to the motherboard instead of perpendicular to it. |
LQA | link quality analysis | In adaptive high-frequency (HF) radio, the overall process by which measurements of signal quality are made, assessed, and analyzed. |
LQSR | Link Quality Source Routing | a routing protocol for wireless mesh networks. The protocol was developed by Microsoft for use with their MCL technology, which facilitates the interconnection of computers into a mesh network |
LR | Lightroom | Adobe Photoshop Lightroom is a photography software program developed by Adobe Systems for Mac OS X and Microsoft Windows, designed to assist professional photographers managing thousands of digital images, and do post production work. www.adobe.com/products/photoshoplightroom/ |
LRC | ||
LRF | Little Rubber Feet | Support devices for computer cases and other equipments |
LRN | Location Routing Number | The ten-digit (NPA-NXX-XXXX) number assigned to a switch/POI used for routing in a permanent local number portability environment. |
LRU | least recently used | Pertaining to an algorithm used to identify and make available the cache space that contains the data that was least recently used. |
LS | Loop-Start Signaling | A type of switched access line signaling in which the network provides a battery source. To initiate a call, customer premise equipment will provide a loop closure that causes DC loop current to flow, which is detected by the network. |
LSA | Local Security Authority | The Local Security Authority is the service provided to manage local security, domain authentication, and Active Directory processes. The Security Accounts Manager, Net Logon and Protected Storage services run within the context of lsass.exe |
LSAP | Link Service Access Point | including both DSAP and SSAP, is the identifier field to indicate data types. |
LSAS | Local Security Authentication Server | Verifies validity of user logons to PC/Server. |
LSASS | Local Security Authority Subsystem Service | Provides an interface for managing local security, domain authentication, and Active Directory processes. The Security Accounts Manager, Net Logon and Protected Storage services are components of LSA |
LSB | Least Significant Bit | The bit of a binary number which is farthest to the right, indicating the number of ones; also designated as bit zero. |
LSH | Locality-Sensitive Hashing | an algorithm for solving the (approximate/exact) Near Neighbor Search in high dimensional spaces. |
LSI | Large Scale of Integration | IC manufacturing integration level: it's the process of placing from 3,000 to 100,000 transistors on one chip |
LSM | ||
LSP | License Service Provider | An Netware Loadable Module (NLM) that responds to requests from NLS clients and licensing service managers for licensing information or license units |
LSR | ||
LSR | local shared resource | |
LSSGR | LATA Switching System Generic Requirements | Multi-volume set of Bellcore technical references dealing with basic switching requirements used by switch manufacturers, procurement staffs, planners, and switch technicians. |
LTC | line traffic coordinator | In a DDN switching center, the processor that controls traffic on a line. |
LTE | ||
LTF | Leap To Frogans | http://www.frogans.com/ |
LTM | Local Traffic Managers | F5 product to provide offloading of SSL, connections, compression; intelligent traffic management |
LTPA | Lightweight Third Party Authentication | |
LTRAN | local transaction | |
LTRS | Letters Shift | A code character used to command a Teletype - like device to perform a physical shift for alphabetic characters |
LTS | Leaning Toothpick Syndrome | Expresses readability in PERL regular expressions |
LU | Logical Unit | IBM's term for a logical node that is the user's "port" into a SNA network. LU 1 is a high-performance print and 3270 data stream. LU 6 enables host-to-host data exchange, and provides a peer-to-peer data stream. |
LU-LU | between two logical units | a session between two logical units (LUs) in an SNA network. It provides communication between two end users, or between an end user and an LU services component. |
LUF | lowest usable high frequency | The lowest frequency in the HF band at which the received field intensity is sufficient to provide the required signal-to-noise ratio for a specified time period, e.g., 0100 to 0200 UTC, on 90% of the undisturbed days of the month. |
LUN | logical unit number | A number used in a SCSI bus to identify a peripheral device (such as an attached storage system) |
LUNT | line unit network termination | The customer side of any DSL that does not terminate on the customer installation (CI). |
LUS | LookUp Service | Provides the functionality to discover and register services |
LUW | logical unit of work | |
LVD | Low Voltage Differential | the Low Voltage Differential interface used in Ultra2 and Ultra3 SCSI. |
LVDS | Low Voltage Differential Signaling | a low noise, low power, low amplitude method for high-speed (gigabits per second) data transmission over copper wire. |
LVM | ||
LVOL / LV | logical volume | |
LWL | long wavelength | A type of fiber-optic cabling that is based on 1300-mm lasers and supports link speeds of 1.0625 Gbps. |
LWP | light-weight process | means of achieving multitasking. In contrast to a user thread, which is handled at the application level, a light-weight process is scheduled by the kernel. |
LZH | Lempel-Ziv-Haruyasu | Compression algorithm with a sliding window and additional compression applied to the output of the LZSS compressor by dynamic Huffman coding |
LZW | Lempel Ziv Welch | a standard algorithm widely used for compression of data. |
landline | A telephone circuit that travels over land-based circuits | |
LANlord | The alpha geek responsible for an office's Local Area Network. | |
laptop | A portable PC, with system unit, screen and keyboard crammed into one small package. They can do pretty much everything a desktop PC can do, but are substantially more expensive because of the extra miniaturisation required. | |
last mile | The final leg in delivering connectivity in a telecommunications network. Often perceived as the most critical in terms of both service provision, cost and bandwidth. | |
Latency | The time interval during which a network station seeks access to a transmission channel and access is granted or received. | |
layer | In the OSI reference model, a layer is a collection of related network-processing functions that constitute one level of a hierarchy of functions. | |
Lazy evaluation | a computation optimization technique that attempts to delay computation of expressions until the results of the computation are known to be needed. | |
Leased Line | A private telephone line without inter-exchange switching arrangements. Also called Private Line and Dedicated Line | |
Legacy | Term used to describe enterprise applications or systems installed in the distant past, but still being used. Typically, they are characterized by outdated technologies, but are still critical to day-to-day operations. | |
a social networking site (www.linkedin.com) designed for business professionals to use for work contacts and communication. | ||
Linux (“Linus’ UNIX”) | A widely used Open Source Unix-like operating system. Linux was first released by its inventor Linus Torvalds in 1991. There are versions of Linux for almost every available type of computer hardware from desktop machines to IBM mainframes. | |
LISTSERV | a commercial software package for operating e-mail mailing lists and discussion groups, produced by L-Soft International (www.lsoft.com) | |
load balancing | In routing, the capability of a router to distribute traffic over all its network ports that are the same distance from the destination address. Good load-balancing algorithms use both line speed and reliability information. | |
lock | A data structure used to synchronize access to a shared resource. The most common use for a lock is in multithreaded programs where multiple threads need access to global data. | |
log | A record of a computer's or application's activity, used for system information, backup, and recovery. | |
Login | Noun or a verb. Noun: The account name used to gain access to a computer system. Not a secret (contrast with Password). Verb: the act of connecting to a computer system by giving your credentials (usually your "username" and "password") | |
Longhorn | internal code name used for Windows Vista (Windows 6.0) before its release. | |
lookup | searching a data structure for an item that satisfies some specified property. | |
loopback | A diagnostic test that returns the transmitted signal back to the sending device after it has passed through a network or across a particular link. The returned signal can then be compared to the transmitted one. The discrepancy between the two help to trace the fault. | |
lossy | If a process is lossy, it means that a little quality is lost when it is performed. If a format is lossy, it means that putting data into that format will cause some slight loss. Lossy processes and formats are typically used for performance or resource utilization reasons. | |
lurker | A user who does not participate in an online discussion (e.g., in a chat room), but merely observes the activity. | |
lyco s |
An Internet search engine (http://www.lycos.com/) created at Carnegie Mellon University.
|
Comments
Thankyou for wonderful article. It has more Information in Your Website
SAP Simple Logistics Online Access