IT Terminology
A
D
H
J
A for app
abbreviation / acronyms | term | definition | |
---|---|---|---|
A | Ampere Anchor |
Current measurement unit HTML tag, a link to another location |
|
A/N/K | alphabetic, numeric, katakana | Pertaining to alphabetic, numeric, or katakana characters. | |
a11y | accessibility | There are eleven letters between the "a" and the "y". | |
A2A | application-to-application | An approach to enterprise application integration that provides visibility into internal systems, so that these systems can share information or business processes. | |
AA | anti-aliasing | the technique of minimizing the distortion artifacts known as aliasing when representing a high-resolution signal at a lower resolution | |
AA | automated attendant | A device, typically attached to a private branch exchange or voice mail system, that answers incoming calls. | |
AAA | authentication, authorization, and accounting | Also pronounced "triple a." Refers to a framework for
intelligently controlling access to computer resources, enforcing
policies, auditing usage, and providing the information necessary to
bill for services. Authentication is the process of identifying an individual, usually based on a username and password. Authorization is the process of granting or denying a user access to network resources once the user has been authenticated through the username and password. Accounting is the process of keeping track of a user's activity while accessing the network resources |
|
AAB | All-to-all broadcast | the process where every node broadcasts its information to all other nodes. | |
AAC | Advanced Audio Coding ATM access concentrator |
an audio compression format newer and
more efficient than MP3, used internally by iTunes and Nintendo Wii A device used to concentrate a variety of services (such as frame relay, Internet Protocol and video) over a single ATM network access connection. |
|
AAL | ATM adaptation layer | The ATM layer where non-ATM data is converted to ATM format. The AAL serves as the "glue" that connects traditional packet and frame structures with short, fixed-length ATM cells. | |
AARP | AppleTalk Address Resolution Protocol | Provides for the dynamic assignment of node identifiers to nodes within an AppleTalk network. | |
AAS | Auto Area Segmentation | Scanner technology which detects and optimizes text and graphics on the same page by Epson. | |
AAT | Average Access Time | The average amount of time it takes for a storage peripheral to transfer data to the CPU. | |
AAUI | Apple Attachment Unit Interface | A 14-position, 0.050-inch-spaced ribbon contact connector. | |
ABAP | Advanced Business Application Programming | Powerful programming language created specifically for developing SAP applications. The core development tool in SAP's R/3 system. | |
ABC | activity-based costing Atanasoff-Berry Computer |
An approach to understanding where and why costs are incurred within an enterprise. First digital calculating machine that used vacuum tubes |
|
ABEND | abnormal end Absent By Enforced Net Deprivation |
A type of system error in which a task or program fails to execute
properly (i.e., "abnormally ends"). The term is also used as the name
for a type of error message that indicates such a failure has occurred. Sent in e-mail subject lines warning friends and others of forced loss of Internet access |
|
ABI | application binary interface | A set of specifications that enables an application written for one target OS and hardware platform to run on a different OS and platform, where the two hardware platforms share the same processor type. | |
ABLE | Agent Building and Learning Environment | A Java framework and toolkit for constructing and deploying intelligent agents. | |
ABM | activity-based management | The use of ABC principles in the ongoing management of costs and resources. | |
ABME | asynchronous balanced mode extended | In communications, an operational mode in which modulus 128 sequence numbers are used. | |
ABR | Automatic Baud Rate detection | The process in which a receiving device examines the first character of an incoming message to determines its speed, code level, and stop bits. | |
ABR | available bit rate | An ATM service category. ABR service is conceptually similar to that of a frame relay network - a minimal cell rate is guaranteed, and bursts can be supported if the network resources allow it. | |
ACA | Australian Communications Authority | The Australian government body that regulates the nation's communications industries. | |
ACAP | Application Configuration Access Protocol | a standard for accessing program configuration information from a remote server, allowing a user to use and change their configuration from any workstation by reading or writing the values on a central server. Defined in RFC 2244. | |
ACC | Authorization Contract for Containers | Specification (JSR-115) that defines new java.security.Permission classes to satisfy the J2EE authorization model | |
ACCU | Association of C and C++ Users | A worldwide association of people who are interested in C, C++, and related programming languages. | |
ACD | Automatic Call Delivery automatic call distributor or distribution |
feature that allows cellular & wireless phones to receive incoming calls when roaming.
specialized phone system that handles many incoming calls. ACDs are used for a variety of order-taking functions, such as calls to help desks or dispatching of service technicians. |
|
ACDI | Asynchronous Communications Device Interface | A software device that permits asynchronous transmission, a way of transmitting data in which one character is sent at a time, and there may be uneven amounts of time between characters. | |
ACE | access control entry Adobe Certified Expert Advanced CMOS-ECL Agile Communication Environment |
a set of identities and permissions that are directly associated with a
particular resource. Each access control entry is directly associated
with only one resource. More than one ACE can be associated with each
resource. a professional who has demonstrated proficiency with one or more Adobe software products. A high-end processor technology introduced by Hitachi in the 1990s. Nortel SIP-based platform acquired by Avaya |
|
ACEE | access control environment element | In RACF, a control block containing details of the current user, including user ID, current connect group, user attributes, and group authorities. | |
ACF | Advanced Communications Function | A family of IBM communications programs that handle tasks such as resource sharing and distribution of functions. They include ACF/Virtual Telecommunications Access Method (ACF/VTAM) and ACF/Network Control Program (ACF/NCP). | |
ACF2 | Access Control Facility 2 | A host-based security subsystem from CA (formerly Computer Associates); also known as CA-ACF2. | |
ACG | adaptive code generation | A technology that enables a program that uses processor features of a given system model to continue to work correctly when the program is moved to another system model that does not have all the processor features of the original model. | |
ACH | automated clearinghouse | A type of funds transfer network that processes debit and credit transactions between accounts from participating financial institutions. | |
ACI | access control information | Data that identifies the access rights of a group or principal. | |
ACID | atomicity, consistency, isolation, durability | Four well-established tests for verifying the integrity of business transactions in a data-processing environment. | |
ACK | acknowledgement | When a modem receives a data packet, it sends a signal back to the sending modem. If all the data is present and correct, it sends an ACK signal, which acts as a request for the next data packet. | |
ACL | Access control list application connectivity link Asianet Communications Limited Asynchronous Connectionless Link |
A list of authorised users, processes or systems. A service that transmits out-of-band information between DirectTalk and the Siemens Hicom 300 switch. an Indian media conglomerate jointly owned by STAR TV and Jupiter Entertainment. type of data packet (data only). |
|
ACM | Association for Computing Machinery | a worldwide association of computer professionals headquartered in the United States. www.acm.org | |
ACMS | Application Control and Management System | A transaction-processing monitor from Compaq (now part of Hewlett-Packard); originally a product of Digital Equipment, which Compaq acquired in 1998. | |
ACP | array control processor | A type of processor used in storage systems. | |
ACPI | Advanced Configuration and Power Interface | A standard developed by Intel, Microsoft and Toshiba to improve PC power management and plug-and-play capabilities. | |
ACR | Allowed Cell Rate attenuation-to-crosstalk ratio |
An ABR service parameter,
ACR is the current rate
in cells/sec at which a
source is allowed to send. A measure of signal quality in network cabling. |
|
ACRI | additional coding-related required information | A specification that is required by an encoding scheme to complete its definition, which extends beyond the character set and code page elements. | |
ACROSS | Automated Cargo Release and Operations Service System | Automated Cargo Release and Operations Service System | |
ACSE | Association Control Service Element | The method used in International Organization for Standardization's OSI for establishing a call between two applications. | |
ACSLS | Automated Cartridge System Library Software | A Unix-based tape-library-sharing system from Storage Technology. | |
ACT | access control template | a reusable named authorization pattern that you can apply to multiple resources. An access control template consists of a list of users and groups and indicates, for each user or group, whether permissions are granted or denied. | |
ACU | abstract code unit | A measurement used by the z/OS XL C/C++ compiler for judging the size of a function. The number of ACUs that comprise a function is proportional to its size and complexity. | |
AD | Active Directory Administrative Domain |
The directory service portion of the Windows 2000 operating system. AD
manages the identities and relationships of the distributed resources
that make up a network environment. Defined in RFC 1136. On the Internet, a group of networks, hosts, and routers operated by the same organization. |
|
ADAPT | Architecture, Design, Analysis and Planning Tool | Architecture, Design, Analysis and Planning Tool | |
ADB | Apple Desktop Bus | Port on the Macintosh for a keyboard, a mouse, and other peripherals. | |
ADC | Advanced Direct Connect Analog to Digital Converter automated data collection |
a peer-to-peer file-sharing protocol, based on the topology of the Direct Connect (DC) protocol. Often referred to A/D, the analog to digital converter is an electronic device that transforms the analog signal to digital signal, helping interconnecting the two kinds of technology/gear. The automated conversion of disparate types of information into computer records. ADC devices and technologies include bar code systems, optical character recognition and speech recognition. |
|
ADCCP | Advanced Data Communications Control Procedures | A bit-oriented, ANSI-standard communications link-layer protocol. | |
ADDM | Application Discovery and Dependency
Mapping Automatic Database Diagnostic Monitor |
BMC's application analyzes the data in Oracle’s Automatic Workload Repository (AWR) to discover the actual cause behind performance problems |
|
ADE | Application Data Export application development environment |
Technology by Oracle Databases An product that offers a range of tools or features (for example, for programming, interface development and testing) to provide a complete "environment" for developing applications. |
|
ADF | Activity Decision Flow Application Development Facility automatic document feeder |
The format in which models are exported from WebSphere Business Integration Workbench into WebSphere Business Modeler. An IBM program for developing IMS applications a device for feeding documents into a SCANNER automatically, sheet by sheet |
|
admin | ADMINISTRATOR | the account name used by the system administrator under Windows NT and its successors | |
ADI | Analog Devices, Inc. Application Desktop Integrator |
leader in high performance signal processing solutions http://www.analog.com/ Spreadsheet-based extension of Oracle Applications. It provides full-cycle accounting within the comfort and familiarity of a spreadsheet for General Ledger and Oracle Assets |
|
ADK | Additional Decryption Key | Key to be able to decrypt data even if the private key owner is unwilling to provide the private key | |
ADL | Advanced Distributed Learning | A set of standards designed to facilitate the sharing of learning objects across different learning management systems. | |
ADM | Agile development management Application Development Manager |
Agile development management Oracle Siebel's product that reduce the deployment efort and application downtime and to increase the application deployment quality |
|
ADMD | Administration Management Domain or Administrative Management Domain | A public e-mail message service that uses the X.400 protocol. | |
ADMF | Asynchronous Data Mover Facility | A IBM mainframe feature designed to enhance system performance in data moves between central and expanded storage. | |
ADN | Advanced Digital Network application delivery networking | ADN refers to a 56Kbps leased-line. ADN is an approach and a suite of technologies that comprises application security, application acceleration and network availability. | |
ADO | ActiveX Data Objects | A high-level data access object model introduced by Microsoft in 1996. | |
ADP | Accidental Damage Protection | A hardware support agreement covering physical damage to aproduct caused by or resulting from a fortuitous incident. Accidents covered include liquid spills, drop impact, electrical surges, and accidental breakage. | |
ADPCM | adaptive differential pulse code modulation | A speech-coding method that calculates the difference between two consecutive speech samples in standard pulse code modulation (PCM) coded telecommunications voice signals. | |
ADS | Active Directory Service Asynchrous Data Switching |
Windows 2000 network objects database that stores each specific network item in a central database and that may be replicated A PBX system that supports asynchronous data. |
|
ADSI | Active Directory Services Interface Analog Display Services Interface |
A Microsoft Active Directory feature that enables Windows 2000
applications to interact with other directory services without the need
to know the details of the underlying protocols. Protocol that simplifies use of advanced features by displaying text messages, generated by a remote computer or central office switch, on a user's telephone display or television set. |
|
ADSL | Asynchrous Data Switching Line |
A digital local loop using copper facilities and providing greater bandwidth in one direction than the other.
|
|
ADSM | ADSTAR Distributed Storage Manager | An IBM product which provides services for backing up, archiving and restoring data files by allowing a central workstation to act as a server for networked workstations and personal computers. | |
ADSR | Attack, Decay, Sustain, Release | the four parameters in a basic synthesizer. While Sustain is a level control, the Attack, Decay and Release are time and ratio-dependant parameters. When a key is pressed, the Attack determines the ratio with which it reaches a top level and the begins to fall at the ratio of the Decay parameter down to the level set by the Sustain value. | |
ADSTAR | Automated Document Storage and Retrieval | IBM's name for its storage products business in the 1990s. | |
ADT | Abstract Data Type admission, discharge and transfer application deployment template |
a class of data structures
described by means of a
set of operations rather
than by physical representation,
such as a class in
object-oriented
programming. A category of hospital software. An ADT system records admissions to, discharges from and transfers within a hospital, and maintains the hospital census. A combination of the logical deployment template and the network topology template that describes the deployment of application modules on servers and clusters. |
|
ADTG | Advanced Data Table Gram | Microsoft Proprietary binary format for storing database data | |
ADUC | Active Directory Users and Computers | A snap-in in the Microsoft Management Console (MMC) | |
AEC | Architecture, Engineering, Construction | A computer graphics market requiring specialized applications that facilitate efficient planning, design, drafting, and analysis. | |
AES | Advanced Encryption Standard |
A competition is currently underway to
define a public 256-bit symmetric encryption algorithm that will
replace DES (Data Encryption Standard).
|
|
AF | Assured Forwarding audio frequency |
Using AF, a provider may offer different levels of service for IP
packets received from a customer domain. Each AF class is allocated a
specified amount of buffer space and bandwidth a frequency within the range of human hearing, 20 to 20,000 hertz |
|
AFC | antiferromagnetically coupled | A type of storage media that uses an advanced magnetic coating expected to dramatically increase HDD capacity. IBM shipped the first AVC-based storage products in 2001. | |
AFI | Authority and Format Identifier | This identifier is part of the network level address header. | |
AFIS | Automated Fingerprint Identification System |
a biometric ID methodology that uses
digital imaging technology to obtain, store, and analyze fingerprint
data. The AFIS was originally used by the U.S. Federal Bureau of
Investigation (FBI) in criminal cases.
|
|
AFK | Away From Keyboard | An example of Internet shorthand used in chat rooms, E-Mail, and instant messages. | |
AFM | Atomic Force Microscope | a powerful tool to manipulate matters at the nanoscale. It is today used for imaging a wide range of surfaces such as glass, composites, ceramics, polymers and biological samples. AFM finds increasing application in nanotechnology and biophysics. | |
AFP | Advanced Function Printing Apple Filing Protocol |
An IBM all-points-addressable enterprisewide print architecture. A client/server protocol used by Apple file service to share files and network services. AFP uses TCP/IP and other protocols to support communication between computers on a network. |
|
AFL | Academic Free License | permissive free software license written in 2002 by Lawrence E. Rosen | |
AGC | Automatic Gain Control | Most often used in audio circuits; an electronic circuit which automatically increases the volume when someone is speaking quietly and drops the volume when someone is speaking loudly, to keep the transmitted signal constant. | |
AGP | Accelerated Graphics Port | An Intel technology for desktop systems. It increases system performance by offloading graphic requirements from the system bus to a bus dedicated to video processing. | |
AHCI | Advanced Host Controller Interface | an interface specification that allows the storage driver to enable advanced SATA features such as Native Command Queuing and hot plug. | |
AHP | analytical hierarchy process | A process that uses hierarchical decomposition to deal with complex information in multicriterion decision making, such as information technology vendor and product evaluation. | |
AI | Action Indicator Adobe Illustrator artificial intelligence |
AI is an ISDN term AI is a draw program for Macintosh and Windows. It is especially useful for technical drawing. AI is the use of computers to simulate human thinking. Artificial intelligence is concerned with building computer programs that can solve problems creatively |
|
AIA | Application Integration Architecture | Application Integration Architecture | |
AID | attention identifier | A character in a data stream that is sent to the host system when a display station user presses an AID key. Typical AID keys are function keys or the Clear, Enter, Page Up, Page Down, Help, Print, and Home keys. | |
AIM | AOL Instant Messenger | an application that allows computer users to correspond with friends while online | |
AIN | Advanced Intelligent Network | Introduced by AT&T Network Systems in 1991, AIN enables service providers to define, test and introduce new multimedia messaging, personal-communication and cell-routing services. | |
AIO | all in one | These are printers that are a combination of various devices in one machine, including printer, scanner, fax machine and copier. | |
AIOD | Automatic Identified Outward Dialing | An option on a PBX that specifies the extension number instead of the PBX number on outward calls. Used for internal billing. | |
AIP | Advanced Inspection and Prevention |
Cisco ASA add-in modules | |
AIR | Additive Increase Rate | An ABR service parameter, AIR controls the rate at which the cell transmission rate increases. It is signaled as AIRF, where AIRF = AIR*Nrm/PCR. | |
AIT | Advanced Intelligent Tape | An eight-millimeter helical-scan tape drive designed and manufactured by Sony. Sony has differentiated its AIT drive from other 8-millimeter tape drives with a unique media feature on the tape cartridge called memory in cassette (MIC). | |
AIX | Advanced Interactive Executive |
AIX is an operating system developed by IBM and is in fact Unix-based.
|
|
Ajax | Asynchronous JavaScript and XML | A way of including content in a web page in which javascript code in the web page fetches some data from a server and displays it without re-fetching the entire surrounding page at the same time (hence the 'Asynchronous') | |
AJP | Apache JServ Protocol | Binary, packet-oriented protocol bridging the web server with the servlet container. The web server attempts to maintain persistent TCP connections to the servlet container, and to reuse a connection for multiple request/response cycles | |
AL PA | Arbitrated Loop Physical Address | In Fibre Channel transmissions, an 8-bit value used to identify a participating device in an arbitrated loop. | |
ALET | access list entry token | A token that serves as an index into an access list. | |
ALG | Application Layer Gateway | Used in conjuction with NAT to allow IP address translation | |
ALGOL | ALGOrithmic Language | a pair of programming languages that had a strong impact on programming language design. | |
ALI | Application layer interface |
The ALI forms the interface for the application layer in the
OSI reference model. It provides a clearly defined separation of communication and application
|
|
ALM | Application Life Cycle Management Asset Lifecycle Management Asynchronous Line Multiplexer |
the facility for common
process workflow and consolidation of planning, management, measurement and reporting of
work item activities in the development process. Asset Lifecycle Management A device that connects multiple terminals or other serial interface devices to Sun network file servers or workstations. Also known as "multiple terminal interface." |
|
ALP | Application Layer Program / Protocol | A program or network protocol at the Application Layer | |
ALSA | Advanced Linux Sound Architecture | Linux kernel component intended to replace the original Open Sound System for providing drivers for sound cards. | |
ALT | alternative |
Used in an HTML tag for the benefit of people using nongraphical
browsers, or for people using a browser with graphics turned off. A top-level category of "alternative" USENET newsgroups. The Alt key on the keyboard of PC compatibles, typically used in conjunction with other keys. |
|
ALU | Alcatel-Lucent arithmetic logic unit |
A leader in fixed, mobile and converged broadband networking, IP and
optics technologies, applications and services www.alcatel-lucent.com A CPU's core element, which carries out arithmetic computations. |
|
AM | Amplitude Modulation | A particular technology, most commonly used in radio broadcasting, where blending a modulated signal into a carrier wave by varying the amplitude of the carrier creates the final transmit frequency. | |
AMA | automatic message accounting | A function that automatically documents billing data related to subscriber-dialed long-distance calls. | |
Amanda | (formerly) Advanced Maryland Automatic Network Disk Archiver | an open source computer archiving tool that is able to back up data residing on multiple computers on a network. http://www.amanda.org/ | |
AMD | Active Matrix Display Advanced Microchip Devices architected model-driven |
LCD technology, used for computer screens, in which there is a
transistor for each pixel, which prevents losing image quality between
scans. A semiconductor manufacturer and is a major competitor of Intel. They manufacture the Athlon, Duron, and K6 CPU chips. www.amd.com SOA tools that automate models and rules |
|
AME | Advanced Metal Evaporated | A media formulation manufactured by Sony for use in its consumer and computer product lines. | |
ami | Analyze, Metricate, Improve | A method for software project management and process improvement. | |
AMI | advanced metering infrastructure Alternate Mark Inversion Application Messaging Interface |
utility-focused applications Line coding format used on T1 facilities that transmits ones by alternate positive and negative pulses. The programming interface provided by WebSphere MQ that defines a high level interface to message queuing services. |
|
AML | Anti-Money-Laundering Astronomical Markup Language |
Verify the identity of any person seeking to open an account, determine the source and
destination of their funding, and check the account opener's name against any
government-provided lists of known or suspected terrorists or terrorist organizations. A standardized format for exchange of metadata related to astronomy. This language will enhance the ability of astronomers to retrieve scientific data, and make it possible for humans and intelligent agents to use the same information. |
|
AMMA | Advanced Memory Management Architecture | Strategies for providing sufficient memory to all the processes in a computer system, performed by the memory management unit. | |
AMP | ampere (A) amplifier Asymmetric Multi-Processing |
a measurement of electrical current. One coulomb flowing per second. a term used for devices that increase output of sound or electrical voltage or current. an option built into many current operating systems to share CPU functions between two mirrored servers. |
|
AMPS | Advanced Mobile Phone System | The original standard specification for analog systems. Used primarily in North America, Latin America, Australia and parts of Russia and Asia. | |
AMR | Audio Modem Riser Automatic meter reading |
an Intel specification that defines a new architecture for the design of motherboards. the technology of automatically collecting consumption, diagnostic, and status data from water meter or energy metering devices (water, gas, electric) and transferring that data to a central database for billing, troubleshooting, and analyzing. |
|
AMRF | Action Message Retention Facility | A z/OS facility that, when active, retains all action messages except those specified by the installation. | |
AMS | access method services | A multifunction utility named IDCAMS that is used to manage catalogs, devices, and both VSAM and non-VSAM data sets. | |
AMT | Active Management Technology address mapping table |
Allows the IT team to better discover, heal, and protect their networked computing assets A table that provides a current mapping of node addresses to hardware addresses. |
|
AMTA | American Mobile Telecommunications Association | AMTA represents and promotes the interest of specialized wireless communications, meeting the educational, informational and regulatory needs of licensees and related businesses. See them at AMTAUSA.ORG. | |
ANDF | Architecture-Neutral Distribution Format | an emerging OSF standard for software distribution. Programs are compiled into ANDF before distribution, and executables are produced from it for the local target system. | |
ANI | Automatic Number Identification | The number associated with the telephone station from which switched calls are originated or terminated. | |
Anon FTP | Anonymous FTP | A method for downloading and uploading files using FTP protocol without having a username or a password. In place of a username, word "anonymous" is used, and in place of a password, email address is usually used. | |
ANOVA | analysis of variance | A form of statistical analysis. | |
ANR | automatic network routing | In High-Performance Routing (HPR), a highly efficient routing protocol that minimizes cycles and storage requirements for routing network layer packets through intermediate nodes on the route. | |
ANSI | American National Standards Institute | the main industrial standardization organization in the United States. There are official ANSI standards in almost all industries, and many of them have to do with computers. www.ansi.org | |
ANX | Automotive Network Exchange | Established by the Automotive Industry Action Group to offer extranet-based applications to suppliers of Chrysler, Ford and General Motors. | |
AOA | angle of arrival | Based on triangulation, a method of processing cellular phone signals, AOA allows the physical position of switched-on wireless devices to be located. | |
AOCE | Apple Open Collaboration Environment | Macintosh System 7 extensions that make it possible to share e-mail, directory, and other services in a multiplatform environment. | |
AoE | Ata Over Ethernet | Network protocol designed for simple, high-performance access of SATA storage devices over Ethernet networks. It gives the possibility to build SANs with low-cost, standard technologies | |
AOF | Advanced Open File application object file |
Backup exec option backs up open files during a backup job An ASCII text file that contains the names of the global description file and the component description files, which together describe the management characteristics of an application. |
|
AOL | America Online Application Object Library | AOL is founded in 1985, America Online, based in Dulles, Virginia, has become the world's leader in interactive services, Web brands, Internet technologies, and e-commerce services. www.aol.com AOL stand for Application Object Library | |
AOR | Address of Record |
An SIP term, an AOR provides a single public address for all
telecommunications. The AOR can be mapped across multiple devices and media types.
|
|
AP | access point | a hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN. APs are important for providing heightened wireless security and for extending the physical range of service a wireless user has access to. | |
APA | all-points addressable | Able to address, reference, and position text, overlays, and images at any defined position or picture element (pel) on the printable area of the paper. | |
APaaS | application platform as a service |
application platform as a service | |
APACS | Association for Payment Clearing Services | The organization that manages U.K. payment systems. | |
APaRT | automated packet recognition/translation | Technology that allows a server to be attached to CDDI or FDDI without requiring the reconfiguration of applications or network protocols. | |
APC | asynchronous procedure call American Power Conversion Antenna Phase Center |
A kernel-defined control object which represents a procedure that is called asynchronously within a particular thread context. American Power Conversion A theoretical point in the guidance receiver for which a position is derived. |
|
APDU | application-layer protocol data unit | In OSI, a protocol data unit in the application layer. | |
APF | Automated Purposing Framework | Collection of scripts and utilities that enable you to consistently and reliably prepare computer hardware (BIOS, mass storage) and install the Windows operating system and layered products on one or more build computers | |
API | Application Programming Interface |
An interface to a computer operating
system or software program that gives other programs access to
functions similar to those offered to users through a graphical user
interface.
|
|
APM | Active policy management Advanced Power Management application performance management |
analyzes
unstructured content in documents and e-mails, and applies the appropriate rules for access, life
cycle management and oversight. A feature from Intel and Microsoft for battery-powered computers, which powers-down or the display when the computer has been inactive for a certain length of time in order to conserve power. application performance management |
|
APML | Attention Profiling Markup Language | used to consolidate and aggregate individual users' ranked interests | |
APNIC | Asia Pacific Network Information Center | Nonprofit Internet registry organization for the Asia Pacific region. The other Internet registries are currently IANA, RIPE NCC, and InterNIC. http://www.apnic.net/ | |
APO | Advanced Planner and Optimizer | A supply-chain-planning suite from SAP. | |
APOP | Authenticated Post Office Protocol | similar to the POP protocol except that APOP enables your password to be encrypted while being transmitted over the network. | |
APOT | Alternate (Additional) Point of Termination | form identifies specific collocation terminations at the ICDF frame where the CLEC "UNE termination cables" are terminated. These terminations are used for the purpose of ordering UNEs, Ancillary Services, or Finished Services. | |
app | application | a computer program that performs useful work not related to the computer itself. Examples include WORD PROCESSORs, PRESENTATION GRAPHICS programs | |
APPC | Advanced Program-to-Program Communication | The programming interface to LU 6.2, IBM's protocol for peer-to-peer program communication under SNA. | |
APPN | Advanced Peer to Peer Networking | IBM data communications support that routes data between Advanced Peer-to-Peer Communication (APPC) systems to enable users anywhere on the network to have direct communication with each other. | |
APR | Apache Portable Runtime | Its mission is to provide a free library of C data structures and routines, forming a system portability layer to as many operating systems as possible, including Unices, MS Win32, BeOS and OS/2 | |
APS | advanced planning and scheduling Automatic Protection Switching |
A subcomponent of supply chain planning (SCP) that focuses on manufacturing planning and scheduling. A mean for automatically detecting and signalling a transmission link failure |
|
APWG | Anti-Phishing Working Group |
an international membership
organization that seeks to eliminate fraud based on attacks from
phishing and e-mail spoofing. These attacks hurt legitimate businesses
as the attackers fraudulently use the identity of an established
organization in their attack.
|
|
AQCB | Automated Quote Contract Billing | System used to price non-tariffed products and services. | |
AR | Access Rate Augmented reality |
The data rate of the user access channel. The rate (maximum) at which access devices can offer data to the frame relay network a technology that superimposes graphics, audio and other virtual enhancements over a live view of the real world. It is this "real world" element that differentiates AR from virtual reality. |
|
ARA | Apple Remote Access | Communication software designed to offer remote access to an AppleTalk-compatible network via an ARA server. | |
ARAD | architected rapid application development | SOA tools that automate models and rules | |
ARAG | AntiReflection AntiGlare | There are add-on screens for monitors that eliminate screen glare and protect the user’s eyes. | |
ARCNET | Attached Resource Computer NETwork | a LAN protocol, similar in purpose to Ethernet or Token Ring. | |
ARD | Automatic Ring Down | Private line connecting a station instrument in one location with a station instrument in another location. When station one is off hook, station two rings. Also called "hot line". | |
ARIA | Accessible Rich Internet Applications | ARIA, also WAI-ARIA, defines a way to make Web content and Web applications more accessible to people | |
ARIN | American Registry for Internet Numbers | the Internet registry service for North and South America, as well the Carribean and sub-Saharan Africa. http://arin.net/ | |
ARL | ABLE Rule Language | A rule-based programming language that is used to express business logic outside of program logic. ARL provides tight integration with Java objects, and the tooling provided with ABLE is based on the Eclipse platform. | |
ARM | Advanced RISC Machines | a RISC processor find most of their use on hand-held machines and PDAs. Currently owned by Intel, and currently produced by both the above and Digital/Compaq. | |
ARP | Address Resolution Protocol | A method for finding a host's Ethernet address from its Internet address. It works like this: The sender broadcasts an ARP packet containing the Internet address of another host and waits for it to send back its Ethernet address. | |
ARPANET | Advance Research Projects Agency Network | A packet-switched network developed in the early 1970s. The “father” of today’s Internet. ARPANET was decommissioned in June 1990. http://www.arpa.mil/ | |
ARQ | automatic repeat request | A modem status signal indicated by a light on the modem; in cases of transmissions errors, the ARQ is a request to the sender to retransmit. | |
ARS | Action Request System automatic route selection |
call tracking and resolution software provided by BMC Software Device (or software) which chooses the lowest cost route for long-distance calls over specific lines or services, including WATS, leased, specialized non-Bell common carriers or direct distance dialing (DDD). |
|
ART | Additional Reference Transmission | ART is carrier term | |
ARTS | Association for Retail Technology Standards | Data Model standard | |
ARu | audio response unit | Output device which provides a spoken response to digital inquiries from a telephone or other device. The response is usually assembled by a computer from a prerecorded vocabulary of words. | |
AS/400 | Application System/400 | A midrange computer system introduced by IBM in 1988 as a replacement for its System/36 and System/38 product families. | |
AS2 | Applicability Statement 2 |
a specification for EDI between
businesses using the Internet's Web page protocol, HTTP. The
specification is an extension of the earlier version, Applicability
Statement 1 (AS1).
|
|
ASA | average speed of answer | A standard quantitative method for measuring the speed at which call center calls are answered. | |
ASBR | Autonomous System Boundary Router | ASBRs run both OSPF and another routing protocol, such as RIP. ASBRs must reside in a nonstub OSPF area. | |
ASC | Abstract Syntax Checker | In OSI, a utility program for OSI Communications Subsystem that processes user-specified ASN.1 statements | |
ASCII | American Standard Code for Information Interchange |
pronounced as-kee, standard way of
encoding characters into digital codes. An ASCII file is taken to mean
a text file containing unformatted text that is, characters but not
information about fonts, sizes and so on.
|
|
ASCL | Asianet Satellite Communications Limited | dataline, broadband internet, leading ISP in kerala. asianet.co.in | |
ASE | Adaptive Server Enterprise application service element |
relational database management system product of Sybase Corporation, is a direct descendant of Sybase SQL Server. A set of functions in the application layer of OSI that provides a capability for the interworking of application entities for a specific purpose on a single application association. |
|
ASF | Advanced Streaming Format Automatic Sheet Feeder |
set of standards from Microsoft that is utilized in WMP7 technology. The technology dictates the different ways printers feed paper. Dot matrix printers usually run on a continuous Web of paper while laser printers or ink jet type printers are generally single sheet. They are also often referred to as page printers. |
|
ASIC | Application-Specific Integrated Circuit | A chip with custom-built hardware circuits for a particular set of functions. ASICs are commonly used in networking devices to maximize performance and provide integration of multiple functions into a single chip. | |
ASIF | access security information field | In SNA, a field within Function Management Header Type 5 (FMH-5), which is used to convey security information. | |
ASIS | access security information subfield | In SNA, a subfield within Function Management Header Type 5 (FMH-5), which is used to convey security information. | |
ASK | Anomalous State of Knowledge | ASK is a programming term | |
ASLR | Address Space Layout Randomization | a process which entails arranging the positions of major data areas randomly in virtual address space. Microsoft's Windows Vista and Windows Server 2008 have ASLR enabled by default | |
ASLS | Analog Single Line Station | a telephony term. An extension port on a PABX/KSU that will allow a standard household type phone to interface with the system. | |
ASM | Auto-sequencing memory Automatic Storage Management |
Anti machine data memory including data counters to be programmed by flowware to generate the data streams at run time. Oracle 10g database feature that provides the database administrator with a simple storage management interface that is consistent across all server and storage platforms |
|
ASML | originally ASM Lithography (ASM for Advanced Semiconductor Materials) | largest supplier in the world of photolithography systems for the semiconductor industry, founded in 1984 as a joint venture between the Dutch companies Advanced Semiconductor Materials International (ASMI) and Philips. www.asml.com | |
AS | Activesync | AS is Microsoft software | |
AS / ASN | autonomous system (number) | A number assigned to a local network, registered into the carrier's routing community and placed under the umbrella of an administrative domain called an autonomous system | |
ASN | Abstract Syntax Notation | The International Organization for Standardization's OSI language for describing abstract syntax. | |
ASN.1 | Abstract Syntax Notation One | In OSI, a notation for defining data structures and data types. The notation is defined in international standards ISO 8824/ITU X.208 and ISO 8825/ITU X.209. | |
ASO | Address Supporting Organization | ICANN Supporting Organization responsible for reviewing and developing recommendations on IP address policy aso.icann.org |
|
ASP | Abstract Service Primitive Active Server Pages Application Service Provider Average Selling Price |
Implementation-independent description of interaction
between service-user and service-provider at particular service
boundary, as defined by OSI. a Microsoft technology, allows programmers to develop custom code that works with Microsoft's IIS. Sometimes refered to as an "app-on-tap," this is a third-party company that distributes software-based services from a central location to customers in other locations. This term is used in the microchip manufacturing world. Companies like AMD and Intel strive for high ASPs. The ASP is an indication not only of direct profits, but how well a company is keeping up with the technology curve. |
|
ASPI | Advanced SCSI Programming Interface | An interface from Adaptec that allows application programs to access SCSI hardware. See SCSI. | |
ASPX | Active Server Pages eXtended | Dynamic web pages engine for the Microsoft .NET framework | |
ASQ | Automated Software Quality | The use of software tools, such as automated testing tools, to improve software quality. |
|
ASR | Automatic Send and Receive automatic speech recognition Automated system recovery |
Any one of several devices designed to transmit and receive data unattended, in contrast with RO, "receive only" devices. Another name for speech recognition technology. One of several backup mechanisms on Windows XP. ASR is intended to be taken infrequently, whenever there are changes in the system. |
|
ASV | Approved Scanning Vendor | Company approved by the PCI SSC to conduct external vulnerability scanning services. | |
AT | Advanced Technology | the class of IBM PCs originally introduced in 1984 using the 80286 microprocessor and a 16-bit bus | |
AT&T | American Telephone And Telegraph | The USA's major common carrier for long distance telephone lines. | |
ATA | Advanced Technology Attachment Analog Telephone Adaptor |
An integrated bus usually used between host processors and disk drives. Used interchangeably with IDE. connects the conventional telephone to the Internet, converts the analog voice signals into IP packets, delivers dial tone and manages the call setup. |
|
ATAG | Authoring Tool Accessibility Guidelines | W3C recommendation that explains how to develop authoring tools that make it easier to produce accessible Web pages that conform to the Web Content Accessibility Guidelines (WCAG) | |
ATAPI | AT Attachment Packet Interface | A hardware and software specification that documents the interface between a host computer and CD-ROM drives using the ATA bus. | |
ATB | all trunks busy | A single tone interrupted at a 120 impulses per minute (ipm) rate to indicate all lines or trunks in a routing group are busy. | |
ATCA | Advanced Telecom Computing Architecture |
ATCA provides the telecommunications
industry with an opportunity to adopt a standard architecture for a
broad spectrum of products, including wireless access, wireless core
networks, and IP Multimedia Subsystem IMS network elements.
|
|
ATG | advanced technology group Art Technology Group |
A group charged with researching, tracking and evaluating emerging
technologies for an enterprise, and with prototyping and piloting
advanced-technology projects prior to deployment. A developer of online customer relationship management applications, headquartered in Cambridge, Massachusetts. |
|
ATI | Allied Telesyn International | Networking hardware manufacturer | |
ATL | Active Template Library automated tape library |
A group of routines provided by Microsoft that can be used to help more easily create ASP, ActiveX, and COM objects in C++. A system used for high-capacity, tape-based data storage. ATLs typically have dozens of drives and can accommodate hundreds tape cartridges. |
|
ATLAS | Authorization Token Layer Acquisition Service | Describes the service needed to acquire authorization tokens to access a target system using the CSIv2 protocol. This design defines a single interface with which a client acquires an authorization token | |
ATM | Adobe Type Manager asynchronous transfer mode automated teller machine |
a software program or system extension manufactured by Adobe Systems
that is used to enhance the display of screen fonts on computer
monitors,
a transfer mode for switching and transmission that efficiently and flexibly organizes information into cells. It is asynchronous in the sense that the recurrence of cells depends on the required or instantaneous bit rate. A public banking machine that customers can access by inserting or swiping a magnetic card and entering a password. |
|
ATO | assemble to order | A strategy allowing a product or service to be made to meet the custom requirements of a specific order, where a large number of such customized products can be assembled in various forms from common components. | |
Atom | Any Transport over MPLS Atom |
a technology developed by Cisco for transporting Layer 2 packets over an IP/MPLS backbone. Atom is the name of an XML-based Web content and metadata syndication format, and an application-level protocol for publishing and editing Web resources belonging to periodically updated Web sites. |
|
ATP | AppleTalk Transaction Protocol available to promise |
In AppleTalk networks, a protocol that provides client/server request
and response functions for hosts accessing the ZIP for zone
information. The uncommitted portion of a company's inventory or planned production. This figure is frequently calculated from the master production schedule and is maintained as a tool for order promising. |
|
ATPCO | Airline Tariff Publishing Company | The central database where airlines file and publish their fares | |
ATRAC | Adaptive TRansform Acoustic Coding | Audio compression algorithm, introduced by Sony for its Mini Disk, which relies on the masking of low-amplitude frequency components by temporaly adjacent high-amplitude components | |
ATRN | Authenticated Turn | Authenticated Turn | |
ATSC | Advanced Television Systems Committee | an international, non-profit organization developing voluntary standards for digital television. | |
ATTIS | AT&T Information Systems | A division of AT&T Technologies that supplies and manufactures CPE. | |
ATU-C / ATU-R | ADSL Transmission Unit, Central or Remote | Device at end of ADSL line that stands between line and first item of equipment in subscriber premises or telephone switch. May be integrated within access node. | |
ATUL | ADSL Termination Unit Remote | ATUR is the ADSL modem or PC card that physically terminates an ADSL connection at the end user’s location. | |
ATVEF | Advanced TV Enhancement Forum | A standard for creating enhanced, interactive television content and for delivering that content to a range of television, set-top, and PC-based receivers (http://www.atvef.com). | |
ATX | Advanced Technology eXtended | A particular set of characteristics defining a generic type of motherboard, power supply and chassis combination. The definition came from Intel, along with a consortium of hardware and software makers to define the ability of the design. | |
AUDIT | AUtomated Data Input Terminal | AUtomated Data Input Terminal | |
AUI | Attachment Unit Interface | a device that contains a 15-bit pin, or socket, and is used to connect a NIC with a standard Ethernet cable. | |
AUIML | Abstract User Interface Markup Language | An XML implementation that provides a platform and technology-neutral method of representing windows, wizards, property sheets, and other user interface elements. | |
AUP | acceptable use policy | a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. | |
AUTOEXEC | Automatic Execution | When a program is executed on it's own. | |
AUTONEG | Autonegotiation | a feature that determines link options and optimal settings for a given Ethernet connection. When AUTONEG is enabled, a network interface card or a switch port can determine the capabilities of the device at the far end of the link and select the best mode of operation. | |
AUV | Autonomous Underwater Vehicle | a robotic device driven through water by a propulsion system. AUVs are self-sufficient vehicles carrying their own energy source. The control of the vehicle is done using an onboard computer thus eliminating the need of operators located elsewhere. | |
AUX | auxiliary device | A peripheral device that may perform a useful function but is not necessary for the operation of the computer. Examples are printers, scanners, and modems. | |
AV | Anti Virus Audio Video or Visual |
Anti Virus software pertaining to the recording and reproduction of sounds and pictures |
|
AVD | alternate voice data | A single transmission facility which can be used for either voice or data. | |
AVED | AntiVirus Emergency Discussion list |
A mailing list for professional
antivirus researchers allowing them to alert other researchers to
emerging or ongoing 'crisis' or 'emergency' virus events.
|
|
AVI | Audio/Video Interleaved | AVI is the most common format for audio/video data on the personal computer. | |
AVK | Application Verification Kit | Tool intended to help developers test their applications for correct use of J2EE APIs and portability across J2EE compatible application servers, and to help developers avoid inadvertently writing non-portable code | |
AVS | Application Visualisation System | a portable modular UNIX-based graphics package supported by a consortium of vendors including Convex, DEC, IBM, HP, SET Technologies, Stardent and WaveTracer. | |
AVST | Applied Voice & Speech Technologies Inc. | software company in the telecommunication industry http://www.avst.com/ | |
AWD | Access Workflow Designer | Organize and track information | |
AVVID | Architecture for Voice, Video and Integrated Data | An architectural approach for integrating enterprise voice, video and data traffic over IP-based networks, introduced by Cisco Systems in 1999. | |
AWE | Advanced WavEffects | A series of sound cards from Creative Labs that includes the Sound Blaster AWE 32, the Sound Blaster AWE64, and the AWE64 Gold. | |
AWS | Advanced Wireless Services Amazon Web Services | AWS-1 (or UMTS band IV) is a wireless telecommunications spectrum band used for mobile voice and data services, video, and messaging. AWS-1 is used in the United States. Amazon Web Services (AWS) delivers a set of services that together form a reliable, scalable, and inexpensive computing platform “in the cloud”. aws.amazon.com/ | |
AWT | Abstract Window Toolkit | In Java programming, a collection of GUI components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all operating system environments. | |
a+ | Pronounced A plus, a certification developed by the Computing Technology Industry Association (CompTIA) to validate vendor-neutral skills for entry-level computer technicians. Holders of the A+ certification have been trained in installing, repairing, troubleshooting, maintaining, customizing and operating PCs. | ||
AC97 | The popular audio system from Realtek. | ||
acoustic coupler | A special type of modem that converts acoustic energy (sound waves) into electrical energy, allowing a standard telephone handset to be attached to a computer or data terminal for data transmission. | ||
ActiveX | A Microsoft technology that facilitates various Internet applications, and therefore extends and enhances the functionality of Microsoft's Internet Explorer browser. Like Java, ActiveX enables the development of interactive content. | ||
Activity Streams | a publish/subscribe notification mechanism that provides frequent updates to subscribers about the activities or events that relate to another individual. | ||
Ada | a programming language developed in the late 1970s for the U.S. Department of Defense. | ||
Ad Hoc Network | A decentralized wireless network in which each node is capable of forwarding data to other nodes without relying on an established access point. An ad hoc network can be created spontaneously as needed and requires no permanent infrastructure. | ||
Adwords | an advertising service by Google for businesses wanting to display ads on Google and its advertising network. The AdWords program enables businesses to set a budget for advertising and only pay when people click the ads. adwords.google.com | ||
Aero | The new user interface for Windows Vista, except for the Start and Home Basic editions. | ||
air interface | a cellular industry term. It refers to the system that ensures compatibility between subscriber terminal equipment (i.e. cell phones and PDAs) and base stations. It involves the specification of channel frequencies and widths, | ||
air PBX | an IP-PBX system in which traditional PBX desk phones are replaced by cell phones. The implementation can be via WLAN or cellular. Devices using software telephone ("softphone") technology can use all functions provided by the call manager. | ||
always-on | An internet connection which remains on 24/7 such as ADSL or cable, rather than only connecting on demand like a dialup. | ||
Android | Linux based operating system that is backed by Google and the other members of the Open Handset Alliance. | ||
Anonymous | With no traceability; unable to ascertain the actual
identity of the claimed identity; very likely to imply naming that is
intentionally opaque. Anonymous FTP: Service supported by many Internet hosts. Typically, allows user to download documents, files, programs, and other publicly accessible data using FTP. |
||
antenna | A metallic device used to transmit and receive electromagnetic waves. An antenna can be a passive or active device. | ||
applet | This a Java program that can be embedded in a Web page. The difference between a standard Java application and a Java applet is that an applet can't access system resources on the local computer. | ||
archive | Data that is important information, stored for a long period of time in some recording media such as magnetic tapes, storage arrays or other non-active hard disks. | ||
atom | Atom is an alternate XML format for easily sharing content, much like RSS Really Simple Syndication (format). Blogs on http://www.blogger.com/ for example, publish Atom feeds. | ||
Autonomous Vehicles | can drive itself from a starting point to a predetermined destination in "autopilot" mode using various in-vehicle technologies and sensors, including GPS navigation technology | ||
avatar |
A graphical icon that represents a real person in a cyberspace system.
When you enter the system, you can choose from a number of fanciful
avatars. Sophisticated 3D avatars even change shape depending on what
they are doing A common name for the superuser account on UNIX systems. The other common name is root. |
||
AVG | AVG is a family of anti-virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing platforms, developed by AVG Technologies. http://www.avg.com | ||
AZERTY | The standard French language keyboard layout. Term comes from the first six letters below the row of numbers. |
B
B for bandwidth
abbreviation / acronyms | Term | Definition |
---|---|---|
b | bit | The number of bits used to represent a character. For personal computers a byte is usually 8 bits. |
B | byte | |
B channel | Bearer Channel | A wire used in ISDN service that can carry up to 64 Kbps of data when operating at full capacity. It is a clear channel "pipe" that carries voice, data, or video over ISDN. The BRI service offered to home users has two B channels. |
B2B | business-to-business | B2B is also commonly used as an adjective to describe any activity, be it B2B marketing, sales, or e-commerce, that occurs between businesses and other businesses |
B2C | business-to-consumer | B2C describes activities of commercial organizations serving the end consumer with products and/or services. It is usually applied exclusively to electronic commerce. |
B2E | business-to-employee | The use and leverage of e-business approaches and Internet technologies to deliver a comprehensive set of services to an enterprise's employees and their managers. The full term is sometimes presented as "business-to-enterprise." |
B8ZS | Binary Eight Zero Suppression. | 8ZS is a technique in T1 that modifies the AMI encoding to ensure minimum pulse density without altering customer data. When eight "zeros" in a row are detected, a pattern with intentional bipolar violations is substituted. |
B-HAVW | Behavioral Heuristic Analyzer in Virtual Environments | Bitdefender technology |
BAA | Blanket Authorization Agreement | Signed by interconnectors guaranteeing that they have authority of the end user customer to request CPNI and place service orders on the customer’s behalf. |
BAC | BroadCast Agent | Business Objects broadcast agent |
BACNET | Building Automation and Control Network protocol | a communications protocol for building automation and control networks. |
BAF | Bellcore AMA Format | Bellcore (Now Telcordia Technologies) AMA Format |
BAI | Bank Administration Institute | File / report format used in financial services industry |
BAM | business activity monitoring | A Gartner term that defines the concept of providing real-time access to critical business performance indicators to improve the speed and effectiveness of business operations. At its broadest level, BAM is the convergence of operational business intelligence and real-time application integration. |
BAN | Body Area Networks | an emerging field of technology that has the potential to revolutionize healthcare and pathbreaking applications in sports, communications and security. |
BAPI | Business Application Programming Interface | A set of documented, server-side interfaces to one or more R/3 processes, from SAP. BAPI packages multiple internal functions to enable programmatic access to such higher-order tasks as checking customer numbers, providing product descriptions, selecting products, creating quotations or creating orders. |
bar file | broker archive file | The unit of deployment to the broker; also known as a bar file. It contains any number of compiled message flows (.cmf), message sets (.dictionary), and a single deployment descriptor. |
Basel II | Basel Capital Accord | a regulatory framework for the banking sector, developed by the Basel Committee on Banking Supervision. This committee meets every three months at the Bank for International Settlements in Basel, Switzerland. |
BASH | Bourne-Again SHell | an interactive UNIX shell based on the traditional Bourne shell, but with increased functionality. BASH is the shell, or command language interpreter, that will appear in the GNU operating system |
BASIC | Beginners' All-purpose Symbolic Instruction Code | A high-level algebraic programming language developed at Dartmouth College in the 1960s and widely taught to beginning programmers. It is simple to use but lacks speed. |
BAT | Baby Advanced Technology batch |
A type of system board in Windows, a file whose name ends in .BAT and that contains a list of commands |
BBC | British Broadcasting Corporation Broadband Bearer Capability | The British Broadcasting Corporation (BBC) is a British public service broadcaster, headquartered at Broadcasting House in the City of Westminster, London http://www.bbc.co.uk/> A bearer class field that is part of the initial address message. |
BBCs | buffer-to-buffer credits | allow data communication in a Fibre Channel SAN where there are long spans of fiber optic cable. Unless storage distance extension is employed, latency imposes a distance limitation of a few kilometers between the source and the destination in the network. |
BBN | Bolt, Beranek and Newman | the last names of the three founders of BBN Technologies and the original name of the company. |
BBP | Business-to-Business Procurement | A catalog-based procurement product from SAP. |
BBS | Bulletin Board System | A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time. |
BC4J | Business Components For Java | Java 2 platform, Enterprise Edition (J2EE) framework that helps developers quickly construct high-performance J2EE applications following industry-standard design patterns |
BCB | buffer control block | An opaque cache manager structure that is used to maintain state as a file system pins and releases data (for example, its volume structure) in the cache. |
Bcc | Blind Carbon Copy | When you send an e-mail to only one person, you type the recipient's address in the "To:" field. When you send a message to more than one person, you have the option to enter addresses in the "Cc:" and "Bcc:" fields. |
BCC | Block Check Character | A control character added to a block in character oriented protocols (such as Bisync) used for determining if the block was received in error |
BCD | binary-coded decimal | a format for representing decimal numbers (integers) in which each digit is represented by four bits (nybble or nibble). See byte. For example, the number 375 would be represented as: 0011 0111 0101. |
BCE | Bell Canada Enterprises; | Canada's Largest Communications Company http://www.bce.ca |
BCEL | Byte Code Engineering Library | Library intended to give users a convenient possibility to analyze, create, and manipulate (binary) Java class files |
BCI | Business Continuity Institute | The BCI promotes the highest standards of professional competence and commercial ethics in the provision, maintenance and services for Business Continuity Management (BCM). |
BCM / BCMP | Business Continuity Management (Planning) | automates the collaborative research, analysis and writing needed to create a recovery plan for critical business and IT operations that can be published and distributed to the recovery teams. |
BCOCA | Bar Code Object Content Architecture | An architected collection of constructs used to interchange and present bar code data. |
BCP | Best Current Practice Bulk Copy Program business continuity planning |
Means that a certain manner of proceeding is in general the most logical choice A program used to copy databases or parts of databases in Sybase and Microsoft SQL Server environments. A broad approach to planning for the recovery of an enterprise's entire business process in event of a massive disruption caused by catastrophic event. |
BCS | basic content services | BCSs provide document library services with complementary ad hoc imaging, basic Web publishing, document collaboration and document routing as their core functionalities. |
BCUG | bilateral closed user group | In data communication, two users who have bilaterally agreed to communicate with each other, but not with other users. |
BCV | business continuance volume | EMC's name for the data volumes created by its Symmetrix TimeFinder feature. BCVs are copies of active data volumes that are separately addressed from the source volume. |
BCX | Basic To C Translator | an open source and free software, translates BASIC to C/C++ for compilation on various Win32 compilers. It is a small command line tool that takes a BASIC source code file and outputs a C/C++ source code file. |
BD | Blu-ray Disc | This is an optical disc format that was developed to enable recording, playback, and rewriting of HD video. This technology has a storage capacity far greater than that of traditional DVDs. |
BDC | Backup Domain Controller | Secondary to the PDC, provides user/computer domain authentication |
BDF | building distribution frame | The location in a building where equipment attaches a number of cables from the LDF's |
BECN | Backward Explicit Congestion Notification | A bit sent by a frame relay network to notify an interface device (DTE) that congestion avoidance procedures should be initiated by the sending device |
BEEP | Blocks Extensible Exchange Protocol | a framework for creating network application protocols. It is intended to abstract-out the common features that have traditionally been duplicated in each protocol implementation |
Bellcore | Bell Communications Research | A jointly owned, financed and centrally staffed organization of the regional holding companies formed after the AT&T divestiture in 1984, charged with establishing network standards and interfaces. Bellcore changed its name to Telcordia Technologies in 1999. |
BER | Basic Encoding Rules bit error rate |
Standard rules for encoding data units described in ASN.1. A measurement of digital transmission quality - the lower the rate, the higher the quality. A minimum BER is often specified in service-level agreements between digital carriers and their customers. |
BERT | Bit Error Rate Test | A test that reflects the ratio of errored bits to the total number transmitted. Usually shown in exponential form (10^-6) to indicate that one out of a certain number of bits are in error. |
BES | BlackBerry Enterprise Server | BlackBerry's mobility platform |
BFR | Bona Fide Request | Submitted CLECs with an interconnection, or pending, agreement with Qwest for non-tariffed, non-negotiated, non-mandated services, including operations standards. |
BFT | Binary File Transfer | A method of transferring files using fax modems. It's an extension to the fax protocol. |
BGA | ball grid array | As opposed to a pin grid array (PGA), a ball grid array is a type of microchip connection methodology. Ball grid array chips typically use a group of solder dots, or balls, arranged in concentric rectangles to connect to a circuit board. |
BGAN | Broadband Global Area Network | BGAN is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface. |
BGP | Border Gateway Protocol | The interdomain routing protocol implemented in Transmission Control Protocol/Internet Protocol (TCP/IP) networks. |
BGP-4 | Border Gateway Protocol-4 | A networking redundancy service based on BGP. It enables an enterprise to route Information Protocol (IP) traffic destined for the same IP address via different network connections. In a BGP-4 environment, when a transmission comes from an Internet service provider's network, it will look for the primary router that connects to the enterprise's location. |
BHCA | busy hour call attempt |
The capacity of a voice call processor
can be measured in BHCAs. BHCAs measure the amount of
calls that a voice system can attempt to handle in a
continuous one-hour period (for example, 2,500 busy hour call attempts
or, equivalently, 2,500 call attempts during the busy
hour). BHCA capacities include all calls attempted, whether
completed or not.
|
BHCC | busy hour call completion |
The capacity of a processor can be measured in terms of
BHCCs. BHCCs are a measure that includes only completed calls, which makes it a more rigorous metric than BHCA. |
BHLI | Broadband High Layer Information | This is a Q.2931 information element that identifies an application (or session layer protocol of an application). |
BHMC | Busy Hour Minutes of Capacity | For Switched Access |
BHO | Browser Help Object | a software component that can be added to Internet Explorer to add new functions. |
BI | business intelligence | An interactive process for exploring and analyzing structured, domain-specific information to discern business trends or patterns, thereby deriving insights and drawing conclusions. The BI process includes communicating findings and effecting change. |
BIA | business impact analysis | An analysis of the costs that would be incurred if a system or set of business processes failed to function properly. BIA is a required early step in the BCP process. |
BIBOP | big bag of pages | a technique that encodes object type in the high-order bits of their address, by using a lookup table that maps from those bits to a type. |
BIC | bank identifier code | A code used to uniquely identify a bank, logical terminal, or branch within a SWIFT network. |
BICI | Broadband Inter-Carrier Interface | A carrier-to-carrier interface line PNNI (private network-to-network interface) that is needed because carriers do not permit their switches to share routing information or detailed network maps with their competition's equipment. |
BiDi | Bi-Directional | the capability of a computer system to correctly display bi-directional text. |
BIDS | Business Intelligence Development Studio | IDE from Microsoft used for developing data analysis and Business Intelligence solutions utilizing the Microsoft SQL Server Analysis Services, Reporting Services and Integration Services |
Bin | binary | Binary data, composed of something other than human-readable text. Binary code, the digital representation of text and data |
Binhex | BINary HEXadecimal | A method for converting non-text files (non-ASCII) into ASCII. This is needed because Internet e-mail can only handle ASCII. |
BIOD | block input/output daemon | In the Network File System (NFS), a daemon that performs parallel read/write requests on behalf of an NFS client. |
BIOS | Basic Input/Output System | A fundamental element of PCs and other computers. It is a kind of built-in software that determines what a computer can do without accessing programs from a disk. |
BIP | Bit Interleaved Parity | Method used at PHY layer to monitor error performance of link. Check bit or word is sent in link overhead covering previous block or frame. Bit errors in payload will be detected and may be reported as maintenance information. |
BIPS | Bank Internet Payment System | The BIPS specification includes a protocol for sending payment instructions to banks safely over the Internet and a payment server architecture for processing those payment instructions |
BIRT | Business Intelligence and Reporting Tools | Open source, Eclipse-based reporting system that integrates with your application to produce compelling reports for both web and PDF. |
BIST | built-in self test | a feature included in newer integrated circuits and other electronic equipment |
BISUP | Broadband ISDN User's Part | SS7 protocol that defines signaling messages to control connections and services. |
Bisync or BSC | Binary SYNChronous | A synchronous communications protocol that transmits binary-coded data between two devices by using a set of control characters and control character sequences. |
Bit | Binary DigIT | A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. Bandwidthis usually measured in bits-per-second. |
BIT7 | Bit Seven | A TR008 DS1 line code that performs zero code suppression by placing a one in bit 7 of an all-zeros byte. |
BITNET | Because It's Time Networking | Low-cost, low-speed academic network consisting primarily of IBM mainframes and 9600-bps leased lines. BITNET is now part of CREN. |
BITS | Background Intelligent Transfer Service Banking Industry Technology Secretariat Bump-In-The-Stack |
Enables developers to write client applications that transfer files asynchronously between a client and server. The technology arm of the Bankers Roundtable, whose membership comprises the top 125 bank holding companies in the United States. Configuration where IPsec is implemented "underneath" an existing implementation of an IP protocol stack, between the native IP and the local network drivers. |
BITW | Bump-In-The-Wire | Configuration where IPsec is implemented through the use of an outboard crypto processor. |
BIW | Business Information Warehouse | A component of SAP's R/3 system. |
BL | BLade Server | An HP brandname for ProLiant BladeServers, which are designed forthe performance, management, density and total cost of ownership (TCO) savings requirements of data centers. |
BLAST | Basic Local Alignment Search Tool | consists of a set of algorithms. BLAST is used to compare biological sequences like protein sequences or nucleotides. With BLAST a comparison of individual sequence can be done against a database of sequences and information obtained in case there is matching of sequences. |
BLISS | Broadband Local Integrated Services Solution | Allows service providers to offer a bundle of packet-based services including local and long distance voice services and high-speed data |
B-LLI | Broadband Low Layer Information | This is a Q.2931 information element that identifies a layer 2 and a layer 3 protocol used by the application. |
BLOB | binary large object | A generic term used to describe the handling and storage of long strings of data by database management systems. A BLOB is a category of data, characterized by large size (including media formats such as audio and video), which can place extreme demands on storage systems and network bandwidth. |
Blog / BloggerBLOG | weB LOGBetter Listings on Google | A blog is basically a journal that is available on the web. The activity of updating a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog.Better Listings on Google |
BLS | Basic Link Service | a Fibre Channel request and response protocol used by all devices. |
BMRT | Blue Moon Rendering Tools | RenderMan-compliant photorealistic rendering systems. It was distributed as freeware |
BMT | Biel Mean Time | a synonym for Internet Time. BMT is followed by a @and 3 numbers ranging from 001 to 999. The Swatch organization devised an idea to divide the 24 hour day into 1000 "beats", often called Swatchbeats, each being 26.4 seconds in length. |
BNC | Bayone-Neill-Concelman / British Naval Connector | A connector type for 10Base2 or Thin-Net networks. Shaped like the letter T, it connects coaxial cables. The “T” has two male connectors and one female connector. |
BNF | Backus-Naur Form | formal meta-syntax for describing context-free syntaxes. In speech recognition, a special adaptation of grammar representation specified by Speech Recognition Control Language (SRCL) |
BNI | Broadband Network Interface | Broadband Network Interface |
BNOS | Brocade Network OS | Brocade OS that can converge fbre channel and IP onto a Linux core |
BO / BOBJ | Business Objects | a French enterprise software company, specializing in BI. Since 2007 is part of SAP AG. |
BOA | Basic Object Adapter | Software that provides CORBA-compliant services for object implementations. |
BOB | Breakout Box Business Object Broker |
Also known as an EIA monitor, a breakout box serves to monitor the
status of signals of the pins of an RS-232C connector or cable and
allows signals to be broken, patched, or cross-connected. SAP's message broker for R/3. |
BOC | Bell operating company | Any of the 22 original companies (or their successors) that were created from the breakup of AT&T in 1983. They were reorganized into seven Bell regional holding companies (RHCs). |
BOCU-1 | Binary Ordered Compression for Unicode | A Unicode compression scheme that is MIME-compatible (directly usable for e-mail) and preserves binary order, which is useful for databases and sorted lists. |
BoD | Bandwidth on Demand | BoD value-added service enables you to request additional bandwidth between any two locations during heavy demand period |
BOD | Business Object Document | A representation of a standard business process that flows within an organization or between organizations. BODs are defined by the Open Applications Group using XML. |
BOL | Books Online | A bookstore on the Internet created as a joint venture of German publisher Bertelsmann and French publisher Havas. It is designed to be pan-European with a Web site available in various local languages. http://www.bol.com |
BOM | Beginning of Message bill of materials Byte Order Mark |
a telephony term. A short electrical pulse provided by a digital announcer when used in certain 4 wire E & M modes. A structured list of the raw materials, parts and assemblies that constitute a product to be manufactured, often used in manufacturing and SCM systems. The Unicode character U+FEFF when used to indicate the byte order of a text. |
BONDING | Bandwidth on Demand Inter-Operability Group | An industry working group that develops common control and synchronization standards needed to manage high-speed data as it travels through the PSTN. These standards are for DS0 inverse multiplexing and switched services. |
boot | bootstrap | To start a computer and load the operating system to prepare the computer to execute an application. |
BOOTP | Bootstrap Protocol | A protocol - defined in Internet Engineering Task Force Request for Comment 951 - that enables a diskless client machine connected to an IP network to discover its own IP address and the address of a server running the protocol. |
BOPS | Billions of Processes Per Second | Processing speed |
bot / botnet | robot (network) | generally used to refer to an automated program used to
process data with minimal human intervention. Most often referred to as
certain types of search engines that seek out information from pages on
the Internet. A "botnet" is a network of computers that are infected with malware and then used to send spam and shut down Web sites (DDoS). |
BOT | beginning of tape build-operate-transfer |
In tape storage systems, the point at the start of the tape in a
cartridge. Tape cartridge load times are often measured in terms of the
time to BOT. A process used in several Asia/Pacific countries that allows foreign companies to build a telecommunications network in the country, operate it for a period and then transfer ownership to the government. |
BPA | Business Process Analysis business process automation |
the business-modeling space in
which business professionals and IT analysts collaborate on enterprise business architecture, aimed at transforming
and improving business performance. The automation of complex business processes and functions beyond conventional data manipulation and record-keeping activities, usually through the use of advanced technologies. |
BPC | Business Planning and Consolidation | SAP NetWeaver capabilities |
BPDM | Business Process Definition Metamodel | the first standard metamodel to facilitate development of service-oriented architectures within and among enterprises by unifying internal business or department processes (orchestration) with interactions between businesses or departments (choreography). |
BPDU | Bridge Protocol Data Unit | parts of the STP that help describe and identify attributes of a switch port. |
BPEL | Business Process Execution Language | An XML-based language for the formal specification of business processes and business interaction protocols. |
BPEL4WS | Business Process Execution Language for Web Services | A set of specifications released in 2002 by IBM and Microsoft, combining previously separate efforts of the two companies. BPEL4WS is designed to enable Web services to support workflow and business process execution. |
bpi | bits per inch | The density, measured in number of bits per inch, at which information can be stored on magnetic tape. |
BPL | broadband over power lines | This is a technology that has never emerged successfully from many attempts since the early '80s. It is a direct competitor with both DSL and cable connectivity and attempts the same capability over electrical transmission lines. |
BPM | business process management | BPM activities seek to make business processes more effective, more efficient, and more capable of adapting to an ever-changing environment. |
BPON | Broadband Passive Optical Network | BPON standards were set by the ITU-T as G.983.3 for a local loop technology running the ATM protocol over single mode fiber. |
BPOS | Business Productivity Online Standard Suite | Microsoft Cloud-based services |
BPP | Bluetooth Basic Printing Bridge Port Pair business process platform |
Represents a specially-developed Bluetooth profile that allows devices
to send text, e-mails, vCards, images or other items to printers based
on print jobs. Frame header information identifying a bridge/LAN pair of a Source route segment. a combined IT and business model that enables enterprises to accommodate rapid, but controlled, business process changes through the use of integrated process composition technologies and reusable business process components in a managed environment. |
BPPM | BMC ProactiveNet Performance Management | BMC's APM solution includes both real and synthetic transaction capabilities, including a passive end user experience agent deployed as a sofware process or within a VM as a virtual appliance. |
bps | Bits Per Second |
Bits per second is the standard way of
measuring how fast data moves across a network or phone system. For
example, a 56K modem can hypothetically transfer data at 56,700 bits
per second.
|
BPV | BiPolar Violation | the occurrence of two successive pulses of the same polarity in a bipolar signal. In T1 it is detected as an error. |
BRA | Basic Rate Access | The name used in Canada and Europe for Basic Rate Interface (see BRI). |
BRAN | Broadband Radio Access Networks | An ETSI project, it provides telecommunications services the middle ground between mobile systems and the wired access world |
BRAS | Broadband Remote Access Server | the aggregation point for the subscriber traffic. |
BRE | Business rule engines | used to automate controls, especially when business process management is implemented to standardize and automate critical regulated processes. |
BREW | Binary Runtime Environment for Wireless |
mobile channel technologies |
BRF | Benchmark Report Format | In computer graphics, a standard format for reporting benchmark results. This format provides the purchaser with a consistent data-tracking system for comparing hardware platforms. |
BRI | Basic Rate Interface | An Integrated Services Digital Network (ISDN) channel configuration. BRI - known as Basic Rate Access (BRA) in Canada and Europe - consists of two 64 kilobit per second (Kbps) data or voice channels, which are designated as B (bearer) channels, and one 16-Kbps signaling or packet data channel, designated as the D (delta) channel. BRI is, therefore, often referred to as 2B+D. |
BROUTER | Bridge-Router | This was an early technology, which took advantage of the (relative) speed of a bridge, but also provided the capabilities of a router. The brouter was characterized by the term, "bridge when possible, route when necessary." |
BRR | Business Readiness Rating | a proposed rating system for use by open source software community. |
BRZ | Bipolar Return to Zero | RZ is a bipolar signal in which each pulse returns to zero amplitude before its time period ends. This prevents the buildup of DC current on the signal line. |
BS 7799 | British Standard 7799 | A comprehensive standard from the British Standards Institute (BSI). Formally titled the "Code of Practice for Information Security Management," BS 7799 was significantly revised in 2000 and evolved into International Organization for Standardization (ISO) standard 17799 |
BSA | Business Software Alliance | A software industry coalition whose stated missions include industry education and copyright enforcement. |
BSC | Balance Score Card binary synchronous communication |
A business performance measurement system developed by Robert S. Kaplan
and David P. Norton, that provides a method of aligning business
activities to the strategy, and monitoring performance of strategic
goals over time. A data-communication line protocol that uses a set of transmission control characters and control character sequences to send binary-coded data over a communication line. |
BSD | Berkeley Software Distribution | the UNIX operating system derivative developed and distributed by the Computer Systems Research Group of the University of California, Berkeley, from 1977 to 1995 |
BSDI | Berkeley Software Design, Inc. | a commercial supplier of Internet and networking software based on the BSD (Berkeley) version of UNIX. |
BSE | Basic Service Elements | In Open Network Architecture, BSEs are functions of the switched network. A BSE normally consists of an access link element, a features/functions element, or a transport and usage element that connects Enhanced Service Providers to their customers. |
BSM | Business Service Management | a category of IT operations management software products that dynamically links the availability and performance events from underlying IT infrastructure and application components to the business-oriented IT services that enable business processes. |
BSNL | Bharat Sanchar Nigam Limited | a state-owned telecommunications company headquartered in New Delhi, India. BSNL is one of the largest Indian cellular service providers and the largest land line telephone provider in India. |
BSoD | Blue Screen of Death | Terminal error screen displayed by Microsoft Windows, not normally recoverable except by a reboot. Also known as a Stop Screen. A blue screen will display a STOP error code, which may give some indication as to the cause. |
BSP | board support package | Part of a software package that is processor or platform dependent. Typically, sample source code for the BSP is provided by the package developer. |
BSS | Base Station System Broadband Switching System business support system |
A wireless telecommunications term. A GSM device charged with managing
radio frequency resources and radio frequency transmission for a group
of BTSs.
A carrier (e.g. LEC or IXC) switch for broadband communications. Such switches are capable of switching frames (Frame Relay) or cells (SMDS and ATM) at a very high rate of speed. A category of support software and services used by telecommunications industry firms for customer records, installations, maintenance, billing and operations. |
BSSID | basic service set identifier | uniquely identifies each BSS, the SSID used in multiple, possibly overlapping. |
BST | binary search tree | a type of binary tree where the nodes are arranged in order: for each node, all elements in its left subtree are less-or-equal to the node (<=), and all the elements in its right subtree are greater than the node (>). |
BT | BitTorrent British Telecom bluetooth |
a P2P file sharing system that reduces dependency on
the original host (or the SEED) by having everyone who downloads the
file also offer it for anonymous upload to others British Telecom. wireless technology that allows devices to communicate at short range. A cell phone being used with a hands-free headset is one example. Sending a document between a Bluetooth-enabled laptop and printer is another. |
BTAG | Beginning Tag | An ATM term. A one octet field of the CPCS_PDU used in conjunction with the etag octet to form an association between the beginning of message and end of message. |
BTAM | Basic Telecommunications Access Method | a low-level programming interface specified by IBM for use on the IBM System/360 for sending and receiving data through telecommunication lines |
BTO | Business technology optimization | Business technology optimization |
BTM | Benchmark Timing Methodology business transaction monitoring |
In computer graphics, a method of measuring how long it takes to run the purchaser's benchmark interchange format program. business transaction monitoring |
BTS | Bits Per Second | In data communications, bits per second (abbreviated bps) is a common measure of data speed for computer modems and transmission carriers. |
BTW | By The Way | Computer jargon |
BTX | Balanced Technology eXtended | ntel has collaborated with the Desktop Computing industry to create an evolutionary step in the desktop computer form factor. BTX integrates cost-effective engineering and design strategies for power dissipation, structural integrity, acoustic performance, and motherboard design into a scalable form factor. |
BUS | Broadcast and Unknown Server | This server handles data sent by an LE Client to the broadcast MAC address ('FFFFFFFFFFFF'), all multicast traffic, and initial unicast frames which are sent by a LAN Emulation Client. |
BVD | Basic Virtual Disk | a VD configured using only non-hybrid RAID levels like RAID-0, RAID5 or RAID5E. Its elements are physical disks. |
BW | bandwidth |
The measure of the range of frequencies within a band required to
transmit a particular signal. The wider the bandwidth, the more
information it can carry.
Used to describe the data-carrying capacity of any given circuit or pathway. The measure of the rate at which information can be passed. |
BYOD | bring your own device | a type of VoIP subscription. Subscribers who have their own VoIP device (a SIP-capable device) when signing up for a VoIP service will usually be able to take advantage of a cheaper subscription plan |
back door | A usually hidden or secret means for an external user to break into your host, network, application, or data. See also virus | |
back end | the part of a computer system not directly interacting with the user. | |
backbone | Backbone network is the main communication path in a WAN; the set of cables or connections that carries most of the traffic | |
backhaul | The terrestrial link between an earth station and a switching or data center. | |
bandwidth shaping | The process of manipulating, managing or controlling (shaping) portions of a network connection to the outside world and determining an allowed bandwidth consumption based on types of activities. | |
bank | A slot or group of slots, usually on a systemboard (motherboard), that are populated by memory modules of the same capacity. A slang term for general memory in a computer; the memory bank. |
|
Baud Rate | The speed at which a modem sends and receives data, e.g., 2400 bps, 9600 bps. One baud is roughly equivalent to one bit per second. | |
benchmark / benchmarking | a computer program used to test the performance of a computer
or a piece of software. Measuring performance qualities (such as efficiency or spending) of enterprise organizations or processes (such IS) against comparative benchmarks. |
|
best-effort | Describes a network system that does not use a sophisticated acknowledgment system to guarantee reliable delivery of information. | |
best practice | A group of tasks that optimizes the efficiency or effectiveness of the business discipline or process to which it contributes. Best practices are generally adaptable and replicable across similar organizations or enterprises. | |
beta | Software that's still in the testing stage not quite ready for wide release. During a beta test users report bugs back to the developers. | |
bid | An attempt to gain control over a line in order to transmit data. Usually associated with contention style of sharing a single line among several terminals. |
|
Big Blue | A slang name for IBM. Blue is IBM's corporate color. | |
Biometric Authentication | use biometric traits to verify users' claimed identities when accessing devices, networks, networked applications or Web applications | |
black box | A generic term used to identify functional equipment segments, as opposed to circuitry, that make up each segment of a telecommunications system. | |
blade server | A server architecture that houses multiple server modules ("blades") in a single chassis. It is widely used in datacenters to save space and improve system management. | |
blawg | Slang term used to describe an online blog that is written by lawyers, or one that is focused on providing legal-oriented content. | |
bogie | also spelled bogey, refers to a false blip on a radar display. The term is also used to describe radar echoes that occur for unknown reasons, especially in the military, where such a signal might indicate hostile aircraft. | |
booking.com | Booking.com is the world's leading online hotel reservations agency by room nights sold, attracting over 30 million unique visitors each month via the Internet from both leisure and business markets worldwide. Priceline is the parent company. http://www.booking.com/ | |
Boolean | A term that originated in the in the realm of mathematics, and that is now commonly known for its application to search engine logic. A Boolean search allows for the inclusion or exclusion of documents containing certain keywords | |
Bottleneck | A point at which the performance or capacity of an entire system or network can be significantly influenced. Formally, a bottleneck lies on a network or system’s critical path and provides the lowest throughput. | |
bounce | The return of a piece of mail because of an error in its delivery. | |
Bricks and clicks | business that existed pre-Internet that now uses e-commerce technology to sell on the Internet |
|
bridge | Device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the data link layer (Layer 2) of the OSI reference model. | |
broadband | Broadband is another word for high-speed Internet. Because it transfers information quickly, broadband is ideal for downloading music and watching streaming videos. | |
broadcast | Data packet that are sent to all nodes on a network. Broadcasts are identified by a broadcast address. | |
buffer | A storage area used for handling data in transit. Buffers are used in internetworking to compensate for differences in processing speed between network devices. Bursts of data can be stored in buffers until they can be handled by slower processing devices. Sometimes referred to as a packet buffer. | |
bug | An error in a piece of software that stops it from working the way that it should do. | |
burn | Create a CD or DVD. | |
burst | Temporary increased network loading due to a data surge or alarm avalanche | |
bus | A communication pathway between the components in your computer. Bus topology has computers connected to a strand of network cabling that is connected to network repeaters at one end and terminated at the other. |
|
business technology | Pervasive technology use that boosts business results. | |
bypass mode | Operating mode on FDDI and token ring networks where an interface has de-inserted from the ring. |
C
C for Cache
abbreviation / acronyms | Term | Definition |
---|---|---|
C-GREX | Chaos Game Representation Explorer | a handy Bioinformatics tool for exploring the sequence visualization and pattern analysis of biological sequences including RNA, DNA and amino acid sequences. |
C++ / CPP | C Plus Plus | Object-oriented programming language based on C. Also, filename extension. |
C2A | Click-to-Action | A method for implementing cooperative portlets, whereby users can click an icon on a source portlet to transfer data to one or more target portlets. |
C4S | command, control, communications, and computer systems |
Integrated systems of doctrine, procedures, organizational structures,
personnel, equipment, facilities, and communications designed to
support a commander's exercise of command and control, through all
phases of the operational continuum. Integrated systems of doctrine, procedures, organizational structures, personnel, equipment, facilities, and communications designed to support a commander's exercise of command and control, across the range of military operations. |
C64/128 | Commodore 64/128 | The C64 computer to this day holds the record for being the most successful model of computer ever made with even the lowest estimates being in the tens of millions. Its big brother, the C128, was not quite as popular but still sold several million units. |
C&SI | consulting and system integration | Consulting & SI job or industry |
CA | Certificate Authority Computer Associates (formerly) |
a trusted third party used to create digital
certificates and private/public key pairs and to
guarantee that the party signing a document is the person
they claim to be. IT software market leader http://www.ca.com |
CaaS | Communications as a Service | The utilization of enterprise-class communications applications and technology (such as IP telephony, contact center services and unified communications) is offered as a service. |
CAC | Call Admission Control Carrier Access Code Connection Admission Control |
The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies. Five to seven-digit number that identifies which interexchange carrier call uses. Subscribers dial these digits with each long distance call or pre-subscribe to particular carrier and let digital switch software add CAC. the set of actions taken by the network during the call set- up phase (or during call re-negotiation phase) in order to determine whether a connection request can be accepted or should be rejected. |
CAD/ CAM | Computer-Aided Design / Manufacturing |
Also known by engineers and architects
as the best invention of all time. Today, CAD software is used for
nearly all three-dimensional designing. Designers can turn an object
into an electronic representation more quickly and accurately than by
diagraming it with a pencil and paper.
|
CAI | Common Air Interface | A standard that defines technical parameters for control and information signals passed between a radio transmitter and receiver, so that communication may take place between equipment manufactured by different companies. |
CAL | Client Access License | A Microsoft software license program. The cost of clients accessing specially licensed servers. There are typically two methods of licensing access to a server or a separately-priced service. These were previously known as "Per- server or per-seat. |
CALEA | Communications Assistance for Law Enforcement Act |
This is a U.S. legal framework enabling telephone call interception in certain circumstances. Please refer to http://www.fcc.gov/calea/ for further details.
|
CAM | Capital Asset Management channel access method computer-aided manufacturing |
Oracle JD Edwards EnterpriseOne EAM solution a protocol for how data is transmitted in the bottom two layers of the OSI model. a type of computer application that helps automate a factory. |
CAMA | centralized automatic message accounting | An automatic message accounting system that serves more than one switch from a central location. |
CAMEL | Customized Application for Mobile networks Enhanced Logic | a feature of GSM that allows users to roam between networks. CAMEL is a standard that is now starting to be deployed. |
CAN | Campus Area Network cancel character Controller–area network |
a network which involves interconnectivity between buildings in a set
geographic area, such as a campus, major hospital, large corporate
enterprise, industrial park, or other such non-public access
environment. A control character used by some conventions to indicate that the data with which it is associated are in error or are to be disregarded. a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer. |
CAN-SPAM | Controlling the Assault of Non-Solicited Pornography and Marketing |
a law passed by the U.S. Congress in 2003 (15 U.S.C. 7701) providing penalties for sending deceptive mass e-mails. The act required the Federal Trade Commission to investigate whether or not to establish a national Do Not E-mail registry |
CAP | carrierless amplitude phase modulation | A multilevel, multiphase encoding method for transmitting data over twisted pair lines. It is a superset of the legacy protocol used by analog modems. |
CAPA | CA Productivity Accelerator | a set of interactive features and functions to help ease training, navigation, use and process adoption of the product once it is live and in use in the field. |
CAPE | concurrent art-to-product environment | A design approach that brings together a variety of synergistic applications, including visualization, rapid prototyping, analysis, materials selection, machining and cost estimation. |
CAPI | Common Application Programming interface Computer Assisted Personal Interviewing Computer Assisted Programming Interface |
API standard used to access ISDN equipment, equipment that use the
integrated services digital network ISDN standard for the transfer of
data over telephone lines. Surveying using a computer-based questionnaire. CAPI allows the interviewer to customize the survey, so that respondents answer questions only about subjects they're familiar with and receive questions in a random order to avoid biases. another name for a program generator. These programs were first made in the early days of Z80 microcomputers to create programs in BASIC for people that were not programmers. |
caps | capital letters | capital letters |
CAPTCHA | Completely Automated Public Turing Test to tell Computers and Humans Apart | a challenge-response system test designed to differentiate humans from automated programs. http://www.captcha.net/ |
CAR | committed access rate | A metric used in network quality-of-service agreements to classify and limit customer traffic and manage excess traffic according to the network policy. |
CARE | Customer Account Record Exchange | National guidelines for the formats and language used in mechanized exchanges of Equal Access-related information between Interexchange Carriers and telephone companies. |
CAROT | Centralized Automatic Reporting on Trunks | A mechanized system for testing of trunks to ensure that trunks are accessible to traffic, function properly during call setup and termination, and provide a proper transmission path during a call. |
CARP | Common Address Redundancy Protocol | Allows multiple hosts on the same local network to share a set of IP addresses among them |
CART | command and response token | An 8-byte token that is added to write-to-operator (WTO) commands; it enables the response WTO to be associated with the command that invoked it. |
CAS | centralized attendant services channel associated signaling Column Address Strobe computer algebra system Common Analysis Structure Content-Addressed Storage |
A function of a usually centrally located attendant console that
permits the control of multiple switches, some of which may be
geographically remote. A method of communicating telephony supervisory or line signaling (on-hook and off-hook) and address signaling on T1 and E1 digital links. An electrical signal that determines which column is read or written to on a DRAM chip. You must combine a column address strobe with a row address strobe to define a location on a DRAM chip. CAS is to automate tedious and sometimes difficult algebraic manipulation tasks. more... A structure that stores the content and metadata of a document, and all analysis results that are produced by a text analysis engine. enables users to store and retrieve files based on a file's name, content or unique identifier. CAS is often deployed in a scale-out RAIN architecture. |
CASE | computer-aided software engineering | An umbrella term for a collection of application development tools designed to increase programmer productivity. |
CAT | Communications Authority of Thailand Computer-Assisted Translation |
The exclusive operator of Thailand's international telecommunications
services to the rest of the world. In addition to telecommunications
services, it provides data communications, mobile and satellite
services. Indicates the use of a series of data processing tools aimed at assisting the translator on a level of coherency (consistency) of the text and in terms of working speed |
CAT n | Category n |
As in Category 5 (Cat 5), 5e
(enhanced), 6 or 6e copper cabling typically used in
buildings to connect PCs and telephony handsets to hubs or switches. The
category indicates a specific gauge of wiring.
|
CATI | computer-aided telephone interviewing | Technology used facilitate information gathering via phone interviews (for example, for survey purposes). |
CATIA | Computer Aided Three-dimensional Interactive Application | a multi-platform CAD/CAM/CAE commercial software suite developed by the French company Dassault Systemes and marketed worldwide by IBM |
CATP | Caffeine Access Transport Protocol | Common method of moving caffeine across Wide Area Networks such as the Internet . CATP was first used at the Binary Cafe in Cybertown and quickly spread world-wide. |
CATS | Calling Card & Third Number Settlement | An telephone company system for ICS (intercompany settlements) processed through CMDS (Centralized Message Distribution System). |
CATV | community antenna television (or Cable TV system) | Commonly known as "cable TV." Television signals are received at a selected site and retransmitted to subscribers via a cable network. Additional channels, not normally available in that area, can also be transmitted. |
CAV | Constant Angular Velocity | A method of reading (or writing) data from (or to) a spinning disk. As data is read from the disk, the drive motor always spins at the same speed. |
cB | C Beautifier | A tool for tidying the syntax of source code. |
CBC | cipher block chaining | A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted. |
CBL | Composite Blocking List | Takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics which are specific to open proxies of various sorts which have been abused to send spam, worms/viruses that do their own mail transmission |
CBN | common bonding network | The set of metallic components that are intentionally or incidentally interconnected to provide the principal means for effecting bonding and grounding inside a telecommunications building. |
CBQ | Class-Based Queuing | A public domain QoS methodology for classifying packets and queuing them according to criteria defined by an administrator to provide differential forwarding behavior for each traffic class |
CBP | Certifed Biometrics Professional |
IEEE program focuses on the relevant knowledge and skills needed to apply biometrics to real-world challenges and applications. |
cbr files | Comic Book Archive | CBR files rarred file archives with their extension changed from .rar to .cbr |
CBR | constant bit rate content based routing |
An ATM service category, defined by the ATM Forum, that guarantees a
constant bandwidth with low delay, jitter and cell loss. Circuit
emulation is a typical application. An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm. |
CBT | Computer Based Training | A form of education in which the student learns by executing special training programs on a computer. Unlike Web-based training programs, CBT does not require an Internet connection. |
CBWFQ | Class-Based Weighted Fair Queueing | Extends the standard WFQ functionality to provide support for user-defined traffic classes. For CBWFQ, you define traffic classes based on match criteria including protocols, ACLs, and input interfaces |
cc | carbon copy | An option in most e-mail programs, it allows you to send duplicate copies of an e-mail message. When you type a recipient's e-mail address in the cc field, it is viewable to everyone who receives the e-mail message . |
CC | closed captioning | A service that transmits text captions for a television program and can be displayed on any modern television with a display size measuring greater than 13 inches (33 cm) diagonally. |
CCA | Citrix Certified Administrator | Entry to mid level certification for IT professionals who want to “demonstrate product expertise on Citrix platform products |
CCAs | composite content applications | case management and front-end access for field personnel to complex back-end applications |
CCC | Clear Channel Capability | A characteristic of a transmission path in which the bit position allocated for customer data may represent any combination of zeros and ones. . Also refer to Clear Channel |
CCD | Charge Coupled Device | a solid-state chip containing a series of tiny, light-sensitive photosites and was originally developed by Honeywell . The heart of all electronic and digital cameras. |
CCD+ | Cash Concentration and Disbursement plus addenda | One of the primary message formats necessary for enterprise-initiated payments to traverse the U.S. national banks' clearinghouse system. The format is limited to a single addendum record (one invoice, one payment), and many banks can process it. |
CCF | call control function | The network intelligence that provides call/connection processing and control. |
CCH | connections per circuit hour | A unit of traffic measurement expressed as the number of connections established at a switching point per hour. A unit of traffic measurement used to express the rate at which circuits are established at a switch. |
CCHIT | Certification Commission for Health Information Technology | A voluntary, private sector organization launched in 2004 to certify health information technology (HIT) products such as electronic health records and the networks over which they interoperate. www.cchit.org |
CCI | controlled cryptographic item | Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements. |
CCIE | Cisco Certified Internetwork Expert | Cisco Certified Internetwork Expert. |
CCIR | Comite Consultatif International des Radio Communications | Abbreviation of the French name for the International Radio Communications Consultative Committee, now part of the ITU. |
CCIS | common-channel interoffice signaling | In multichannel switched networks, a method of transmitting all signaling information for a group of trunks by encoding it and transmitting it over a separate channel using time-division digital techniques. |
CCITT | International Telegraph and Telephone Consultative Committee | French acronym for the international standards organization. Part of the United National ITU. |
CCL | Communications Control Language | a file that dialers and browsers use to control the modem connection. These files should not be changed except by the supplied editor. |
CCNA | Cisco Certified Network Associate | Cisco Certified Network Associate |
ccNSO | Country Code Names Supporting Organization | the policy-development body for a narrow range of global issues regarding ccTLD within the ICANN structure. ccnso.icann.org |
CCOW | Clinical Context Object Workgroup | A group that defines standards for collaboration among applications on clinical workstations. Originally an independent consortium, CCOW is now technical committee of the HL7 standards organization. |
CCP | Certified Computer Professional | The award for successful completion of a comprehensive examination on computers. Also Certificate in Computer Programming. |
CCPM | Critical Chain Project Management | Lean methodology for doing projects |
CCR | channel command retry Cluster Continuous Replication Commitment, Concurrency and Recovery Continuity of Care Record Current Cell Rate |
In mainframe computing, the protocol used between a channel and a
control unit that enables the control unit to request that the channel
reissue the current command. Microsoft Exchange's capability to replicate data between clustered nodes An International Organization for Standardization's OSI application service element used to create atomic operations across distributed systems. a document standard that functions as an ongoing record of a patient’s care. The currently acceptable transmission rate for an end-system as defined by RM cells within ABR. |
CCS | Centum Call Seconds Coded Character Set common channel signaling Control Compliance Suite |
One hundred call seconds or one hundred seconds of telephone
conversation. One hour of telephone traffic is equal to 36 CCS (60 x 60
= 3600 divided by 100 = 36) which is equal to one erlang. A character set in which each character is assigned a numeric code point. A method of communicating telephony information and line signaling events (for example, call setup and call clearing) on a dedicated signaling channel. Symantec's risk management product to provide end- user organisations with the ability to properly control, and accurately maintain, key IT compliance processes. |
CCSA | common control switching arrangement | An arrangement in which switching for a private network is provided by one or more common control switching systems. |
CCSE | Checkpoint Certified Security Expert | Checkpoint Certification. Stage 2 after completing the CCSA |
ccTLD | country code Top-Level Domain | an Internet top-level domain generally used or reserved for a country or a dependent territory. |
CCTV | Closed-Circuit Television |
A networked camera used for surveillance, process monitoring and other purposes.
|
CD | Compact Disc | An optical form of storage media, typically used for audio and software programs. |
CD Table | change-data table | In SQL replication, a replication table on the Capture control server that contains changed data for a replication source table. |
CDB | capacity database | capacity database |
CDC | call data channel | The logical link between the device performing an electronic surveillance access function and the LEA (law enforcement agency) that primarily carries call-identifying information. |
CDDI | Copper Distributed Data Interface | An American National Standards Institute specification for transmitting FDDI signals over copper media. CDDI runs on both shielded and unshielded twisted-pair cabling. |
CDE | common desktop environment | popular commercial window manager (and much more -- as its name touts, it is more of a desktop environment) that runs under X-Windows. Free work-alike versions are also available. |
CDF | Channel Definition Format combined distribution frame |
bA way of defining the server-push channels for accessing frequently changing web content. A distribution frame that combines the functions of main and intermediate distribution frames and contains both vertical and horizontal terminating blocks. |
CDFS | compact disc file system | Controls access to the contents of CD-ROM drives. Based on the ISO 9660 Standard (but extends it to allow long and double-byte filenames). |
CDH | Customer Data Hub | Oracle MDM product |
CDI | client device identification Customer Data Integration |
software detecting account takeovers, new account fraud and e-commerce fraud combination of the technology, processes and services needed to create and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business lines, and enterprises. |
CDMA | Code Division Multiple Access |
A digital cellular phone service that
offers up to 20 times more call-handling capacity than conventional
cellular systems by assigning a special electronic code to each signal.
|
CDN | content-delivery network | A network specializing in the delivery of streaming audio and video. |
CDO | care delivery organization | A category of enterprises that use healthcare information systems. CDOs are organizations, such as hospitals and physician practices, whose primary mission is to deliver healthcare-related services. |
CDP | Cisco Discovery Protocol Continuous Data Protection |
Used by Cisco Routers technology provided by NetBackup RealTime Protection captures every write at the LUN level |
CDPD | Cellular Digital Packet Data | A packet data protocol standard for sending wireless data, it was developed for use on cellular phone frequencies. It transmits data in packets on unused cellular channels (in the 800MHz to 900 MHz range). |
CDR | call detail recording clinical data repository |
A means of capturing telephone system information on calls made for
processing into management reports. Captured information includes who
made the call, where it went and what time of day it was made. A database for storage of clinical information in a computer-based patient record |
CD-R | Compact Disc—Recordable | a type of CD that can be recorded by the user. CD-Rs have the same capacity and are readable in the same drives as ordinary CDs |
CD-ROM | compact disc read-only memory | A version of the standard CD intended to store general-purpose digital data. CD-ROMs can store a wide variety of data, such as music, video and graphics. |
CD-RW | Compact disc-rewritable | Replacing the CD-ROM in desktop computers is the CD-RW, standing for Compact Disc Rewritable. The CD-RW lets you create backup files or make music compilations by "writing" the files on the disc. |
CDS | Correlated Double Sampling | Technology to clean the image signal during scanning |
CDT | C/C++ Development Tools | Eclipse subproject working towards providing a fully functional C and C++ Integrated Development Environment (IDE) for the Eclipse platform |
CDV | Cell Delay Variation | A QoS parameter that measures the difference between the transfer delay of a single cell transfer delay and the expected transfer delay. |
CE router | Customer edge router | A router that is part of a customer network and that interfaces to a provider edge (PE) router. |
CEA | Consumer Electronics Association | CEA is the industry authority on market research and forecasts; consumer surveys; legislative and regulatory news; engineering standards; training resources. http://www.ce.org |
CEAP | cloud-enabled application platforms | cloud-enabled application platforms |
CEBP | communication-enabled business process | key capability of UC is that it offers a method to integrate communication functions directly with business applications |
CeCILL | CEA CNRS INRIA Logiciel Libre | Free Software license adapted to both International and French legal matters, in the spirit of and retaining compatibility with the GNU General Public License. |
CEF | Cisco Express Forwarding Character Encoding Form |
Advanced, Layer 3 IP switching technology. It optimizes network
performance and scalability for networks with large and dynamic traffic
patterns Mapping from a character set definition to the actual code units used to represent the data. |
CEH | Certified Ethical Hacker | Certification in IT security issued by The International Council of Electronic Commerce Consultants (EC-Council) |
CEI | Common Event Infrastructure comparably efficient interconnection |
The implementation of a set of APIs and infrastructure for the
creation, transmission, persistence, and distribution of business,
system, and network Common Base Events. An equal-access concept developed by the FCC.. |
CEIM | Common Enterprise Information Model | the ability to define actions and execute processes right from BI metadata |
CELL/B.E. | Cell Broadband Engine | A breakthrough microprocessor with unique capabilities for applications requiring video, 3D graphics, or high-performance computation for imaging, security, visualization, health care, surveillance, and more. |
cellphone | Cellular Telephone | A mobile, wireless telephone that communicates with a local transmitter using a short-wave analog or digital transmission. |
CELP | code-excited linear prediction | An analog-to-digital voice coding scheme. |
CEM | customer experience management | Aligning executive involvement, operational processes, organizational structure, and technology infrastructure to stimulate, anticipate, and satisfy customer needs. |
CEMF | Cisco Element Management Framework | Collects fault information from various sources.Network elements, such as routers or switches, may report fault conditions as SNMP traps, Syslog messages |
CEP | complex event processing | Sofware infrastructure that can detect patterns of events (and expected events that didn’t occur) by fltering, correlating, contextualizing, and analyzing data captured from disparate live data sources to respond as defned using the platform’s development tools. |
CEPS | Common Electronic Purse Standard | A standard endorsed by Visa and American Express for electronic purse (e-purse) or stored-value applications on smart cards. |
CER | Corporate Error Reporting | Tool that allows IT Administrators to manage error reports and error messages created by the Windows Error Reporting client (WER) in Windows XP and Windows Server 2003 |
CERN | Conseil Europeen pour la Recherche Nucleaire | The original, French name of the European Organization for Nuclear Research, headquartered in Geneva, Switzerland. A nuclear research laboratory where the World Wide Web was invented. |
CERT | Computer Emergency Response Team | A group formed in 1998 by the U.S. Defense Advanced Research Projects Agency |
CES | Character Encoding Scheme Consumer Electronics Show | A CES is character encoding form plus byte serialization. There are seven character encoding schemes in Unicode: UTF-8, UTF-16, UTF-16BE, UTF-16LE, UTF-32, UTF-32BE, and UTF-32LE. CES is a major technology-related trade show held each January in the Las Vegas Convention Center. http://cesweb.org/ |
CESID | caller's emergency service identification | The number used to identify the calling terminal within the context of the emergency service call. |
CEVA | content-enabled vertical application | CEVAs typically help to automate complex processes that previously required workers to sort through paper documents and other forms of content manually. |
CF | Compact Flash | a very small removable mass storage device. First introduced in 1994 by SanDisk Corporation, CF memory Cards weigh a half ounce and are the size of a matchbook. CF memory Card is the world's most popular removable mass storage device. |
CFA | Circuit Facility Assignment Color Filter Array |
Allows Wholesale Access customers to validate the DS1/DS3 at system and channel Levels. In digital imaging, CFAs assign a separate primary color to each pixel by placing a filter of that color over the pixel |
CFB | Ciphertext feedback | a mode of operation for a block cipher. In contrast to the CBC mode, which encrypts a set number of bits of plaintext at a time, it is at times desirable to encrypt and transfer some plaintext values instantly one at a time, for which ciphertext feedback is a method. |
CFM | Code Fragment Manager Cubic Feet per Minute |
the library manager and code loader for processes based on PEF (Preferred Executable Format) object files (in Carbon). A measure of airflow, and you can use it to compare the efficiency of fans designed to cool computers or computer components. |
CfMD | Certified for Microsoft Dynamics | a label for add-on products that ISV have built to expand the functionality of Dynamics |
CFMN | Client For Microsoft Networks | 32-bit, protected-mode network client for Windows 9x that provides the redirector and other software components for Microsoft networking |
CFV | Call For Votes | Initiates the voting period for a Usenet newsgroup. At least one email address is customarily included as a repository for the votes. |
CG | Computer Graphics | graphics created using computers and, more generally, the representation and manipulation of pictorial data by a computer. |
CGA | Colour Graphics Adaptor | A computer standard using digital signals offering a resolution of 320 by 200 pixels, a palette of 16 colors. |
CGI | Common Gateway Interface Conseillers en Gestion et Informatique (french) |
a set of rules for running scripts or programs on a Web server. When
you submit information to a Web server, there's a good chance that the
server is using a CGI script to receive and process the data.
"Information Systems and Management Consultants" in English, IT management and business process services (BPS) company. Founded in 1976 and headquartered in Montreal, Canada www.cgi.com |
CGM | Consumer-generated media | any written, audio or video content created by end users, using basic or semiprofessional tools. |
CGMP | Cisco Group Multicast Protocol | A form of IGMP snooping that lets the switch send multicasts only to the ports on a VLAN that are participating in the multicast |
CHAP | Challenge Handshake Authentication Protocol | A security protocol used by a server to grant or deny system access based on a client-supplied password, which is encrypted prior to transmission. |
Charset | character set | A set of characters used in Windows. Charsets refer to the same collections of characters as those defined by Windows code pages. |
chat | conversational hypertext access technology | A form of interactive online typewritten communication that allows participants ("members") to engage in text-message conferencing, via real-time computer networking over designated communications facilities |
CHIPS | Clearing House Interbank Payments System | A clearing system that processes very large payments (valued at an average of $1.4 trillion a day) in more than 27 countries. |
ChR | channel reliability | The percentage of time a channel was available for use in a specified period of scheduled availability |
cHTML | Compact Hypertext Markup Language | A proprietary version of HTML adopted by NTT DoCoMo for i-mode. |
CIA | confidentiality, integrity, and availability | InfoSec dimensions. |
CIC | circuit identification code Cisco Info Center Customer Interaction Center |
A 12-bit number that identifies a trunk and channel on which a call is carried. A service-level monitoring and diagnostics tool that provides network fault and performance monitoring, trouble isolation, and real-time service-level management for large networks Interactive Intelligence's all-in-one software solution includes telephony, audioconferencing, UM, rich presence with IM, business process automation. |
CICS | Customer Information Control System | A software program designed to OLTP, it was developed by IBM. It is one of the most widely used programs for creating customer transaction systems. |
CIDR | Classless Internet Domain Routing | A protocol that allows for variable-length addresses that allows for more- and less-specific routing information. This replaces the old class A, class B, class C routing scheme. |
CIE | Commission Internationale de l'Eclairage | An organization that has established a number of widely-used color definitions. www.cie.co.at |
CIFS | Common Internet File System | the file sharing protocol that forms the basis of Microsoft Windows networking. Formerly known as SMB (Server Message Block), it is also supported by UNIX and Linux systems using the Samba software package. |
CIK | crypto-ignition key | device or electronic key used to unlock the secure mode of crypto-equipment. |
CIM | Common Information Model | Provides a common definition of management information for systems, networks, applications and services, and allows for vendor extensions |
CINDER | Cyber Insider Threat | program soliciting from outsiders novel techniques to insider-threat detection |
CIO | chief information officer | The top executive in charge of IT in an enterprise. |
CIP | Common Industrial Protocol | an open industrial protocol for industrial automation applications. |
CIPA | Children’s Internet Protection Act | a law passed by Congress in 2000 (47 USC 254) requiring libraries to use blocking programs to prevent access to Internet sites with objectionable content |
CiR | circuit reliability | The percentage of time a circuit was available for use in a specified period of scheduled availability. |
CIR | committed information rate | The average data rate that a carrier commits to support over a given virtual circuit between two end-user sites. The commitment is over a specified period of time, typically one month. |
CIS | clinical information system CompuServe Information Service |
A system used by physicians, nurses, anesthesiologists to develop
patient care plans, document care and interventions, monitor and record
patient vital signs, manage orders and results, document medication
administration, and measure patient outcomes. now owned by Gateway Computer. CIS has a larger international membership than other US based services. HTTP://WWW.COMPUSERVE.COM |
CISC | Complex Instruction Set Computer | a computer with many different machine language instructions. The IBM PC, 68000-based Macintosh, Pentium, IBM 370 mainframe, and VAX are CISC machines. |
CISO | chief information security officer | The chief executive responsible for information security in an enterprise. The CISO's responsibilities often bridge the gap between technical security measures and security-related business practices and policies. |
CISSP | Certified Information Systems Security Professional | A certification program administered by the International Information Systems Security Certification Consortium |
CIX | Commercial Internet Exchange | An agreeement among network providers that allows them to do accounting for commercial traffic. It is primarily a concern for network providers. |
CJK / CJKV | Chinese, Japanese, and Korean (Vietnamese) | A reference to Chinese, Japanese, and Korean languages. Sometimes a “V” for Vietnamese is added to the acronym. |
CKD | count key data | In mainframe computing, a data-record format employing self-defining record formats |
CKO | chief knowledge officer | The enterprise position responsible for articulating and championing an enterprise's knowledge management (KM) vision, and for providing enterprise level leadership for implementing and managing the KM program |
C/kT | carrier-to-receiver noise density | In satellite communications, the ratio of the received carrier power to the receiver noise power density. |
CLA | Corporate License Agreement | A licensing agreement option under Novell's "Customer Connections" program. It offers an alternative for midsize organizations that cannot qualify for Novell's Master License Agreement. |
CLASS | Custom Local Area Signaling Services | A generic term describing several local service offerings such as incoming-call identification, call trace, call blocking, automatic return of the most recent incoming call, automatic re-dial, selective call forwarding, etc. |
CLEC | Competitive Local Exchange Carrier | A telephone company that competes with other local phone companies within an exchange, or calling area, to provide local telephone service |
CLI | Call Level Interface
Calling Line Identification command line interface |
An API for database access that provides a standard set of functions
to process SQL statements, XQuery expressions, and related services at
run time.
A mechanism whereby the number originating a telephone call is passed
along with the call. The information allows the called party to know
who is calling. In some cases callers can withhold display of their
numbers. A user interface to an operating system or application in which the user types instructions at "command line" prompt displayed on the screen. |
CLIPS | C Language Integrated Production System | Productive development and delivery expert system tool which provides a complete environment for the construction of rule and/or object based expert systems |
CLLI | Common Language Location Identifier | 11-character code that identifies the wire center from which a call originated. |
CLM | Contract lifecycle management | an integral, back offce technology in many life science segments, including managed-care and payer organizations. |
CLNP | ConnectionLess Network Protocol | The International Organization for Standardization's OSI protocol for providing the OSI Connectionless Network Service (datagram service). |
CLOB | character large object | A data type that contains a sequence of characters (single-byte, multibyte, or both) that can range in size from 0 bytes to 2 gigabytes less 1 byte. |
CLR | Cell Loss Ratio common language runtime |
A QoS parameter that gives the ratio of the lost cells to the total number of transmitted cells. The runtime interpreter for all .NET Framework applications. |
CLTP | ConnectionLess Transport Protocol | Provides for end-to-end Transport data addressing (via Transport selector) and error control (via checksum), but cannot guarantee delivery or provide flow control. |
CLUSRCVR | cluster-receiver channel | A channel on which a cluster queue manager can receive messages from other queue managers in the cluster, and cluster information from the repository queue managers. |
CLUSSDR | cluster-sender channel | A channel on which a cluster queue manager can send messages to other queue managers in the cluster, and cluster information to the repository queue managers. |
CLUT | Color LookUp Table | The color options in a graphics system, arranged by index number. Typically, the system has a default color map. The index of colors in the color map can be reallocated, however, depending on the application. |
CLV | Constant Linear Velocity | A technology which revolves around (no pun intended) rotating a disk at varying speeds. By changing rotation speed depending on which track is being accessed, the density of bits in each track can be made uniform. |
CMA | Circular Mil Area | A unit of area equal to the area of a circle whose diameter is 1 mil (0.001 inch). Used chiefly in specifying cross-sectional areas of conductors. |
CMC | computer-mediated communication | human communication via computers and includes many different forms of synchronous, asynchronous or real-time interaction that humans have with each other using computers as tools to exchange text, images, audio and video. |
CMDB | configuration management database | CMDB is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. |
CME | Common Malware Enumeration | CME number is a unique, vendor-neutral identifier for a particular threat. The CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community. |
CMIP | Common Management Information Protocol | The International Organization for Standardization's OSI network management protocol. |
CMIS | common management information service Content Management Interoperability Services |
In OSI, the set of services defined by ISO 9595. The common management
information service is used by agent processes and managing processes
to communicate. API support for interoperability |
CMM | Capability Maturity Model | Strategy for improving the software process, irrespective of the actual life-cycle model used |
CMOS | complementary metal-oxide semiconductor | a type of integrated circuit noted for its extremely low power consumption and its vulnerability to damage from static electricity. CMOS devices are used in digital watches, pocket calculators, microprocessors, and computer memories. |
CMOT | CMip Over Tcp | An effort to use the International Organization for Standardization's OSI network management protocol to manage TCP/IP networks. |
CMRR | common-mode rejection ratio | The ratio of the common-mode interference voltage at the input of a circuit, to the corresponding interference voltage at the output. |
CMRS | Commercial Mobile Radio Service | A radio communication service between mobile stations or receivers and land stations, or by mobile stations communicating among themselves, that is provided for profit, and that makes interconnected service available to the public. |
CMS | Color management system content management system |
This ensures color uniformity across input and output devices so that
final printed results match originals. The characteristics or profiles
of devices are normally established by reference to standard color
targets. a web application designed to make it easy for non-technical users to add, edit and manage a website. |
CMTS | cable modem termination system | a system of devices located in the cable head-end that allows cable television operators to offer high-speed Internet access to home computers. |
CNA | Converged Network Adapter | a technology that supports data networking (TCP/IP) and storage networking (Fibre Channel) traffic on a single I/O adapter. |
CNAM | Caller ID With Name | Caller ID With Name |
CNAME | Canonical name |
|
CNE | Certified Novell Engineer (also Certified Network Engineer) | A certification initiated by Novell to qualify certain individuals that have demonstrated high standards of knowledge in the areas of hardware used in and software configuration of the Novell Network operating system. |
CNGI | China's Next Generation Internet | Chinese: 中国下一代互联网, a five year plan initiated by the Chinese government with the purpose of gaining a significant position in the future development of the Internet through the early adoption of IPv6. |
CNN | Cable News Network composite network node | Cable News Network (CNN) is a U.S. cable news channel founded in 1980 by Ted Turner. http://www.cnn.com/A type 5 node and its subordinate type 4 nodes that support APPN network node protocols and appear to an attached APPN or LEN node as a single network node. |
CNR | Carrier to Noise Ratio combat-net radio |
An indication of the quality of the modulated signal. A radio operating in a network that (a) provides a half-duplex circuit and (b) uses either a single radio frequency or a discrete set of radio frequencies when in a frequency hopping mode. |
CO | central office |
The telephone company's centralized
switching facility, where subscriber loops terminate. The
CO handles a specific geographical area (known as a local
exchange), identified by the first "n" digits of the local elephone
number.
|
CoA | Care Of Address | Temporary IP Address used by a mobile user when roaming onto a foreign IP network. It is used within mobile IP and can either be leased from the HA (Home Agent) or FA (Foreign Agent) |
COAM | customer owned and maintained | User provided and serviced communications equipment and its associated wiring. |
coax | coaxial (cable) | Cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductor. |
COBIT | Control Objectives for Information and related Technologies | a comprehensive approach to good IT practices. In its third revision, it offers a wide range of tools, guidelines, standards and a control framework for the management of information technologies. |
COBOL | Common Business Orientated Language | Many mainframe computer applications were once written in this programming language. |
COCOMO | COnstructive COst MOdel | A technique for estimating the effort and duration of a software project based on its estimated size created by Barry Boehm |
COD | Call of Duty confirm on delivery Connection Oriented Data |
Call of Duty is a first-person and third-person shooter video game series. http://www.callofduty.com/ A feature of WebSphere MQ that allows a notification to be sent to a source application whenever a target application receives a message from the source application. Data requiring sequential delivery of its component PDUs to assure correct functioning of its supported application, (e.g., voice or video). |
CoDA | Context Delivery Architecture | an architectural style of business software that builds on SOA and event-driven architecture (EDA) interaction and partitioning styles, and that adds formal mechanisms for the software elements to discover and apply their context in real time. |
CODEC | coder/decoder or compressor-decompressor |
A communications device used to convert
analog signals to digital form for transmission over a
digital medium, and back again to the original analog form. A
codec is required at each end of the channel.
|
COE | Component Object modEl | the fundamental class of Microsoft's attempt to defuse the growth of Java platform-independent code. |
COEs | centers of excellence | software management concept |
COIN | Community Of Interest Network | A COIN provides a way of giving members of a shared-interest community access to privileged information. |
COLD | computer output to laserdisc | A microfiche replacement system. COLD systems offer economies as a replacement medium when rapid or frequent access to archived documents is necessary. |
colo | co-location | Putting a web server in a dedicated facility that provides high-speed Internet connection, security, environment, backup power, and technical support. Unlike the dedicated server, the client controls both hardware and software. |
com (.com) | commercial | One of several top-level domains assigned to URLs that are of a commercial nature. Other domain suffixes include .ac, .co, .mil, .gov, .net, .org, and a long list of country codes. |
COM | communications port Component Object Model computer output to microfiche |
A port that allows an application to access a modem. A specification that Microsoft developed for building software components that can be assembled into programs or that add functionality to existing programs running on Microsoft Windows platforms. A system (also called "computer output to microfilm") in which digital data is converted into an image on dry-processed microfilm. |
COMDEX | Computer Dealers Expo | A hardware and software exposition started in 1978, it has become the place to announce new product launches and to rub elbows with VCs and representatives from high-tech firms all over the world. In America, it takes place twice a year. |
COMPAQ | COMPatibilty And Quality | Used to refer to the fact that their computers were both IBM PC compatible and very reliable. In 2002, Compaq merged with Hewlett-Packard. |
COMPARE | Compliance Progress and Readiness | A scale introduced by Gartner in 1997 to assist business units, enterprises or business partners in measuring their progress toward year 2000 compliance. |
COMSAT | Communications Satellite Corporation | A United States company created by an act of Congress in 1962 to provide communications via satellites. COMSAT leases satellite circuits to many American companies. |
COOL | C++ Object Oriented Language | A Microsoft application development tool initiative and language; a predecessor to C#. |
COOP | Continuity of Operations Plan | outlines steps that an agency will take in the event a disaster interrupts business. Continuity plans require agencies to designate functions as essential or nonessential. |
COPPA | Children's Online Privacy Protection Act | Legislation passed by the U.S. Congress in 1998 prohibiting the use of unfair or deceptive practices to gather personal information about individuals under the age of 13. |
COPS | Common Open Policy Service Communications Outsourcing and Professional Services |
An IETF proposed standard defining a simple protocol for provisioning
QoS by outsourcing policy-based admission control over requests for
network resources IT services in support of enterprise communications and connectivity include maintenance and support, consulting, application development, integration and ongoing management of IT and related business processes. |
COR | central outdoor router | the central router in a multi-device WLAN. |
CORBA | Common Object Request Broker Architecture | a standard API for distributed object communication. CORBA was created by the Object Management Group. It is the most widely used distributed object standard for connecting operating system platforms from multiple vendors. HTTP://WWW.OMG.ORG. |
CORE | COMPARE Operational Readiness Evaluation | Gartner's CORE risk assessment and reporting steps are used to define business operational risks, to report risks to management, investors, regulators and customers in a consistent form, and to determine when contingency and recovery strategies are required. |
CORS | Continuously Operating Reference Station | network managed by the U.S. ofce of National Ocean Service (NOAA) to provide GNSS data consisting of carrier phase measurements throughout the United States. |
CoS | class of service |
A classification method for providers
to deliver different levels of QOS. Providers will
typically offer a number of classes for different types of traffic,
such as different COS for voice, video and data.
|
COS | Cloud Optimized Storage | EMC's cloud platform Atmos |
COTS | commercial off-the-shelf | Descriptive term for software that can be purchased from an external supplier, as opposed to that which is developed within the enterprise. |
COW | Copy-On-Write | Part of a snapshot, and keeps track of disk changes since the snapshot was taken. |
CPA | Cost Per Action | for banner ads; the fee charged every time a user completes a desired action, such as filling out a form, downloading software, or viewing a series of pages. |
CPAN | Comprehensive Perl Archive Network | an archive of over 16,000 modules of software written in Perl, as well as documentation for it |
cPanel | control panel | industry standard web hosting control panel, cPanel provides a Graphical User Interface (GUI) for many Linux system administration tasks. |
CPC | Calling Party Control Cost Per Click |
A short break in the line current in the called party’s phone line when the calling party hangs up; not the same as FLASH. Term used by affiliate programs indicating a payment rate per advertisement click. or Pay Per Click |
CPE | customer premises equipment |
Any telephone apparatus, including
telephone handsets, PBX switching equipment, key and
hybrid telephone systems, and add-on devices, that is
physically located on a customer's property.
|
CPF | Cloud Provisioning Fabric | portability between different clouds |
cpi | characters per inch | The number of characters printed horizontally within an inch across a page. |
CPLD | Complex Programmable Logic Device | A typical CPLD is the equivalent of two to 64 SPLDs. A CPLD typically contains from tens to a few hundred macrocells. |
CPM | corporate performance management | CPM includes the processes used to manage corporate performance, such as strategy formulation, budgeting and forecasting; the methodologies that drive some processes, including the balanced scorecard, or value-based management. |
CPN | calling party number | A set of digits and related indicators (type of number, numbering, plan identification, screening indicator, presentation indicator) that provide numbering information related to the calling party. |
CPNI | Customer Proprietary Network Information | Information which is available to a telephone company by virtue of the telephone company's basic service customer relationship. |
CPOE | Computerized Provider Order Entry | a computer application that allows a physician's orders for diagnostic and treatment services (such as medications, laboratory, and other tests) to be entered electronically instead of being recorded on order sheets or prescription pads. |
CPRM | Content Protection for Removable Media | a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying. |
cps | Characters Per Second | Printing engine speed |
CPS | Continuous Protection Server | Backup exec option allows administrators to continuously capture and back up data changes to allow administrators to restore data to any point in time |
CPU | Call Pick Up
Central Processing Unit Critical Patch Update |
CPU is PABX phone systems term
The CPU controls the computer, runs all the programs
on the computer and processes all of the data and can be thought of as the
'brain' of the computer. CPU is Oracle patch term |
CRACK | Challenge/Response Authentication of Cryptographic Key | a protocol for the secure exchange of keys, used by Nokia primarily. |
CRC | Cyclic Redundancy Check | An error check in which the check key is generated by a cyclic algorithm |
CRL | certificate revocation list | A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a SSL handshake to ensure that the certificates involved have not been revoked. |
CRLF | carriage return, line feed | a pair of ASCII codes, 13 and 10, that tell a terminal or printer to return to the beginning of the line and advance to the next line. |
CRM | Customer Relationship Management |
CRM refers to solutions and strategies
for managing businesses' relationships with customers. With the
advent of Web retailing, companies have found it hard to develop
relationships with customers since the e-commerce interface is so
impersonal.
|
CRMB | Customer Reference Material Database | IBM term |
cROI | companywide ROI | The incremental cash flow -- cost savings and revenues -- generated by online retail technology throughout a multichannel company. |
CRR | Continuous Remote Replication | Continuous Remote Replication |
CRT | Cathode Ray Tube | CRT is the technology used in traditional computer monitors and televisions. The image on a CRT display is created by firing electrons from the back of the tube |
CRUD | Create, Read, Update, Delete | Used to describe access rights for data. |
crypto | Cryptography | The study of decryption and encryption technologies. |
CS | Computer science Creative Suite |
the study of the theoretical foundations of information and
computation, and of practical techniques for their implementation and
application in computer systems. a Web suite text and WYSIWYG Web page editor. Core applications from Macromedia Studio have been merged with Adobe CS since CS3, including Flash, Dreamweaver, and Fireworks. http://www.adobe.com/products/creativesuite/ |
CSA | cloud service agreements Communications Streaming Architecture Composite Services Architecture |
a disclaimer of liability relating to service quality and availability;
disclaimer of liability for any third-party action; and unilateral rights to limit,
suspend, or terminate the service. Directly connects the Memory Controller Hub to the network controller. With CSA-based motherboards, network data can be transferred at a much higher rate with lower latency OASIS Open CSA, which goal is to advance the SCA and SDO families of specifications, which will simplify the development of applications having SOA. |
CSC | card security code Circuit Switched Cellular Computer Sciences Corporation Content Security and Control |
refer to CVV2 Offers wide coverage. Used for large data transfers An IT consulting, outsourcing and system integration firm, founded in 1959 and headquartered in El Segundo, California. http://csc.com Cisco ASA add-in modules for anti-X features (such as URL filtering, antivirus, anti-spam and antispyware) |
CSCF | call session control function |
CSCF is a functional entity within IMS and part of 3GPP UMTS Reference Architecture.
|
CSCW | computer supported co-operative work | any technology system that relies on combinations of hardware and software resources to enable groups of people to collaborate and share technology. |
CSD | Cisco Secure Desktop | allows secure VPN connections from remote PCs and offers functionality to ensure PCs meet administrator approved |
CSE | custom search engine | The search engine that you create and customize using Google Custom Search. |
Csel | Cable Select | This is basically Plug-and-Play ATA. You plug in your ATA/IDE hard drives, set them to CSEL (Cable Select), and they determine whether they are master or slave automatically, saving you from manual configuration. |
CSFs | critical success factors | critical success factors |
CSG | Communications Services Group | On May 1, 2009, TNS completed the acquisition of the CSG from VeriSign, Inc. |
CSMA/CA | Carrier Sense Multiple Access/Collision Avoidance | CSMA/CA is the medium access method used by IEEE 802.11 WLANs. |
CSMA/CD | Carrier Sense Multiple Access with Collision Detection | A protocol in which stations listen to the bus and only transmit when the bus is free. If a collision occurs, the packet is retransmitted after a random time-out. Ethernet uses CSMA/CD. |
CSO | chief sourcing officer Cold Start Only |
An enterprise executive responsible for the implementation of
successful dynamic sourcing strategies, and effecting these strategies
through IT service delivery that uses an ever-changing resource pool. In ISDN is a capability of a Network Terminator 1 (NT1) |
CSP | Chip-scale packaging Communications service providers Crystal Server Pages |
smaller "packages" for flash devices, such as FBGA and uBGA. Communications service providers A page that contains HTML/VB/JavaScript that is processed by the Web Component Server in the Crystal Enterprise eBusiness Framework |
CSS | Cascading Style Sheet |
Cascading style sheets are used to
format the layout of Web pages. They can be used to define text styles,
table sizes, and other aspects of Web pages that previously could only
be defined in a page's HTML.
|
CSS-P | cascading style sheet positioning | Use of a cascading style sheet to position Web page elements using pixel locations or locations relative to other elements. |
CST | Consolidated Service Test | Enhances the way IBM tests and recommends maintenance packages for z/OS and OS/390 software, including the major subsystems |
CSU | Certificate Signing Unit Channel Service Unit |
A tamperproof storage mechanism used by a certifying authority (CA) to store private keys. Customer premises equipment that provides basic digital transmission at various speeds. Also AT&T unit that is part of the AT&T nonswitched digital data system. |
CSV | Circuit Switched Voice comma separated values |
Support for CSV on an ISDN line allows for the placement of voice calls on an ISDN line. Commonly used no-frills text file format used for import from and import to spreadsheets and SQL databases. |
CSW | channel status word | An area in storage used to indicate the status of a device and channel involved in an I/O operation. |
CTCp | Client-To-Client-Protocol | a feature of some IRC clients |
CTD | Cell Transfer Delay | A QoS parameter that measures the average time for a cell to be transferred from its source to its destination over a virtual channel (VC) connection. |
CTI | computer-telephony integration |
The intelligent linking of computers
with telephony, enabling coordinated voice and data
transfers to the desktop.
|
CTO | chief technology officer | The enterprise position responsible for managing technology infrastructure and resources, including technology deployment, network and system management, integration testing, and developing technical operations personnel. |
CTP | capable to promise | A system that allows an enterprise to commit orders against available capacity, as well as inventory. These systems are evolving to include multiple sites, as well as the entire distribution network. |
CTR | Click-Through Rate | Web publishers typically generate revenue from advertisers each time a visitor clicks on one of the advertisements |
ctrl | control | This refers to the Control key on your keyboard, it is often used for shortcuts. |
CTS | clear to send common transport semantics |
A control packet used by a destination station to indicate its
readiness to receive data. A destination station responds to a Request
To Send (RTS) by transmitting a CTS. The layer of the Networking Blueprint above the transport layer that makes the services of transport providers available to the transport user. |
CTT | China Tietong Telecommunications | a major state-owned basic telecommunications operator in China. Its former name was China Railcom (China Railway Communication Corporation, Limited). http://www.chinatietong.com |
CTX | Commited to Excellence | CTX Technology Corporation (Commited to Excellence) |
CUG | closed user group | In data communication, a group of users who can communicate with other users in the group, but not with users outside the group. A data terminal equipment (DTE) may belong to more than one closed user group. |
CUoD | Capacity Upgrade on Demand | An option available on certain IBM systems that allows a customer to activate additional processor capacity when needed. |
CUPS | Common Unix Printing System | Provides a portable printing layer for UNIX-based operating systems. It is developed by Easy Software Products to promote a standard printing solution and is the standard printing system in MacOS X and most Linux distributions www.cups.org |
CVP | Content Vectoring Protocol | A specification developed by Check Point Software, used for content screening and antivirus checking. |
CVS | Computer Vision Syndrome Concurrent Versions System |
The name for eye and vision problems experienced during computer use.
People are using light therapy to combat CVS (including ultraviolet and
full-spectrum wavelengths). A programming code management system. |
CVSD | Continuous Variable Slope Delta modulation | A method of digit ally encoding speech using a one- bit sample to encode the difference between two successive signal levels, usually 32,000 times a second. |
CVV2 / CVC / CVC2 | Card Verification Value 2 / Card Verification Code /Card Validation Code 2 | The last part of the code above the signature strip on modern credit and debit cards, which is often required by online shops to verify that the card is genuine. |
CYMK | cyan, magenta, yellow, black | An abbreviation denoting the traditional four-color printing process; the name derives from the four ink colors used. The majority of printed color paper and photographic documents incorporate the CMYK process. |
C | programming language developed at Bell Laboratories in the 1970s, based on the two earlier languages B (1970) and BCPL (1967). | |
C# | pronounced “C sharp”, a programming language developed by Anders Hejlsberg (the developer of Turbo Pascal and Delphi) for Windows programming under Microsoft’s .NET Framework. | |
Cache | Pronounced "Cash". A temporary storage area for frequently accessed information. The cache shortens the time it takes to access this information, relieves the burden from the main memory, and increases the overall speed of applications. | |
carbon neutral | also called carbon neutrality, used to describe the action of organizations, businesses and individuals taking action to remove as much carbon dioxide from the atmosphere as each put in to it. | |
Carnivore | an Internet surveillance system developed for the U.S. FBI so that they could monitor the electronic transmissions of criminal suspects. Critics, however, charged that Carnivore did not include appropriate safeguards to prevent misuse and might violate the constitutional rights of the individual. The EPIC reported in early 2005 that the FBI had replaced Carnivore with other, unspecified surveillance software from commercial sources. | |
carrier | A network operator may market any number of communication services for voice and data. Carriers offer their services to both end-customers (private or business) and other carriers. In the latter case, the service simply consists of transport capacity for long-distance traffic. | |
Cascade |
A method of connecting circuits together in series to make the output
of one, the input of the next. This kind of end-to-end connectivity
is useful in extending the distance of a network. A method of displaying several windows of information on a monitor. |
|
CE | CE-marking is a European Union regulatory community sign. It symbolizes the compliance of the product with all essential requirements relating to safety, public health, consumer protection. http://www.eurunion.org/ | |
Centrex | A service provided from a reserved section of the main public exchange that has been reprogrammed to act as if it were the exclusive PBX of an individual user, in other words a 'virtual' PBX. | |
certificate | Digital representation of user or device attributes, including a public key, that is signed with an authoritative private key. | |
Channel Bank | Channel terminal equipment used for combining (multiplexing) channels on a frequency-division or time-division basis. | |
chip | a miniaturized electronic circuit that has been manufactured in the surface of a thin substrate of semiconductor material | |
Chrome | a powerful Google browser that loads Web pages quickly and accurately. www.google.com/chrome | |
cipher | A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key. | |
clear channel | A channel that uses out-of-band signaling (as opposed to in-band signaling), so the channel's entire bit rate is available. | |
cloud computing | Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). | |
cluster | process of connecting multiple servers together in order to provide greater overall system availability, performance, and capacity for your server platforms. | |
compiler | A software-development tool that translates high-level language programs into the machine-language instructions that a particular processor can understand and execute. | |
Computer-Brain Interface | interpret distinct brain patterns, shifts and signals as commands that can be used to guide a computer or other device. | |
concurrent | A way to measure the usage of software licenses. Rather than limiting usage based on the number of people who are entitled to use the software, a concurrent-use license places a limit on the number of people who may do so simultaneously. | |
Convergence | The consolidation of all communications - voice, data and video - onto a single network infrastructure. | |
Cookie | a piece of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. | |
Craigslist | Craigslist is a centralized network of online communities featuring free online classified advertisements, with sections devoted to jobs, housing, personals, for sale, services, community, gigs, résumés, and discussion forums. http://www.craigslist.org/ | |
Cut-through | Technique for examining incoming packets where Ethernet switch looks only at first few bytes of packet before forwarding or filtering it. Faster than looking at whole packet but allows some bad packets to be forwarded. |
D
D for DNS
abbreviation / acronyms | Term | Definition |
---|---|---|
d-channel / D channel | delta channel data channel |
In ISDN, a common channel used for signaling and management of the network. used for common channel signaling by both the telephone company switch and the customer equipment; provides the call signals that set up B channel connections |
d-commerce | digital commerce | form of e-commerce by companies that sell news, documents, subscriptions, or any other content that can be delivered digitally over the Web. Under the ultimate "pay as you go" model, a d-commerce company acts as an electronic middleman: Users establish an account with a d-commerce company to purchase content from a variety publishers |
D&I | Drop And Insert | Refers to the cross connecting of Time-Division Multiplexing (TDM) circuits. It allows you to take 64Kb DS0 channels from one T1 and digitally cross connect them to 64Kb DS0 channels on another T1 |
D2D | disk-to-disk | backup technologies |
D2D2T | disk-to-disk-to-tape | backup technologies |
DA | Destination Address | Information sent in forward direction indicating address of called station or customer. |
DAA | Distributed Application Architecture | under design by Hewlett-Packard and Sun. A distributed object management environment that will allow applications to be developed independent of operating system, network or windowing system. |
DaaS | desktops-as-a-service | virtual desktop hosting |
DAB | Digital Audio Broadcast | Digital radio broadcast, providing better quality and a greater number of channels than traditional (analogue) radio. |
DAC | digital-to-analog converter | The digital-to-analog converter is for converting a digital signal into an output analog voltage. |
DAC / DACL | Discretionary Access Control List | Discretionary Access Control consists of something the user can manage, such as a document password.A DACL consists of a list of security identifiers (which identify users) and specific permissions for each |
DACS | Digital Access and Cross Connect System | A time-slot switch that allows T1 or E1 lines to be remapped electronically at the DS-0 (64 Kbps) level. Also called DCS or DXS. |
DAE | Disk Array Enclosure | The DAE is a JBOD (Just a Bunch Of Disk) enclosure without a storage processor (SP). The DAE supports up to 10 Fibre Channel drives per enclosure and is connected by dual Fibre Channel loops into the DPE. |
Daemon | Disk And Execution MONitor | Disk And Execution MONitor software |
DAFS | Direct Attached File System | an advanced methodology of a particular network data storage method. |
DAL | Dedicated Advertiser Location | A type of iTV ad in development, online advertisers are proposing Simple DALs and Complex DALs. A Simple DAL refers to the data that users reach on the screen, once they leave a video (TV) stream. Viewers will be able to leave a broadcast stream, beyond the duration of an ad, but will then get rapidly returned to it after navigating past some qualifier screens. |
DAM | Database Activity Monitoring Digital Asset Management |
a type of governance, risk and compliance
(GRC) control that transparently monitors database activity to identify fraudulent, illegal or other
undesirable behavior. the practice and domain of organizing digital files, like images, documents, videos and presentations. The term asset is used to indicate that such files have some sort of intrinsic value that makes it worthwhile to manage them. |
DAMA | demand assigned multiple access | Allocation of communication satellite time to earth stations as the need arises. |
DAML | DARPA Agent Markup Language | A language currently in development for presenting information on the WWW that will allow information objects to be tagged in a way that allows software applications, computer agents, and virtual assistants. |
DAO | Disk-At-Once | This is a single-session method of writing data to a CD-R/RW disc that creates a disc in a format suitable for commercial duplication. |
DAP | Directory Access Protocol | A derivative of the X.500 DAP standard, postulated by the ISO many years ago. DAP and X.500 remained unused for many years because of the complexity of the DAP access protocol. |
DAR | Data at rest Disk ARchive |
refer to all data in computer storage while excluding data that is
traversing a network or temporarily residing in computer memory to be
read or updated. a command-line archiving tool |
DARPA | Defense Advanced Research Project Agency | the progenitor of the Internet. DARPA is where it all began. http://www.darpa.mil/ |
DAS | direct-attached storage | RAID storage that is internal and host-attached (both the RAID controller and software technologies and the hard disk drives are housed within the server) |
DAS | distributed antenna system | a way to efficiently distribute wireless connections inside a large building where steel columns and layers of concrete can interfere with wireless signals. A DAS can be used to get rid of "dead zones" by routing radio frequency (RF) signals through fiber or copper cabling from a single base station to multiple antennas located throughout the building. |
DASH | Desktop and mobile Architecture for System Hardware | Suite of specifications that takes full advantage of the Web Services for Management (WS-Management) specificationdelivering standards-based Web services management for desktop and mobile client systems |
DAST | Dynamic Application Security Testing | technologies designed to detect conditions indicative of a security vulnerability in an application in its running state |
DAT | digital audio tape | A magnetic tape that stores audio data in digital form. |
DAVID | Digital Audio Video Interactive Decoder | Digital Audio Video Interactive Decoder |
db | Decibel | A unit of power (sound, optical or electrical) increase or decrease that is proportional to the exponential increase or decrease of power. |
DB | Database | A collection of data organized in a structured manner so that information can be readily retrieved. |
DB2 | Database 2 | IBM's RDBMS offering, originally built for Multiple Virtual Storage (MVS) systems. It uses SQL as its data manipulation and definition language. IBM has released versions of DB2 for several other operating systems, such as Windows and Unix. |
DB9 | D sub-miniature 9 | Also called Dsub9, a 9 pin connector shaped like the leter ‘D’. They are used to connect serial devices together with a serial cable. |
DBA | database administrator | The person responsible for managing data, namely data set placement, database performance, and data recovery and integrity at a physical level. Also known as a "data administrator." |
DBCS | Double-Byte Character Set | One of a number of character sets defined for representing Chinese, Japanese, or Korean text. These character sets are often encoded in such a way as to allow double-byte character encodings to be mixed with single-byte character encodings. |
dBm | decibels milliwatt | used to measure signal strength on telephone lines |
DBMS | Database Management System |
In short, a DBMS is a database
program. Technically speaking, it is a software system that uses a
standard method of cataloging, retrieving, and running queries on data.
The DBMS manages incoming data, organizes it, and provides ways for
the data to be modified or extracted by users or other programs.
|
DBS | direct broadcast satellite | A wireless technology for broadcasting by transmitting a compressed high-speed signal via satellite. |
DCAP | Data Link Switching Client Access Protocol | Data Link Switching Client Access Protocol |
DCB | Data Center Bridging | a set of IEEE industry standards that delivers end-to-end congestion notification and quality of service throughout the network which allows customers to configure traffic classes and priorities to deliver a lossless Ethernet fabric such as Open FCoE. |
DCBU | D-channel backup | An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. |
DCC | Data Country Code Digital Command Control Direct Client-to-Client |
Specifies country in which address is registered. Codes
are given in ISO 3166. Field length is two octets. Digits are encoded
in BCD syntax. systems used to operate locomotives on a model railroad a feature of some IRC client software, allowing users to communicate messages and files directly, bypassing a server. |
DCCP | Datagram Congestion Control Protocol | a minimal general purpose transport-layer protocol that minimizes the overhead of packet header size or end-node processing as much as possible. |
DCE | Data Communications Equipment Distributed Computing Environment |
Devices that provide the functions required to establish, maintain and terminate a data transmission connection. Normally it refers to a modem. In network computing, a set of services and tools that supports the creation, use, and maintenance of distributed applications across heterogeneous operating systems and networks. |
DCO | Device Configuration Overlay | Allows system vendors to purchase HDDs from different manufacturers with potentially different sizes, and then configure all HDDs to have the same number of sectors |
DCOM | Distributed Component Object Model | A version of Microsoft's COM that enables application components to be distributed over several computers through the use of a remote procedure call (RPC). |
DCT | Digital Cordless Telephone | A cordless telephone that uses digital transmission technology to provide more security and better sound quality than a traditional analog cordless telephone. |
DDAP | Digital Distribution of Advertising for Publications | User-driven organization working towards enabling the universal exchange of digital ads throughopen process integration and the use of accredited standards. See http://www.ddap.org |
DDBMS | Distributed database management system | A database management system (DBMS) that enables end users or application programmers to view a collection of physically separate databases as a logical single-system image. The concept that is most fundamental to the DDBMS is location transparency, meaning the user should not be conscious of the actual location of data. |
DDCMP | Digital Data Communications Message Protocol | A byte-oriented, link layer protocol that supports half- or full-duplex modes and either point-to-point or multipoint lines in a Digital Network Architecture network. |
DDD | Data Display Debugger | a popular graphical user interface for command-line debuggers such as GDB, DBX, JDB, WDB, XDB, the Perl debugger, and the Python debugger.DDD is licensed under the GNU GPL and is open source. |
DDE | Dynamic Data Exchange | A method of exchanging data between applications on MacOS, Windows, and OS/2 operating systems. |
DDI | Device Driver Interface Direct Dialling-In DNS, DHCP & IP address |
An interface that facilitates driver portability across different UNIX system versions on SPARC hardware. A facility enabling telephone users to dial direct into a firm's PABX extensions as if they were normal public telephone numbers. Known as DID in the USA, not to be confused with DIA. solutions that complement internal DNS & DHCP implementation. |
DDL | Data Definition Language | A language for describing data and its relationships in a database. |
DDN | Digital Data Network | A network service established in China in 1994, connecting Beijing, Tianjin, Shanghai and other provincial capitals. Each post and telecommunications administration in China has a department regulating DDN service in its region. |
DDNS | Dynamic Domain Name System | A technology that automatically updates the logical names of dynamically assigned IP addresses in the DNS server of an IP network. Specifications for a standard approach to DDNS were defined in Request for Comment 2136, introduced in 1997 |
DDoS | Distributed Denial of Service | attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. |
DDP | Datagram Delivery Protocol | In AppleTalk networks, a protocol that provides network connectivity by means of connectionless socket-to-socket delivery service on the internet layer. |
DDR | double-data-rate | A type of SDRAM that doubles the data burst cycle, improving system performance. |
DDS | Dataphone digital service digital data service Digital Data Storage |
AT&T line service that allows the customer to transmit data on the line in a digital format. A dedicated data transmission service that operates over interconnected digital private lines. The technology that allows binary information to be recorded to a4mm DAT. The drive mechanism uses 4 heads - two to write and two to read. The tape makes contact with the heads at a 90 degree angle to produce an angled track known as a helical scan. |
DDSA | digital data service adapter | In data communications, a device used when sending and receiving data using a nonswitched digital data service. |
DDT | Disk-to-Disk-to-Tape | Data storage and archive strategy. Data is initially stored on disk then, according to some criteria, it is copied to a secondary disk store pending archiving to tape. |
DEA | Data Encryption Algorithm | In Cryptographic Support, the equivalent to the Data Encryption Standard. |
DEC | Digital Equipment Corporation | a company whose products included the PDP-8, PDP-11, and VAX minicomputers, the VT-100 terminal, and the Alpha microprocessor. In 1998, Digital Equipment Corporation was aquired by Compaq, now part of Hewlett-Packard. |
DECT | Digital Enhanced Cordless Telecommunications |
An interface specification for
digital mobile telephony. DECT employs 10 carrier frequencies
between 1.88 GHz and 1.9GHz, and has a transmission speed
of 144 Kbps.
|
defrag | defragment | To optimize your hard drive, usually with a program that "cleans it up" |
DEK | data encryption key | Used for the encryption of message text and for the computation of message integrity checks (signatures). |
DEL | DELETE | the DELETE key on a computer keyboard |
Demarc | Demarcation Point | The point, jack or cross connect panel, at which ownership or responsibility for operating and maintaining facilities passes from one party to another. |
Demux | demultiplexer | A logic circuit that takes a single input and sends it to one of several outputs. |
DEN | Directory Enabled Network | term used in conjunction with an architecture and grouping of networking capabilities that are developed and driven by a central directory. |
DEP | Data Execution Prevention dynamic enterprise publishing |
OS feature that's new in Windows 2003 SP1 & Windows XP SP2. It
serves to prevent viruses and other malicious code from ever executing combine data from an organization's CRM and other enterprise applications with content from its content management systems and other sources according to business rules to dynamically generate attractive, personalized customer communications for delivery |
DES | Data Encryption Standard Dynamic Energy Saver |
An encryption algorithm, developed by the US government, that allows
the use of variable-length keys. The longer the key, the more difficult
it is to break the algorithm GIGABYTE Dynamic Energy Saver is a revolutionary technology that delivers unparalleled power savings with the simple click of a button. |
DET | Directory Entry Table | A table on every network volume that contains directory entries for each file on the volume. The table, stored in the server's memory, enables quick access to the location of every file |
DFM | design for manufacturability Device Fault Manager Digital Flash Media |
An approach for designing products in ways that optimize their manufacture. Provides real-time fault analysis for Cisco devices a generalization for all type of digital media devices such as but not limited to CF (CompactFlash), Memory Stick (MS), MMC, Secure Digital (SD), SmartMedia (SM), USB Flash Drive (USBFD) and x D Picture Card (x D). |
DFI | Design for Innovation | DFI Inc. (Design for Innovation) |
DFL | design for logistics | A product design approach that considers logistical issues, such the manner in which the product will be stored or transported. |
DGC | Distributed garbage collection | garbage collection in a system where objects might not reside in the same address space or even on the same machine. |
DHA | directory harvest attack | an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. |
DHCP | Dynamic Host Configuration Protocol |
A network server uses this protocol to
dynamically assign IP addresses to networked computers. The DHCP
server waits for a computer to connect to it, then assigns it an IP
address from a master list stored on the server.
|
DHTML | Dynamic HyperText Markup Language | web pages that use a combination of HTML, JavaScript, and CSS to create features such as letting the user drag items around on the web page, some simple kinds of animation, and many more. |
DHX | Diffie-Hellman Exchange | an authentication method used by the Apple file service of Mac OS X Server. |
DIA | data integration and
access Dedicated Internet Access |
need of enterprises for better integrated data for operational efficiency and business intelligence a highly reliable, predictable, and guaranteed bandwidth Internet connection. |
DICOM | Digital Imaging and Communications in Medicine | a standard for handling, storing, printing, and transmitting information in medical imaging. |
DID | direct inward dial | Allows a user outside a company to dial an internal extension number without needing to pass through an operator or an attendant. The dialed digits are passed to the PBX, which then completes the call. |
DI/DO | Dispatch In/ Dispatch Out | Refers to the source of a reported trouble on a telephone circuit: Dispatch In signifies the problem is likely within the central office and that an inside technician may be assigned to troubleshoot and fix the problem Dispatch Out signifies the problem is likely on the loop portion of the circuit and that an outside technician has been assigned the problem. |
DIF | Directory Interoperability Forum | Coalition formed in 1999 by IBM, Novell, Oracle, Lotus Development and Isocor to promote the use of LDAP by developers, and to accelerate directory interoperability standards. |
DiffServ | Differentiated Services | A protocol that helps support network quality of service. DiffServ enables data packet fields to carry information about the specific level of service a packet should receive on the network. |
Digerati | digital version of literati (Italian) | a reference to a vague cloud of people seen to be knowledgeable, hip, or otherwise in-the-know in regardsto the digital revolution. |
DIIOp | Dominio Internet Inter-Orb Protocol | allows external programs to attach to, and manipulate Domino databases |
DIMM | Dual In-line Memory Module | DIMM is a later version of memory than that of its earlier SIMM counterpart. A DIMM module was introduced for the Pentium processor because the Pentium processor needed a 64 bit path. The SIMM module only has a 32 bit path. |
DIPP | Dual Inline Pin Package | Refers to the physical geometry of an integrated circuit or other electronic package; rectangular, with pins on the two longer sides |
DIR | DIRectory | DIRectory |
Dirid | Directory identifier | A numeric identifier used within INF files to represent a disk directory. |
DISA | Defense Information Systems Agency Data Interchange Standards Association |
Defense Information Systems Agency Data Interchange Standards Association |
Disc / Disk | DISKETTE | A thin, flexible, plastic, circular memory medium, coated on both sides with metal oxide and enclosed in a protective jacket. Data is stored magnetically in binary digital form on its surface(s). |
DIT | Directory Information Tree | A graphical display of an organization's directory structure, sites, and servers, shown as a branching structure. The top-level (root) directory usually represents the organization level |
DITTO | Data Interfile Transfer, Testing and Operations | An IBM licensed program that provides file-to-file services for card I/O, tape, and disk devices. |
Divx | DIgital Video Express | DVD (DVD-ROM) format being promoted by several large Hollywood companies, including Disney, Dreamworks SKG, Paramount and Universal. The idea was financed mainly by retail electronics giant Circuit City. |
DIX | Digital, Intel , Xerox | The first letter of the Digital Corp, the Intel Corp, and the Xerox Corp, which are the leading vendors defined the original Ethernet standards. |
DKI | Driver Kernel Interface | An interface between the UNIX system kernel and different types of drivers. DKI consists of a set of driver-defined functions that are called by the kernel. These functions are entry points into a driver. |
DKMS | Dynamic Kernel Module Support | Designed to create a framework where kernel dependent module source can reside so that it is very easy to rebuild modules as you upgrade kernels |
DL | Density Line double-layer |
An HP brandname for the ProLiant Density Line, which are servers in
one-, two- and four-socket designs, optimized for rack-mounted server
environments. describing a DVD or similar disc recorded in two layers from the same side, giving twice as much capacity as a single layer. |
DLC | data link control |
A set of rules used by nodes on a data link (such as an SDLC link or a
token ring) to accomplish an orderly exchange of information. protocol layer used by nodes on a data link to accomplish an orderly exchange of information. |
DLC | Digital Loop Carrier | Digital transmission system designed for subscriber loop plant. Multiplexes many circuits onto very few wires or onto single fiber pair. |
DLCI | data link connection identifier | A number of a private or switched virtual circuit in a Frame Relay network that tells the Frame Relay how to route the data. |
DLDP | Device Link Detection Protocol | detect the link status of a fiber cable or twisted |
DLE | data link escape | In BSC, a transmission control character used to indicate that the next character is a control character, not a data character. |
DLL | dynamic link library | A Windows mechanism that links executable code modules to an application program or process. A DLL is loaded at runtime by the application or process that invokes it. |
DLM | data life cycle management | a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted. |
DLOS | Direct Line-of-sight Desktop Line-of-sight |
where the points of a circuit have a physically proven clear and unobstructed view of each other an initial survey conducted on a computer with specialised planning software which allows the user to ascertain if the two points of a circuit have probable line-of-sight |
DLP | data leak prevention Digital Light Processing |
The term used to describe a system that is put in place to stop the
unauthorised loss of outside of the control of an organisation. Data
loss is a prevalent problem that has resulted in significant
reputational and legal issues for many organisations. A video projection technology that uses hundreds of thousands of rotating mirrors to project high quality, high definition images. DLP was originally developed by Texas Instruments. |
DLPBC | Dual Loop Port Bypass Circuitry | routing circuitry that makes it possible to add and remove nodes without disrupting the network. |
DLPI | Data Link Provider Interface | The SVR4 STREAMS-based kernel-level interface that supports the services of the Data Link Layer for both connection-mode and connectionless-mode services |
DLR | Design Layout Record | The layout for the local portion of a circuit at a particular location. |
DLT | Digital Linear Tape | A magnetic tape technology that uses half-inch, single-hub cartridges,writes 128 or 208 linear tracks, and provides capacities from 40 to80GB. A technology designed by DEC and sold to Quantum |
DM | Data Mining | Generic term for identifying possible relationships and trends between data items. Typically data mining is the statistical analysis of data to identify commonalities and patterns. |
DMA | Direct Memory Access | A technique of transferring data between the computer memory and a device on the computer bus without the intervention of the microprocessor. |
DMAA | Discrete Mathematics, Algorithms and Applications | Discrete Mathematics, Algorithms and Applications |
DMB | Dhtml Menu Builder | Used to idetify a DHTML/Javascript menu building tool called DHTML Menu Builder. Also used in the extension of the application's project files |
DMCA | Digital Millennium Copyright Act | A controversial reform of the U.S. copyright laws that is the first attempt to update those laws for the age of digital technology. |
DME | distributed management environment | A specification of the Open Software Foundation (OSF) for managing open systems. |
DMI | Desktop Management Interface | an API to enable software to collect information about a computer environment. |
DML | Data Manipulation Language | a family of computer languages used by computer programs or database users to retrieve, insert, delete and update data in a database. The currently most popular Data manipulation language is that of SQL, which is used to retrieve and manipulate data in a Relational database. |
DMO | Distributed Management Object | This OLE server exposes representations of SQL Server database objects (tables, stored procedures, server properties, and so on), many of which are usually modified through Transact-SQL |
DMS | Digital Multiplex Systems | System that combines number of digital circuits. |
DMT | Discrete Multi-Tone | an ADSL modulation technique that splits bandwidth usage usage into sub-channels for maximum data transfer. A channel is then optimized for modulation if certain channels cannot transmit data. |
DMZ | demilitarized zone | a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s. |
DNA | Deoxyribonucleic acid Distributed Network Architecture |
the genetic or hereditary material in humans and most of the other
living organisms. DNAs are mostly stored in the nucleus of cells and
can replicate themselves. Arrangement of networked computers in which several processors (the CPUs) are located on scattered machines, but are capable of working both independently and jointly as required. DNA is also Delivery Network Accelerator (BitTorrent), Dynamic Network Administration (Ericsson), Dynamic Network Analyzer (Lucent) |
DNIC | data network identification code | A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. |
DNLC | Directory Name Lookup Cache | Unix file cache |
DNR | Digital Noise Reduction |
Ensures superior picture quality by "cleaning" images and
reducing picture "noise". Particularly useful for older movies where
the source master has picture noise.
|
DNS | Domain Name Service / Server / System |
the way that Internet domain names are
located and translated into IP addresses. A domain name is a
meaningful and easy-to-remember "handle" for an Internet address.
|
DNSBL | DNS Based List, DNS Blacklist, or DNS Blocklist. | A published list of IP addresses that can be queried through the Internet. DNSBLs are used to publish IP addresses associated with e-mail spam and spamming. |
DNSSEC | Domain Name System SECurity extensions | Technique for securing the Domain Name System. It is a set of extensions to DNS, which provide end-to-end authenticity and integrity and was designed to protect the Internet from certain attacks. See also http://www.dnssec.net/ |
DOA | Dead On Arrival | Service to replace malfunctioning devices. In CRM, DOA report tells users which products are the most error-prone or receive the most complaints from customers.T |
DOCSIS | Data-over-Cable Service Interface Specifications | Defines technical specifications for equipment at both subscriber locations and cable operators' headends. Adoption of DOCSIS will accelerate the deployment of data-over-cable services and will ensure interoperability of equipment throughout system operators' infrastructures. |
DO-IT | Disabilities, Opportunities, Internetworking and Technology | Disabilities, Opportunities, Internetworking and Technology |
Dolly | Digital Dolly | a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files. It is similar to the Symantec product known as Ghost. |
DOM | distributed output management Document Object Model |
Middleware that drives the output process and supports the automated creation and delivery of documents. A platform-neutral and language-neutral interface that allows programs and scripts to access and update the content, structure, and style of documents dynamically. |
DOMAIN | Distributed Operating Multi Access Interactive Network | Distributed Operating Multi Access Interactive Network |
DOP | Dilution Of Precision | One of many quality measurements to evaluate solutions derived by a positioning receiver. This is a numeric value that relates relative geometries between positioning satellites as well as the geometries between the satellites and the receiver. |
DoS | denial of service | The inability of a Web site or other server to respond to legitimate connections. DoS attacks are used to block access to a target Internet site. |
DOS | Disk Operating System | A command-driven PC OS that resides in main memory and uses disks for data storage. It was once the standard OS for IBM-compatible PCs. Early versions of Microsoft Windows ran on top of DOS. |
DOV | Data-Over-Voice | A technique used in FDM allowing the combination of voice and data on the same line. DOV usually employs twisted pair cables assigning some of the unused bandwidth for data transmission. |
DPA |
|
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers. |
DPC | Destination Point Code | The part of a routing label that identifies where an SS7 signaling message should be sent. |
DPF | Database Partitioning Feature | A feature that can be used to improve the management of a large database by dividing it into multiple database partitions that are physically placed on one or more servers. |
DPI | deep packet inspection Distributed Protocal Interface |
An advanced form of firewall technology that looks deeper into the
packet stream than traditional packet inspection approaches to identify
attempts at malicious behavior and block them. An extension to the SNMP agent that permits users to dynamically add, delete, or replace management variables in the local MIB without requiring recompilation of the SNMP agent. |
dpi | Dots Per Inch | An image measurement standard that measures an images resolution as it applies to printers. It measures the images pixels in one square inch. The higher the number the better the images resolution or quality. |
DPMA | Dynamic Power Management Architecture | This architecture allows computers to have a variety of advanced power management features. |
DPMI | Dos Protected Mode Interface | allow DOS programs to access the extended memory of PC architecture computers while maintaining system protection. DPMI defines a specific subset of DOS and BIOS calls that can be made by protected mode DOS programs. |
DPN | Data Packet Network | Network in which “bundles of information are transmitted, one after another. Differs from circuit network, in which entire circuit is dedicated to particular user. |
DPtoTP | Display Coordinates TO Tablet Coordinates | Coordinates conversion |
DPV | Distributed Partitioned View | Joins horizontally partitioned data from a set of member tables across one or more servers, making the data appear as if from one table |
DPW | Digital Pulse Wireless | also known as Ultra Wideband Radio. It is the revolutionary wireless technology for transmitting large amounts of digital data over a wide electromagnetic radiation spectrum of frequency bands with very low power. |
DQM | Data Quality Manager | Oracle CDH engine |
DR | disaster recovery | Methods and procedures for returning a system, network or data center to full operation after a catastrophic interruption — including the recovery of lost data, the use of alternative network channels if the primary channels are disconnected or malfunctioning. |
DRAC | Dell Remote Assistant Card | Interface card from Dell Inc that provides out-of-band management facilities. The controller has its own processor, memory, battery, network connection, and access to the system bus |
DRAM | Dynamic Random Access Memory | This is a common type of random access memory that is used in personal computing. The "dynamic" in its name is due to the fact that this memory needs to be refreshed as opposed to other SRAM that is "static". The DRAM is refreshed by the use of electrical current pulses that pass through all memory cells. DRAM needs to be periodically refreshed to retain the stored data. |
DRE | Document Rendering Engine | Collection of Java classes that can be used to define an abstract document and render it in PDF or HTML. A document consists of a collection of elements such as text, lists (bulleted, numbered, plain), tables, images, fonts, color, etc. |
DRF | Data Recovery Field | In NTFS file encryption keys are stored there |
DRi | Disaster Recovery Institute | DRI International was founded in 1988 in order to develop a base of knowledge in contingency planning and the management of risk, a rapidly growing profession. |
DRM | Data Relationship Management digital rights management |
Oracle Hyperion technology to provide strong hierarchy visualization and management capabilities Trusted exchange of digital information over the Internet whereby the user is granted only the privileges that the document sender allows. |
DROP | delivery of real-time execution information protocol | feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions. |
DRP | Disaster Recovery Plan Distribution and Replication Protocol |
refer to DR The goal of the DRP protocol is to significantly improve the efficiency and reliability of data distribution over HTTP |
DRU | Disc Remastering Utility | Tool designed to create a customized copy of the Ubuntu Linux Distribution |
DRW | Defect Remediation Window | How long it takes to fx or “close” a defect |
DS | Differentiated Service | A IETF standard for a small, well-defined set of per-packet building blocks from which a variety of services may be built, thereby providing a framework for delivering QoS in networks |
DS0 | Digital Subscriber Level Zero | A 64 Kbps unit of transmission bandwidth. A worldwide standard speed for digitizing one voice conversation, and more recently, for data transmission. Twenty-four DS0s (24x64 Kbps) equal one Digital Signal Level 1 (DS1). |
DS1 | Digital Signal Level 1 | Framing specification used in transmitting digital signals at 1.544 Mbps on a T1 facility or 2.048 Mbps on an E1 facility. |
DSn | digital signal level n | A classification of digital circuits. The DS technically refers to the rate and the format of the signal, whereas the T designation refers to the equipment providing the signals. In practice, DS and T are used synonymously; for example, DS1 and T1, DS3 and T3. |
DSA | Digital Signature Algorithm Distributed Systems Architecture |
An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The networking architecture developed by Honeywell-Bull for the GCOS environment |
DSAP | Destination Service Access Point | In OSI, a service access point used to receive data. In SNA and TCP/IP, a logical address that allows a system to route data from a remote device to the appropriate communications support. |
DSBM | Designated Subnet Bandwidth Manager | A device on a managed subnetwork that acts as the Subnet Bandwidth Manager for the subnetwork to which it is attached |
DSE | Directory Services Environment | Contains a list of Naming Contexts and Application Partitions maintained by a Domain Controller |
DSI | Dynamic Systems Initiative | Microsoft's technology strategy for products and solutions that help businesses enhance the dynamic capability of its people, process, and IT infrastructure using technology |
DSL | Digital Subscriber Line Domain-Specific Language Dual Stress Liner |
It is medium for transferring data over regular phone lines and can be used to connect to the Internet. a natural extension of and complement to UML. DSL is helping to remove the semantic gap between problem and solution domains by using tailor-made syntax and semantics. Technology by AMD and IBM to strain silicon chips to enhance their performance |
DSLAM | DSL Access Multiplexer | a device that joins a high-speed computer network to a set of ordinary telephone lines in a telephone company central office. |
DSM | dependency structure matrix | Excellence tools Kit For Development Projects |
DSM-CC | Digital storage media command and control | a toolkit for developing control channels associated with MPEG-1 and MPEG-2 streams. |
DSML | Directory Service Markup Language | combines directory services technology (LDAP ) with XML syntax to provide an easy way to share and use personalized data across company and technology boundaries. |
DSN | dealer software network | A network-resident, standards-based environment that interconnects chains of applications and services. |
DSO | data source object | A DSO exploit is a form of spyware that takes advantage of data binding to gain access to the hard drive of a computer connected to the Internet. Such spyware can be difficult to detect and eradicate, and if it is successfully removed, it often returns. |
DSOM | Distributed System Object Model | a version of SOM that supports sharing binary objects across networks. DSOM is similar to Microsoft's competing standard called DCOM. |
DSP | digital signal processor | A specialized computer chip optimized for high data rates needed to process digitized wave forms, particularly those derived from analog sources. Often used in equipment requiring voice digitization. |
DSR | Data Set Ready Dynamic Source Routing |
A serial connectivity term, used primarily with printers and modems in
modern systems. DSR is the primary computer signal line for hardware
handshaking over a serial interface; connects to the DTR line at the
computer. a self-maintaining routing protocol for wireless networks. The protocol can also function with cellular telephone systems and mobile networks with up to about 200 nodes. |
DSS | igital Signature Standard | The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography. |
DSSA | Distributed System Security Architecture | a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. |
DSSS | Direct Sequence Spread Spectrum | A spread spectrum transmission method which is also used by IEEE802.11b compatible devices. One bit of the signal is transmitted as a code word, which is equivalent to multiplying the transmission rate (spreading the transmission rate). |
DSTN | Double-layer Supertwist Nematic | This is a form of passive matrix LCD screen. |
DSTP | Data Space Transfer Protocol | used to index and categorize data using a XML based catalog. |
DSU | data service unit | A simplified modem for the transmission of digital data over a private line or for limited-distance communications over the PSTN, where it is not necessary to comply with all the requirements for a high-speed modem. |
DSU | Digital Service Unit | A user device interfacing to a digital circuit, such as DDS or T1 when com-bined with a CSU. The DSU converts the user’s data stream to bipolar format for transmission. |
DSVD | Digital Simultaneous Voice and Data | An all-digital technology for concurrent voice and data (SVD) transmission over a single analog telephone line. DSVD is endorsed by Intel, Hayes, U.S. Robotics |
DSX | Digital System Cross-connect frame | Digital System Cross-connect frame. DSX1: Digital Signal Cross-connect level 1 |
DTD | Document Type Definition | a type of file associated with SGML and XML documents that defines how the markup tags should be interpreted by the application presenting the document. |
DTDS | Disaster Tolerant Disk Systems | term from the RAID advisory board which describes server systems which must be divisible into two or more zones which cooperate to protect against loss of access to data in the event of one system's complete failure. |
DTE | Data Terminal Equipment | Devices acting as data source, data sink, or both |
DTM | Document Table Model Dynamic synchronous Transfer Mode |
Interface to a document model designed specifically for the needs of
Apache's XPath and XSLT implementations. The motivation behind this
model is to optimize performance and minimize storage a specification that was unanimously approved by the members of ETSI. |
DTMF | Data Tone Multiple Frequency | Used with modems to put more data down one line. |
DTML | Document Template Mark-up Language | a subset of SGML and a superset of HTML used for creating documents that dynamically adapt to external conditions using its own custom tags and a little bit of Python. |
DTN | Disruption Tolerant Networking | a networking architecture that is designed to provide communications in the most unstable and stressed environments |
DTP | Desktop publishing | A system that processes the text and graphics and, by means of page layout software and a laser printer, produces high-quality pages suitable for printing or in-house reproduction. |
DTS | Digital Theater System | Special system used for encoding and decoding an audio signal on multiple channels, used in cinemas and home-use theater systems as well. Used for the first time by movie director Steven Spielberg, DTS' most common channel array comprises 5.1 channels (5 fullrange and one for the subwoofer). Dolby Digital is DTS' most notable competitor. |
DTR | Data Terminal Ready | It is a primary serial printer signal for hardware handshaking over a serial interface; connects to the DSR pin at the computer. |
DTTV | Digital Terestial Televison | broadcasts over earthbound circuits so sateliites aren't used for any part of the link between the broadcaster and the end user. |
du | disk usage | du is a standard Unix program used to estimate the file space usage—space used under a particular directory or files on a file system. |
DUAL | Diffusing Update Algorithm | Convergence algorithm used in Enhanced IGRP that provides loop-free operation at every instant throughout a route computation. Allows routers involved in a topology change to synchronize at the same time, while not involving routers that are unaffected by the change. |
DUL | Dial Up List | a list of dialups known to be used by spammers. Networks can use the list to automatically block all mail from those dialups. |
DUN | Dial-Up Networking | Creating a WAN over dial-up internet. |
DUNS | Data Universal Numbering System | A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. |
DUOW / DUW |
|
A unit of work that allows SQL statements to be submitted to multiple
relational database management systems, but no more than one system per
SQL statement. In a distributed process, all processing between two syncpoints taken by two or more intercommunicating transactions using a two-phase commit protocol. |
DUPS | Digital Unbundled Port Services | An element, not bundled with a loop or transport facility, which provides digital access to the functionality of a local switching system. |
DUV | Data Under Voice | The normally unused spectrum at the lower end of a radio channel used to provide a T1 (1.544 m bps) channel for digital services. |
DV | Digital video | A digital tape-recording format using approximately 5:1 compression to produce Betacam quality on a very small cassette. |
DVB-H | Digital Video Broadcasting - Handhelds | specification for bringing broadcast services to battery-powered handheld receivers that allows the receiving device to move freely while receiving the transmission. |
DVB-SH | Digital Video Broadcasting - Satellite services to Handhelds | a system used to deliver IP based media content and data to handheld terminals, like mobile phones or PDAs, via satellite. The DVB-SH system was designed for frequencies below 3 GHz, typically in the S-band. |
DVBMHP | Digital Video Broadcasting Multimedia Home Platform | Europe and South Korea Interactive TV |
DVCD | Double Video CD | CD capable of holding up to 99 minutes of video as well as audio data, with quality similar to VHS tape. |
DVD | Digital Versatile Disc | DVD is a storage medium capable of storing programs and data. |
DVMRP | Distance Vector Multicast Routing Protocol | an interior gateway protocol based on RIP that supports connectionless multicast data transmission to a group of hosts over a network. |
DVI | Digital Video Interface, originally Digital Video Disc | A specification for a computer monitor interface capable of carrying both analog and digital signals. DVI was developed by the Digital Display Working Group, an industry group formed by Intel and other vendors. |
DVRs | Digital video/Versatile recorders | A hard-drive-equipped set-top box that makes it easy for consumers to record TV programs, pause live TV, and skip commercials. |
DWDM | dense wave division multiplexing | A technology used to increase fiber-optic transmission capacity. In fiber-optic networks such as SONET, DWDM permits fibers to carry up to eight wavelengths of light, thus multiplying their capacity by the number of wavelengths carried. |
DWF | Design Web Format | Fast, efficient way to distribute design data to anyone who needs it. With Autodesk Express Viewer, a small, free, downloadable application, you can view and print that rich data |
DWM | Desktop Windows Manager | A windowing system in Windows Vista editions (all except Starter and Home Basic) that support Aero, which handles drawing of content to the screen. |
DWS | Dialable Wideband Service | Alternative name for Multirate ISDN, providing dialed data connectivity at desired bandwidth on per call basis (from 128 kbps through 1.536 Mbps in 64 kbps increments). |
DX | DirectX / Direct X | Microsoft DirectX software |
dxdiag | directx diagnostics | a utility program for testing DirectX under Windows. |
DXF | Drawing Interchange Format | used for Macintosh graphic files. The standard file-exchange format for 3-D and CAD programs. |
DXI | Data Exchange Interface | A variable length frame-based ATM interface between a DTE and a special ATM CSU/DSU. The ATM CSU/DSU converts between the variable-length DXI frames and the fixed-length ATM cells. |
dyld | dynamic link editor | The library manager for code in the Mach-O executable format. The dynamic link editor is a dynamic library that “lives” in all Mach-O programs on the system. |
D-4 | A digital multiplexer used to convert 24 voice grade analog or data channels into DS1. | |
DaFont | DaFont is an archive of freely downloadable fonts. Fonts are categorized by theme, and can also be sorted by name, date, and popularity.http://www.dafont.com/ | |
dark fiber | Fiber-optic cable deployments that are not yet being used to carry network traffic. (The word "dark" refers to the fact that no light is passing through the optical fibers.) | |
dashboard | A summary view of the status of multiple service level agreements (SLAs). Or a Web page that can contain one or more viewers that graphically represent business data. | |
Daughter Board | A circuit board that plugs into a larger circuit board, or motherboard. | |
dBi | A unit that is used to represent the gain of an antenna compared to the gain of an isotropic radiator. | |
deadlock | A condition under which a transaction cannot proceed Unresolved contention for the use of resources. A condition in which two independent threads of control are blocked, each waiting for the other to take some action. |
|
debug | To detect, diagnose, and eliminate errors in programs. Checking the logic of a program to isolate and eliminate the mistakes from a computer program or other software. | |
Decryption | The act of restoring an encrypted file to its original state. | |
Deeper Sleep | an Intel power management technology. It helps to deliver longer battery life by minimizing the power consumption of the processor during brief periods of inactivity by the user including microseconds between keystrokes. | |
Default Route | Entry in a routing table that can redirect any frames for which the table has no definitive listing for the next hop. | |
desktop | A computer designed to sit on a desk (as opposed to a laptop). In Windows, it also means the screen you see when you aren't running any programs, with "My Computer", the Recycle Bin and so on. | |
dial-up | This is a telephone line that is connected to a server. When it is called, tones are exchanged between the server and the devise calling in order to attach. | |
DICT | dictionary network protocol created by the DICT Development Group | |
Dijkstra | Algorithm sometimes used to calculate routes given link and nodal state topology database. | |
directX | A set of multimedia APIs that Microsoft provides. | |
docking (station) | A hardware device that enables a mobile computer to function as a desktop computer. | |
DoCoMo | DoCoMo (meaning "anywhere" in Japanese) is a NTT subsidiary and Japan's biggest mobile service provider | |
domain | The unique name that identifies an internet site. Domain names always have two or more parts separated by dots. | |
drag | To move an image or a window from one place on the screen to another by grabbing it with a mouse or other pointing device and pulling it to a new location. | |
dropbox | Dropbox is a Web-based file hosting service operated by Dropbox, Inc. that uses cloud storage to enable users to store and share files and folders with others. http://www.dropbox.com/ | |
dual core | a CPU structure. The difference between a single core and dual core is that a dual core system has two CPU's that are electronically wired together. These two CPU's wired together in parallel gives twice the performance than that of its single core counterpart. | |
Due diligence | the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur. | |
dump | A large mass of information that shows the exact contents of computer memory at a particular time. To send a large volume of information to somewhere specific such as a printer or a screen. A backup or a backup file created by the UNIX dump utility. A tape or CD backup in a batch process. The general appearance of a real programmer's work area. |
|
Duplex | The ability to send and receive data over the same communications line. | |
Dynamic IP | Each computer or device connected to the internet needs its own IP address. Devices and sites that are constantly connected to the internet usually have a static IP address so the DNS can reliably route traffic to the right place. |
D
D for DNS
abbreviation / acronyms | Term | Definition |
---|---|---|
d-channel / D channel | delta channel data channel |
In ISDN, a common channel used for signaling and management of the network. used for common channel signaling by both the telephone company switch and the customer equipment; provides the call signals that set up B channel connections |
d-commerce | digital commerce | form of e-commerce by companies that sell news, documents, subscriptions, or any other content that can be delivered digitally over the Web. Under the ultimate "pay as you go" model, a d-commerce company acts as an electronic middleman: Users establish an account with a d-commerce company to purchase content from a variety publishers |
D&I | Drop And Insert | Refers to the cross connecting of Time-Division Multiplexing (TDM) circuits. It allows you to take 64Kb DS0 channels from one T1 and digitally cross connect them to 64Kb DS0 channels on another T1 |
D2D | disk-to-disk | backup technologies |
D2D2T | disk-to-disk-to-tape | backup technologies |
DA | Destination Address | Information sent in forward direction indicating address of called station or customer. |
DAA | Distributed Application Architecture | under design by Hewlett-Packard and Sun. A distributed object management environment that will allow applications to be developed independent of operating system, network or windowing system. |
DaaS | desktops-as-a-service | virtual desktop hosting |
DAB | Digital Audio Broadcast | Digital radio broadcast, providing better quality and a greater number of channels than traditional (analogue) radio. |
DAC | digital-to-analog converter | The digital-to-analog converter is for converting a digital signal into an output analog voltage. |
DAC / DACL | Discretionary Access Control List | Discretionary Access Control consists of something the user can manage, such as a document password.A DACL consists of a list of security identifiers (which identify users) and specific permissions for each |
DACS | Digital Access and Cross Connect System | A time-slot switch that allows T1 or E1 lines to be remapped electronically at the DS-0 (64 Kbps) level. Also called DCS or DXS. |
DAE | Disk Array Enclosure | The DAE is a JBOD (Just a Bunch Of Disk) enclosure without a storage processor (SP). The DAE supports up to 10 Fibre Channel drives per enclosure and is connected by dual Fibre Channel loops into the DPE. |
Daemon | Disk And Execution MONitor | Disk And Execution MONitor software |
DAFS | Direct Attached File System | an advanced methodology of a particular network data storage method. |
DAL | Dedicated Advertiser Location | A type of iTV ad in development, online advertisers are proposing Simple DALs and Complex DALs. A Simple DAL refers to the data that users reach on the screen, once they leave a video (TV) stream. Viewers will be able to leave a broadcast stream, beyond the duration of an ad, but will then get rapidly returned to it after navigating past some qualifier screens. |
DAM | Database Activity Monitoring Digital Asset Management |
a type of governance, risk and compliance
(GRC) control that transparently monitors database activity to identify fraudulent, illegal or other
undesirable behavior. the practice and domain of organizing digital files, like images, documents, videos and presentations. The term asset is used to indicate that such files have some sort of intrinsic value that makes it worthwhile to manage them. |
DAMA | demand assigned multiple access | Allocation of communication satellite time to earth stations as the need arises. |
DAML | DARPA Agent Markup Language | A language currently in development for presenting information on the WWW that will allow information objects to be tagged in a way that allows software applications, computer agents, and virtual assistants. |
DAO | Disk-At-Once | This is a single-session method of writing data to a CD-R/RW disc that creates a disc in a format suitable for commercial duplication. |
DAP | Directory Access Protocol | A derivative of the X.500 DAP standard, postulated by the ISO many years ago. DAP and X.500 remained unused for many years because of the complexity of the DAP access protocol. |
DAR | Data at rest Disk ARchive |
refer to all data in computer storage while excluding data that is
traversing a network or temporarily residing in computer memory to be
read or updated. a command-line archiving tool |
DARPA | Defense Advanced Research Project Agency | the progenitor of the Internet. DARPA is where it all began. http://www.darpa.mil/ |
DAS | direct-attached storage | RAID storage that is internal and host-attached (both the RAID controller and software technologies and the hard disk drives are housed within the server) |
DAS | distributed antenna system | a way to efficiently distribute wireless connections inside a large building where steel columns and layers of concrete can interfere with wireless signals. A DAS can be used to get rid of "dead zones" by routing radio frequency (RF) signals through fiber or copper cabling from a single base station to multiple antennas located throughout the building. |
DASH | Desktop and mobile Architecture for System Hardware | Suite of specifications that takes full advantage of the Web Services for Management (WS-Management) specificationdelivering standards-based Web services management for desktop and mobile client systems |
DAST | Dynamic Application Security Testing | technologies designed to detect conditions indicative of a security vulnerability in an application in its running state |
DAT | digital audio tape | A magnetic tape that stores audio data in digital form. |
DAVID | Digital Audio Video Interactive Decoder | Digital Audio Video Interactive Decoder |
db | Decibel | A unit of power (sound, optical or electrical) increase or decrease that is proportional to the exponential increase or decrease of power. |
DB | Database | A collection of data organized in a structured manner so that information can be readily retrieved. |
DB2 | Database 2 | IBM's RDBMS offering, originally built for Multiple Virtual Storage (MVS) systems. It uses SQL as its data manipulation and definition language. IBM has released versions of DB2 for several other operating systems, such as Windows and Unix. |
DB9 | D sub-miniature 9 | Also called Dsub9, a 9 pin connector shaped like the leter ‘D’. They are used to connect serial devices together with a serial cable. |
DBA | database administrator | The person responsible for managing data, namely data set placement, database performance, and data recovery and integrity at a physical level. Also known as a "data administrator." |
DBCS | Double-Byte Character Set | One of a number of character sets defined for representing Chinese, Japanese, or Korean text. These character sets are often encoded in such a way as to allow double-byte character encodings to be mixed with single-byte character encodings. |
dBm | decibels milliwatt | used to measure signal strength on telephone lines |
DBMS | Database Management System |
In short, a DBMS is a database
program. Technically speaking, it is a software system that uses a
standard method of cataloging, retrieving, and running queries on data.
The DBMS manages incoming data, organizes it, and provides ways for
the data to be modified or extracted by users or other programs.
|
DBS | direct broadcast satellite | A wireless technology for broadcasting by transmitting a compressed high-speed signal via satellite. |
DCAP | Data Link Switching Client Access Protocol | Data Link Switching Client Access Protocol |
DCB | Data Center Bridging | a set of IEEE industry standards that delivers end-to-end congestion notification and quality of service throughout the network which allows customers to configure traffic classes and priorities to deliver a lossless Ethernet fabric such as Open FCoE. |
DCBU | D-channel backup | An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. |
DCC | Data Country Code Digital Command Control Direct Client-to-Client |
Specifies country in which address is registered. Codes
are given in ISO 3166. Field length is two octets. Digits are encoded
in BCD syntax. systems used to operate locomotives on a model railroad a feature of some IRC client software, allowing users to communicate messages and files directly, bypassing a server. |
DCCP | Datagram Congestion Control Protocol | a minimal general purpose transport-layer protocol that minimizes the overhead of packet header size or end-node processing as much as possible. |
DCE | Data Communications Equipment Distributed Computing Environment |
Devices that provide the functions required to establish, maintain and terminate a data transmission connection. Normally it refers to a modem. In network computing, a set of services and tools that supports the creation, use, and maintenance of distributed applications across heterogeneous operating systems and networks. |
DCO | Device Configuration Overlay | Allows system vendors to purchase HDDs from different manufacturers with potentially different sizes, and then configure all HDDs to have the same number of sectors |
DCOM | Distributed Component Object Model | A version of Microsoft's COM that enables application components to be distributed over several computers through the use of a remote procedure call (RPC). |
DCT | Digital Cordless Telephone | A cordless telephone that uses digital transmission technology to provide more security and better sound quality than a traditional analog cordless telephone. |
DDAP | Digital Distribution of Advertising for Publications | User-driven organization working towards enabling the universal exchange of digital ads throughopen process integration and the use of accredited standards. See http://www.ddap.org |
DDBMS | Distributed database management system | A database management system (DBMS) that enables end users or application programmers to view a collection of physically separate databases as a logical single-system image. The concept that is most fundamental to the DDBMS is location transparency, meaning the user should not be conscious of the actual location of data. |
DDCMP | Digital Data Communications Message Protocol | A byte-oriented, link layer protocol that supports half- or full-duplex modes and either point-to-point or multipoint lines in a Digital Network Architecture network. |
DDD | Data Display Debugger | a popular graphical user interface for command-line debuggers such as GDB, DBX, JDB, WDB, XDB, the Perl debugger, and the Python debugger.DDD is licensed under the GNU GPL and is open source. |
DDE | Dynamic Data Exchange | A method of exchanging data between applications on MacOS, Windows, and OS/2 operating systems. |
DDI | Device Driver Interface Direct Dialling-In DNS, DHCP & IP address |
An interface that facilitates driver portability across different UNIX system versions on SPARC hardware. A facility enabling telephone users to dial direct into a firm's PABX extensions as if they were normal public telephone numbers. Known as DID in the USA, not to be confused with DIA. solutions that complement internal DNS & DHCP implementation. |
DDL | Data Definition Language | A language for describing data and its relationships in a database. |
DDN | Digital Data Network | A network service established in China in 1994, connecting Beijing, Tianjin, Shanghai and other provincial capitals. Each post and telecommunications administration in China has a department regulating DDN service in its region. |
DDNS | Dynamic Domain Name System | A technology that automatically updates the logical names of dynamically assigned IP addresses in the DNS server of an IP network. Specifications for a standard approach to DDNS were defined in Request for Comment 2136, introduced in 1997 |
DDoS | Distributed Denial of Service | attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the Denial of Service significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. |
DDP | Datagram Delivery Protocol | In AppleTalk networks, a protocol that provides network connectivity by means of connectionless socket-to-socket delivery service on the internet layer. |
DDR | double-data-rate | A type of SDRAM that doubles the data burst cycle, improving system performance. |
DDS | Dataphone digital service digital data service Digital Data Storage |
AT&T line service that allows the customer to transmit data on the line in a digital format. A dedicated data transmission service that operates over interconnected digital private lines. The technology that allows binary information to be recorded to a4mm DAT. The drive mechanism uses 4 heads - two to write and two to read. The tape makes contact with the heads at a 90 degree angle to produce an angled track known as a helical scan. |
DDSA | digital data service adapter | In data communications, a device used when sending and receiving data using a nonswitched digital data service. |
DDT | Disk-to-Disk-to-Tape | Data storage and archive strategy. Data is initially stored on disk then, according to some criteria, it is copied to a secondary disk store pending archiving to tape. |
DEA | Data Encryption Algorithm | In Cryptographic Support, the equivalent to the Data Encryption Standard. |
DEC | Digital Equipment Corporation | a company whose products included the PDP-8, PDP-11, and VAX minicomputers, the VT-100 terminal, and the Alpha microprocessor. In 1998, Digital Equipment Corporation was aquired by Compaq, now part of Hewlett-Packard. |
DECT | Digital Enhanced Cordless Telecommunications |
An interface specification for
digital mobile telephony. DECT employs 10 carrier frequencies
between 1.88 GHz and 1.9GHz, and has a transmission speed
of 144 Kbps.
|
defrag | defragment | To optimize your hard drive, usually with a program that "cleans it up" |
DEK | data encryption key | Used for the encryption of message text and for the computation of message integrity checks (signatures). |
DEL | DELETE | the DELETE key on a computer keyboard |
Demarc | Demarcation Point | The point, jack or cross connect panel, at which ownership or responsibility for operating and maintaining facilities passes from one party to another. |
Demux | demultiplexer | A logic circuit that takes a single input and sends it to one of several outputs. |
DEN | Directory Enabled Network | term used in conjunction with an architecture and grouping of networking capabilities that are developed and driven by a central directory. |
DEP | Data Execution Prevention dynamic enterprise publishing |
OS feature that's new in Windows 2003 SP1 & Windows XP SP2. It
serves to prevent viruses and other malicious code from ever executing combine data from an organization's CRM and other enterprise applications with content from its content management systems and other sources according to business rules to dynamically generate attractive, personalized customer communications for delivery |
DES | Data Encryption Standard Dynamic Energy Saver |
An encryption algorithm, developed by the US government, that allows
the use of variable-length keys. The longer the key, the more difficult
it is to break the algorithm GIGABYTE Dynamic Energy Saver is a revolutionary technology that delivers unparalleled power savings with the simple click of a button. |
DET | Directory Entry Table | A table on every network volume that contains directory entries for each file on the volume. The table, stored in the server's memory, enables quick access to the location of every file |
DFM | design for manufacturability Device Fault Manager Digital Flash Media |
An approach for designing products in ways that optimize their manufacture. Provides real-time fault analysis for Cisco devices a generalization for all type of digital media devices such as but not limited to CF (CompactFlash), Memory Stick (MS), MMC, Secure Digital (SD), SmartMedia (SM), USB Flash Drive (USBFD) and x D Picture Card (x D). |
DFI | Design for Innovation | DFI Inc. (Design for Innovation) |
DFL | design for logistics | A product design approach that considers logistical issues, such the manner in which the product will be stored or transported. |
DGC | Distributed garbage collection | garbage collection in a system where objects might not reside in the same address space or even on the same machine. |
DHA | directory harvest attack | an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. |
DHCP | Dynamic Host Configuration Protocol |
A network server uses this protocol to
dynamically assign IP addresses to networked computers. The DHCP
server waits for a computer to connect to it, then assigns it an IP
address from a master list stored on the server.
|
DHTML | Dynamic HyperText Markup Language | web pages that use a combination of HTML, JavaScript, and CSS to create features such as letting the user drag items around on the web page, some simple kinds of animation, and many more. |
DHX | Diffie-Hellman Exchange | an authentication method used by the Apple file service of Mac OS X Server. |
DIA | data integration and
access Dedicated Internet Access |
need of enterprises for better integrated data for operational efficiency and business intelligence a highly reliable, predictable, and guaranteed bandwidth Internet connection. |
DICOM | Digital Imaging and Communications in Medicine | a standard for handling, storing, printing, and transmitting information in medical imaging. |
DID | direct inward dial | Allows a user outside a company to dial an internal extension number without needing to pass through an operator or an attendant. The dialed digits are passed to the PBX, which then completes the call. |
DI/DO | Dispatch In/ Dispatch Out | Refers to the source of a reported trouble on a telephone circuit: Dispatch In signifies the problem is likely within the central office and that an inside technician may be assigned to troubleshoot and fix the problem Dispatch Out signifies the problem is likely on the loop portion of the circuit and that an outside technician has been assigned the problem. |
DIF | Directory Interoperability Forum | Coalition formed in 1999 by IBM, Novell, Oracle, Lotus Development and Isocor to promote the use of LDAP by developers, and to accelerate directory interoperability standards. |
DiffServ | Differentiated Services | A protocol that helps support network quality of service. DiffServ enables data packet fields to carry information about the specific level of service a packet should receive on the network. |
Digerati | digital version of literati (Italian) | a reference to a vague cloud of people seen to be knowledgeable, hip, or otherwise in-the-know in regardsto the digital revolution. |
DIIOp | Dominio Internet Inter-Orb Protocol | allows external programs to attach to, and manipulate Domino databases |
DIMM | Dual In-line Memory Module | DIMM is a later version of memory than that of its earlier SIMM counterpart. A DIMM module was introduced for the Pentium processor because the Pentium processor needed a 64 bit path. The SIMM module only has a 32 bit path. |
DIPP | Dual Inline Pin Package | Refers to the physical geometry of an integrated circuit or other electronic package; rectangular, with pins on the two longer sides |
DIR | DIRectory | DIRectory |
Dirid | Directory identifier | A numeric identifier used within INF files to represent a disk directory. |
DISA | Defense Information Systems Agency Data Interchange Standards Association |
Defense Information Systems Agency Data Interchange Standards Association |
Disc / Disk | DISKETTE | A thin, flexible, plastic, circular memory medium, coated on both sides with metal oxide and enclosed in a protective jacket. Data is stored magnetically in binary digital form on its surface(s). |
DIT | Directory Information Tree | A graphical display of an organization's directory structure, sites, and servers, shown as a branching structure. The top-level (root) directory usually represents the organization level |
DITTO | Data Interfile Transfer, Testing and Operations | An IBM licensed program that provides file-to-file services for card I/O, tape, and disk devices. |
Divx | DIgital Video Express | DVD (DVD-ROM) format being promoted by several large Hollywood companies, including Disney, Dreamworks SKG, Paramount and Universal. The idea was financed mainly by retail electronics giant Circuit City. |
DIX | Digital, Intel , Xerox | The first letter of the Digital Corp, the Intel Corp, and the Xerox Corp, which are the leading vendors defined the original Ethernet standards. |
DKI | Driver Kernel Interface | An interface between the UNIX system kernel and different types of drivers. DKI consists of a set of driver-defined functions that are called by the kernel. These functions are entry points into a driver. |
DKMS | Dynamic Kernel Module Support | Designed to create a framework where kernel dependent module source can reside so that it is very easy to rebuild modules as you upgrade kernels |
DL | Density Line double-layer |
An HP brandname for the ProLiant Density Line, which are servers in
one-, two- and four-socket designs, optimized for rack-mounted server
environments. describing a DVD or similar disc recorded in two layers from the same side, giving twice as much capacity as a single layer. |
DLC | data link control |
A set of rules used by nodes on a data link (such as an SDLC link or a
token ring) to accomplish an orderly exchange of information. protocol layer used by nodes on a data link to accomplish an orderly exchange of information. |
DLC | Digital Loop Carrier | Digital transmission system designed for subscriber loop plant. Multiplexes many circuits onto very few wires or onto single fiber pair. |
DLCI | data link connection identifier | A number of a private or switched virtual circuit in a Frame Relay network that tells the Frame Relay how to route the data. |
DLDP | Device Link Detection Protocol | detect the link status of a fiber cable or twisted |
DLE | data link escape | In BSC, a transmission control character used to indicate that the next character is a control character, not a data character. |
DLL | dynamic link library | A Windows mechanism that links executable code modules to an application program or process. A DLL is loaded at runtime by the application or process that invokes it. |
DLM | data life cycle management | a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted. |
DLOS | Direct Line-of-sight Desktop Line-of-sight |
where the points of a circuit have a physically proven clear and unobstructed view of each other an initial survey conducted on a computer with specialised planning software which allows the user to ascertain if the two points of a circuit have probable line-of-sight |
DLP | data leak prevention Digital Light Processing |
The term used to describe a system that is put in place to stop the
unauthorised loss of outside of the control of an organisation. Data
loss is a prevalent problem that has resulted in significant
reputational and legal issues for many organisations. A video projection technology that uses hundreds of thousands of rotating mirrors to project high quality, high definition images. DLP was originally developed by Texas Instruments. |
DLPBC | Dual Loop Port Bypass Circuitry | routing circuitry that makes it possible to add and remove nodes without disrupting the network. |
DLPI | Data Link Provider Interface | The SVR4 STREAMS-based kernel-level interface that supports the services of the Data Link Layer for both connection-mode and connectionless-mode services |
DLR | Design Layout Record | The layout for the local portion of a circuit at a particular location. |
DLT | Digital Linear Tape | A magnetic tape technology that uses half-inch, single-hub cartridges,writes 128 or 208 linear tracks, and provides capacities from 40 to80GB. A technology designed by DEC and sold to Quantum |
DM | Data Mining | Generic term for identifying possible relationships and trends between data items. Typically data mining is the statistical analysis of data to identify commonalities and patterns. |
DMA | Direct Memory Access | A technique of transferring data between the computer memory and a device on the computer bus without the intervention of the microprocessor. |
DMAA | Discrete Mathematics, Algorithms and Applications | Discrete Mathematics, Algorithms and Applications |
DMB | Dhtml Menu Builder | Used to idetify a DHTML/Javascript menu building tool called DHTML Menu Builder. Also used in the extension of the application's project files |
DMCA | Digital Millennium Copyright Act | A controversial reform of the U.S. copyright laws that is the first attempt to update those laws for the age of digital technology. |
DME | distributed management environment | A specification of the Open Software Foundation (OSF) for managing open systems. |
DMI | Desktop Management Interface | an API to enable software to collect information about a computer environment. |
DML | Data Manipulation Language | a family of computer languages used by computer programs or database users to retrieve, insert, delete and update data in a database. The currently most popular Data manipulation language is that of SQL, which is used to retrieve and manipulate data in a Relational database. |
DMO | Distributed Management Object | This OLE server exposes representations of SQL Server database objects (tables, stored procedures, server properties, and so on), many of which are usually modified through Transact-SQL |
DMS | Digital Multiplex Systems | System that combines number of digital circuits. |
DMT | Discrete Multi-Tone | an ADSL modulation technique that splits bandwidth usage usage into sub-channels for maximum data transfer. A channel is then optimized for modulation if certain channels cannot transmit data. |
DMZ | demilitarized zone | a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s. |
DNA | Deoxyribonucleic acid Distributed Network Architecture |
the genetic or hereditary material in humans and most of the other
living organisms. DNAs are mostly stored in the nucleus of cells and
can replicate themselves. Arrangement of networked computers in which several processors (the CPUs) are located on scattered machines, but are capable of working both independently and jointly as required. DNA is also Delivery Network Accelerator (BitTorrent), Dynamic Network Administration (Ericsson), Dynamic Network Analyzer (Lucent) |
DNIC | data network identification code | A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. |
DNLC | Directory Name Lookup Cache | Unix file cache |
DNR | Digital Noise Reduction |
Ensures superior picture quality by "cleaning" images and
reducing picture "noise". Particularly useful for older movies where
the source master has picture noise.
|
DNS | Domain Name Service / Server / System |
the way that Internet domain names are
located and translated into IP addresses. A domain name is a
meaningful and easy-to-remember "handle" for an Internet address.
|
DNSBL | DNS Based List, DNS Blacklist, or DNS Blocklist. | A published list of IP addresses that can be queried through the Internet. DNSBLs are used to publish IP addresses associated with e-mail spam and spamming. |
DNSSEC | Domain Name System SECurity extensions | Technique for securing the Domain Name System. It is a set of extensions to DNS, which provide end-to-end authenticity and integrity and was designed to protect the Internet from certain attacks. See also http://www.dnssec.net/ |
DOA | Dead On Arrival | Service to replace malfunctioning devices. In CRM, DOA report tells users which products are the most error-prone or receive the most complaints from customers.T |
DOCSIS | Data-over-Cable Service Interface Specifications | Defines technical specifications for equipment at both subscriber locations and cable operators' headends. Adoption of DOCSIS will accelerate the deployment of data-over-cable services and will ensure interoperability of equipment throughout system operators' infrastructures. |
DO-IT | Disabilities, Opportunities, Internetworking and Technology | Disabilities, Opportunities, Internetworking and Technology |
Dolly | Digital Dolly | a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files. It is similar to the Symantec product known as Ghost. |
DOM | distributed output management Document Object Model |
Middleware that drives the output process and supports the automated creation and delivery of documents. A platform-neutral and language-neutral interface that allows programs and scripts to access and update the content, structure, and style of documents dynamically. |
DOMAIN | Distributed Operating Multi Access Interactive Network | Distributed Operating Multi Access Interactive Network |
DOP | Dilution Of Precision | One of many quality measurements to evaluate solutions derived by a positioning receiver. This is a numeric value that relates relative geometries between positioning satellites as well as the geometries between the satellites and the receiver. |
DoS | denial of service | The inability of a Web site or other server to respond to legitimate connections. DoS attacks are used to block access to a target Internet site. |
DOS | Disk Operating System | A command-driven PC OS that resides in main memory and uses disks for data storage. It was once the standard OS for IBM-compatible PCs. Early versions of Microsoft Windows ran on top of DOS. |
DOV | Data-Over-Voice | A technique used in FDM allowing the combination of voice and data on the same line. DOV usually employs twisted pair cables assigning some of the unused bandwidth for data transmission. |
DPA |
|
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers. |
DPC | Destination Point Code | The part of a routing label that identifies where an SS7 signaling message should be sent. |
DPF | Database Partitioning Feature | A feature that can be used to improve the management of a large database by dividing it into multiple database partitions that are physically placed on one or more servers. |
DPI | deep packet inspection Distributed Protocal Interface |
An advanced form of firewall technology that looks deeper into the
packet stream than traditional packet inspection approaches to identify
attempts at malicious behavior and block them. An extension to the SNMP agent that permits users to dynamically add, delete, or replace management variables in the local MIB without requiring recompilation of the SNMP agent. |
dpi | Dots Per Inch | An image measurement standard that measures an images resolution as it applies to printers. It measures the images pixels in one square inch. The higher the number the better the images resolution or quality. |
DPMA | Dynamic Power Management Architecture | This architecture allows computers to have a variety of advanced power management features. |
DPMI | Dos Protected Mode Interface | allow DOS programs to access the extended memory of PC architecture computers while maintaining system protection. DPMI defines a specific subset of DOS and BIOS calls that can be made by protected mode DOS programs. |
DPN | Data Packet Network | Network in which “bundles of information are transmitted, one after another. Differs from circuit network, in which entire circuit is dedicated to particular user. |
DPtoTP | Display Coordinates TO Tablet Coordinates | Coordinates conversion |
DPV | Distributed Partitioned View | Joins horizontally partitioned data from a set of member tables across one or more servers, making the data appear as if from one table |
DPW | Digital Pulse Wireless | also known as Ultra Wideband Radio. It is the revolutionary wireless technology for transmitting large amounts of digital data over a wide electromagnetic radiation spectrum of frequency bands with very low power. |
DQM | Data Quality Manager | Oracle CDH engine |
DR | disaster recovery | Methods and procedures for returning a system, network or data center to full operation after a catastrophic interruption — including the recovery of lost data, the use of alternative network channels if the primary channels are disconnected or malfunctioning. |
DRAC | Dell Remote Assistant Card | Interface card from Dell Inc that provides out-of-band management facilities. The controller has its own processor, memory, battery, network connection, and access to the system bus |
DRAM | Dynamic Random Access Memory | This is a common type of random access memory that is used in personal computing. The "dynamic" in its name is due to the fact that this memory needs to be refreshed as opposed to other SRAM that is "static". The DRAM is refreshed by the use of electrical current pulses that pass through all memory cells. DRAM needs to be periodically refreshed to retain the stored data. |
DRE | Document Rendering Engine | Collection of Java classes that can be used to define an abstract document and render it in PDF or HTML. A document consists of a collection of elements such as text, lists (bulleted, numbered, plain), tables, images, fonts, color, etc. |
DRF | Data Recovery Field | In NTFS file encryption keys are stored there |
DRi | Disaster Recovery Institute | DRI International was founded in 1988 in order to develop a base of knowledge in contingency planning and the management of risk, a rapidly growing profession. |
DRM | Data Relationship Management digital rights management |
Oracle Hyperion technology to provide strong hierarchy visualization and management capabilities Trusted exchange of digital information over the Internet whereby the user is granted only the privileges that the document sender allows. |
DROP | delivery of real-time execution information protocol | feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions. |
DRP | Disaster Recovery Plan Distribution and Replication Protocol |
refer to DR The goal of the DRP protocol is to significantly improve the efficiency and reliability of data distribution over HTTP |
DRU | Disc Remastering Utility | Tool designed to create a customized copy of the Ubuntu Linux Distribution |
DRW | Defect Remediation Window | How long it takes to fx or “close” a defect |
DS | Differentiated Service | A IETF standard for a small, well-defined set of per-packet building blocks from which a variety of services may be built, thereby providing a framework for delivering QoS in networks |
DS0 | Digital Subscriber Level Zero | A 64 Kbps unit of transmission bandwidth. A worldwide standard speed for digitizing one voice conversation, and more recently, for data transmission. Twenty-four DS0s (24x64 Kbps) equal one Digital Signal Level 1 (DS1). |
DS1 | Digital Signal Level 1 | Framing specification used in transmitting digital signals at 1.544 Mbps on a T1 facility or 2.048 Mbps on an E1 facility. |
DSn | digital signal level n | A classification of digital circuits. The DS technically refers to the rate and the format of the signal, whereas the T designation refers to the equipment providing the signals. In practice, DS and T are used synonymously; for example, DS1 and T1, DS3 and T3. |
DSA | Digital Signature Algorithm Distributed Systems Architecture |
An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The networking architecture developed by Honeywell-Bull for the GCOS environment |
DSAP | Destination Service Access Point | In OSI, a service access point used to receive data. In SNA and TCP/IP, a logical address that allows a system to route data from a remote device to the appropriate communications support. |
DSBM | Designated Subnet Bandwidth Manager | A device on a managed subnetwork that acts as the Subnet Bandwidth Manager for the subnetwork to which it is attached |
DSE | Directory Services Environment | Contains a list of Naming Contexts and Application Partitions maintained by a Domain Controller |
DSI | Dynamic Systems Initiative | Microsoft's technology strategy for products and solutions that help businesses enhance the dynamic capability of its people, process, and IT infrastructure using technology |
DSL | Digital Subscriber Line Domain-Specific Language Dual Stress Liner |
It is medium for transferring data over regular phone lines and can be used to connect to the Internet. a natural extension of and complement to UML. DSL is helping to remove the semantic gap between problem and solution domains by using tailor-made syntax and semantics. Technology by AMD and IBM to strain silicon chips to enhance their performance |
DSLAM | DSL Access Multiplexer | a device that joins a high-speed computer network to a set of ordinary telephone lines in a telephone company central office. |
DSM | dependency structure matrix | Excellence tools Kit For Development Projects |
DSM-CC | Digital storage media command and control | a toolkit for developing control channels associated with MPEG-1 and MPEG-2 streams. |
DSML | Directory Service Markup Language | combines directory services technology (LDAP ) with XML syntax to provide an easy way to share and use personalized data across company and technology boundaries. |
DSN | dealer software network | A network-resident, standards-based environment that interconnects chains of applications and services. |
DSO | data source object | A DSO exploit is a form of spyware that takes advantage of data binding to gain access to the hard drive of a computer connected to the Internet. Such spyware can be difficult to detect and eradicate, and if it is successfully removed, it often returns. |
DSOM | Distributed System Object Model | a version of SOM that supports sharing binary objects across networks. DSOM is similar to Microsoft's competing standard called DCOM. |
DSP | digital signal processor | A specialized computer chip optimized for high data rates needed to process digitized wave forms, particularly those derived from analog sources. Often used in equipment requiring voice digitization. |
DSR | Data Set Ready Dynamic Source Routing |
A serial connectivity term, used primarily with printers and modems in
modern systems. DSR is the primary computer signal line for hardware
handshaking over a serial interface; connects to the DTR line at the
computer. a self-maintaining routing protocol for wireless networks. The protocol can also function with cellular telephone systems and mobile networks with up to about 200 nodes. |
DSS | igital Signature Standard | The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography. |
DSSA | Distributed System Security Architecture | a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. |
DSSS | Direct Sequence Spread Spectrum | A spread spectrum transmission method which is also used by IEEE802.11b compatible devices. One bit of the signal is transmitted as a code word, which is equivalent to multiplying the transmission rate (spreading the transmission rate). |
DSTN | Double-layer Supertwist Nematic | This is a form of passive matrix LCD screen. |
DSTP | Data Space Transfer Protocol | used to index and categorize data using a XML based catalog. |
DSU | data service unit | A simplified modem for the transmission of digital data over a private line or for limited-distance communications over the PSTN, where it is not necessary to comply with all the requirements for a high-speed modem. |
DSU | Digital Service Unit | A user device interfacing to a digital circuit, such as DDS or T1 when com-bined with a CSU. The DSU converts the user’s data stream to bipolar format for transmission. |
DSVD | Digital Simultaneous Voice and Data | An all-digital technology for concurrent voice and data (SVD) transmission over a single analog telephone line. DSVD is endorsed by Intel, Hayes, U.S. Robotics |
DSX | Digital System Cross-connect frame | Digital System Cross-connect frame. DSX1: Digital Signal Cross-connect level 1 |
DTD | Document Type Definition | a type of file associated with SGML and XML documents that defines how the markup tags should be interpreted by the application presenting the document. |
DTDS | Disaster Tolerant Disk Systems | term from the RAID advisory board which describes server systems which must be divisible into two or more zones which cooperate to protect against loss of access to data in the event of one system's complete failure. |
DTE | Data Terminal Equipment | Devices acting as data source, data sink, or both |
DTM | Document Table Model Dynamic synchronous Transfer Mode |
Interface to a document model designed specifically for the needs of
Apache's XPath and XSLT implementations. The motivation behind this
model is to optimize performance and minimize storage a specification that was unanimously approved by the members of ETSI. |
DTMF | Data Tone Multiple Frequency | Used with modems to put more data down one line. |
DTML | Document Template Mark-up Language | a subset of SGML and a superset of HTML used for creating documents that dynamically adapt to external conditions using its own custom tags and a little bit of Python. |
DTN | Disruption Tolerant Networking | a networking architecture that is designed to provide communications in the most unstable and stressed environments |
DTP | Desktop publishing | A system that processes the text and graphics and, by means of page layout software and a laser printer, produces high-quality pages suitable for printing or in-house reproduction. |
DTS | Digital Theater System | Special system used for encoding and decoding an audio signal on multiple channels, used in cinemas and home-use theater systems as well. Used for the first time by movie director Steven Spielberg, DTS' most common channel array comprises 5.1 channels (5 fullrange and one for the subwoofer). Dolby Digital is DTS' most notable competitor. |
DTR | Data Terminal Ready | It is a primary serial printer signal for hardware handshaking over a serial interface; connects to the DSR pin at the computer. |
DTTV | Digital Terestial Televison | broadcasts over earthbound circuits so sateliites aren't used for any part of the link between the broadcaster and the end user. |
du | disk usage | du is a standard Unix program used to estimate the file space usage—space used under a particular directory or files on a file system. |
DUAL | Diffusing Update Algorithm | Convergence algorithm used in Enhanced IGRP that provides loop-free operation at every instant throughout a route computation. Allows routers involved in a topology change to synchronize at the same time, while not involving routers that are unaffected by the change. |
DUL | Dial Up List | a list of dialups known to be used by spammers. Networks can use the list to automatically block all mail from those dialups. |
DUN | Dial-Up Networking | Creating a WAN over dial-up internet. |
DUNS | Data Universal Numbering System | A system in which internationally recognized nine-digit numbers are assigned and maintained by Dun & Bradstreet to uniquely identify worldwide businesses. |
DUOW / DUW |
|
A unit of work that allows SQL statements to be submitted to multiple
relational database management systems, but no more than one system per
SQL statement. In a distributed process, all processing between two syncpoints taken by two or more intercommunicating transactions using a two-phase commit protocol. |
DUPS | Digital Unbundled Port Services | An element, not bundled with a loop or transport facility, which provides digital access to the functionality of a local switching system. |
DUV | Data Under Voice | The normally unused spectrum at the lower end of a radio channel used to provide a T1 (1.544 m bps) channel for digital services. |
DV | Digital video | A digital tape-recording format using approximately 5:1 compression to produce Betacam quality on a very small cassette. |
DVB-H | Digital Video Broadcasting - Handhelds | specification for bringing broadcast services to battery-powered handheld receivers that allows the receiving device to move freely while receiving the transmission. |
DVB-SH | Digital Video Broadcasting - Satellite services to Handhelds | a system used to deliver IP based media content and data to handheld terminals, like mobile phones or PDAs, via satellite. The DVB-SH system was designed for frequencies below 3 GHz, typically in the S-band. |
DVBMHP | Digital Video Broadcasting Multimedia Home Platform | Europe and South Korea Interactive TV |
DVCD | Double Video CD | CD capable of holding up to 99 minutes of video as well as audio data, with quality similar to VHS tape. |
DVD | Digital Versatile Disc | DVD is a storage medium capable of storing programs and data. |
DVMRP | Distance Vector Multicast Routing Protocol | an interior gateway protocol based on RIP that supports connectionless multicast data transmission to a group of hosts over a network. |
DVI | Digital Video Interface, originally Digital Video Disc | A specification for a computer monitor interface capable of carrying both analog and digital signals. DVI was developed by the Digital Display Working Group, an industry group formed by Intel and other vendors. |
DVRs | Digital video/Versatile recorders | A hard-drive-equipped set-top box that makes it easy for consumers to record TV programs, pause live TV, and skip commercials. |
DWDM | dense wave division multiplexing | A technology used to increase fiber-optic transmission capacity. In fiber-optic networks such as SONET, DWDM permits fibers to carry up to eight wavelengths of light, thus multiplying their capacity by the number of wavelengths carried. |
DWF | Design Web Format | Fast, efficient way to distribute design data to anyone who needs it. With Autodesk Express Viewer, a small, free, downloadable application, you can view and print that rich data |
DWM | Desktop Windows Manager | A windowing system in Windows Vista editions (all except Starter and Home Basic) that support Aero, which handles drawing of content to the screen. |
DWS | Dialable Wideband Service | Alternative name for Multirate ISDN, providing dialed data connectivity at desired bandwidth on per call basis (from 128 kbps through 1.536 Mbps in 64 kbps increments). |
DX | DirectX / Direct X | Microsoft DirectX software |
dxdiag | directx diagnostics | a utility program for testing DirectX under Windows. |
DXF | Drawing Interchange Format | used for Macintosh graphic files. The standard file-exchange format for 3-D and CAD programs. |
DXI | Data Exchange Interface | A variable length frame-based ATM interface between a DTE and a special ATM CSU/DSU. The ATM CSU/DSU converts between the variable-length DXI frames and the fixed-length ATM cells. |
dyld | dynamic link editor | The library manager for code in the Mach-O executable format. The dynamic link editor is a dynamic library that “lives” in all Mach-O programs on the system. |
D-4 | A digital multiplexer used to convert 24 voice grade analog or data channels into DS1. | |
DaFont | DaFont is an archive of freely downloadable fonts. Fonts are categorized by theme, and can also be sorted by name, date, and popularity.http://www.dafont.com/ | |
dark fiber | Fiber-optic cable deployments that are not yet being used to carry network traffic. (The word "dark" refers to the fact that no light is passing through the optical fibers.) | |
dashboard | A summary view of the status of multiple service level agreements (SLAs). Or a Web page that can contain one or more viewers that graphically represent business data. | |
Daughter Board | A circuit board that plugs into a larger circuit board, or motherboard. | |
dBi | A unit that is used to represent the gain of an antenna compared to the gain of an isotropic radiator. | |
deadlock | A condition under which a transaction cannot proceed Unresolved contention for the use of resources. A condition in which two independent threads of control are blocked, each waiting for the other to take some action. |
|
debug | To detect, diagnose, and eliminate errors in programs. Checking the logic of a program to isolate and eliminate the mistakes from a computer program or other software. | |
Decryption | The act of restoring an encrypted file to its original state. | |
Deeper Sleep | an Intel power management technology. It helps to deliver longer battery life by minimizing the power consumption of the processor during brief periods of inactivity by the user including microseconds between keystrokes. | |
Default Route | Entry in a routing table that can redirect any frames for which the table has no definitive listing for the next hop. | |
desktop | A computer designed to sit on a desk (as opposed to a laptop). In Windows, it also means the screen you see when you aren't running any programs, with "My Computer", the Recycle Bin and so on. | |
dial-up | This is a telephone line that is connected to a server. When it is called, tones are exchanged between the server and the devise calling in order to attach. | |
DICT | dictionary network protocol created by the DICT Development Group | |
Dijkstra | Algorithm sometimes used to calculate routes given link and nodal state topology database. | |
directX | A set of multimedia APIs that Microsoft provides. | |
docking (station) | A hardware device that enables a mobile computer to function as a desktop computer. | |
DoCoMo | DoCoMo (meaning "anywhere" in Japanese) is a NTT subsidiary and Japan's biggest mobile service provider | |
domain | The unique name that identifies an internet site. Domain names always have two or more parts separated by dots. | |
drag | To move an image or a window from one place on the screen to another by grabbing it with a mouse or other pointing device and pulling it to a new location. | |
dropbox | Dropbox is a Web-based file hosting service operated by Dropbox, Inc. that uses cloud storage to enable users to store and share files and folders with others. http://www.dropbox.com/ | |
dual core | a CPU structure. The difference between a single core and dual core is that a dual core system has two CPU's that are electronically wired together. These two CPU's wired together in parallel gives twice the performance than that of its single core counterpart. | |
Due diligence | the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur. | |
dump | A large mass of information that shows the exact contents of computer memory at a particular time. To send a large volume of information to somewhere specific such as a printer or a screen. A backup or a backup file created by the UNIX dump utility. A tape or CD backup in a batch process. The general appearance of a real programmer's work area. |
|
Duplex | The ability to send and receive data over the same communications line. | |
Dynamic IP | Each computer or device connected to the internet needs its own IP address. Devices and sites that are constantly connected to the internet usually have a static IP address so the DNS can reliably route traffic to the right place. |
E
E for Ethernet
abbreviation / acronyms | Term | Definition |
---|---|---|
E3 | Electronic Entertainment Expo | The annual video game conference and show at the Los Angeles Convention center. www.e3expo.com |
e- | Electronic | Electronic or online (for instance an e-zine is an online magazine published only in an electronic form). |
e-discovery | Electronic discovery | the collection, processing and review of large amounts of ESI within an enterprise to meet the mandates imposed by common law requirements for discovery. These demands may be due to civil or criminal litigation, regulatory oversight, or administrative proceedings. An independent group of consultants, legal scholars and vendors have created and put into the public domain an "E-Discovery Reference Model" ([EDRM]; www.edrm.net ) |
e-paper | Electronic paper | e-paper a range of display technology which are designed to mimic the appearance of ordinary ink on paper. |
E Phone | Emergency Phones. | telecom slang. |
E&M | recEive and transMit (or ear and mouth) | Trunking arrangement generally used for two-way switch-to-switch or switch-to- network connections. Cisco's analog E&M interface is an RJ-48 connector that allows connections to PBX trunk lines (tie lines). E&M also is available on E1 and T1 digital interfaces. |
E1 | A European digital communications line with a transmission speed of 2.048 Mbps, as defined under the E-carrier system. For DS1, 32 digital voice channels are multiplexed onto one E1 channel | |
E2 | A digital telecommunications connection category defined under the European E-carrier system. An E2 line has an aggregate capacity of 8.448 megabits per second. | |
E2E | End-to-End | Also known as "soup-to-nuts" it is an acronym for a sector of the industry that specializes in providing end-to-end solutions. |
E3 | A European digital telecommunications facility with a transmission speed of 34.368 Mbps. For DS3, 32 voice channels are multiplexed onto one E3 channel. | |
EA | Electronic Arts Enterprise Agreement |
EA (NASDAQ: ERTS) is a major American developer, marketer, publisher and distributor of video games. EA is a Microsoft volume software agreement. |
EAB | Enterprise Address Book | A collection of information about people, departments, and locations in an enterprise. Information about people may include telephone numbers, mailing addresses, and the department in which a person works. |
EAI | Enterprise application integration | EAI is a business computing term for the plans, methods, and tools aimed at modernizing, consolidating, and coordinating the computer applications in an enterprise. |
EAL | Evaluation Assurance Level | 4 Common Criteria certification of Watchguard firewall |
EAM | Event Aggregation Module | Tivoli Security Operations Manager module |
EAP | Extensible Authentication Protocol | a protocol for wireless networks that expands on authentication methods used by the PPP, a protocol often used when connecting a computer to the Internet. |
EAR | Emergency Assistance Request | usually an internal request within a company for technical assistance by their own support staff to assist with an end-user problem. Most of these problems are termed as BUGS by users and by the programmers as undocumented features. |
EARL | Enhanced Address Recognition Logic | a custom Catalyst 5000 family switch component similar to the learning bridge or content-addressable memory (CAM) of other types of network switches and routers |
EAS | enterprise application server | enterprise application server |
EASDAQ | European Association of Securities Dealers Automated Quotations | An electronic pan-European stock exchange founded by the Belgian Banking and Finance Commission, closely modeled on the NASDAQ exchange in the United States. In 2001, NASDAQ acquired a 58 percent stake in EASDAQ and renamed it NASDAQ Europe. |
EAT | End Around Test | Also known as a wrap test, returns output signal to input line |
EAX | Environmental Audio | A hardware and software audio standard developed by Creative Labs. It was originally used in SoundBlaster sound boards, and is supported by other companies as well now. |
EB | Exabyte | This is 2^60 bytes or 1024 petabytes. |
EBCDIC | Extended Binary Coded Decimal Interchange Code | It is also called the Extended ASCII Code. This is a common asynchronous code used by IBM. It is pronounced "ehb-suh-dik". Many corporation that have legacy applications and databases in IBM's OS/390 operating system use this code for the text files. The 8 bit character code is used to represent 256 different bit patterns. |
EBIF | Enhanced TV Binary Interchange Format | standard under the SelecTV brand announced in early 2010 |
EBML | Extensible Binary Meta Language | Simple, XML-like binary language for describing data in structured style. See http://ebml.sourceforge.net/ |
EBPP | Electronic Bill Presentation and Payment | An acronym that implies using the Internet to send, receive, and pay bills, this is considered by some people to be the next step in online banking. |
EBS | E-Business Suite | Oracle's order management hubs |
EC2 | Elastic Compute Cloud | Amazon EC2 allows customers to rent computers on which to run their own computer applications. EC2 allows scalable deployment of applications by providing a web services interface through which a customer can create virtual machines, i.e. server instances, on which the customer can load any software of their choice. |
ECB | electronic code book Event Control Block |
A method of enciphering and deciphering data in address spaces or data
spaces. Each 64-bit block of plaintext is separately enciphered and
each block of the ciphertext is separately deciphered. A data structure used to control sending and receiving of packets in a Novell Network |
ECC | elliptic curve cryptography Error Checking and Correction |
Approach to public-key cryptography
based on elliptic curves over finite fields. A method of detecting and correcting system memory errors by adding additional bits and using a special algorithm. |
ECEM | enterprise carbon and energy management | A corporatewide system of record for monitoring, managing, and reporting energy use and carbon emissions. ECEM is a Forrester term, which we feel best describes the systems' functionality and customer requirements. |
ECHS | Extended Cylinders, Heads, Sectors | Enables use of hard drives up to 8.4 GB in size |
eCI | eCommerce integrator | A service provider that offers strategy, marketing, design, and technical services for eBusiness. Technical services are custom development, commerce package implementation, and application integration, not hosting or network services. |
ECM | Enterprise content management | a set of tools and methods that obtain, organize, store and deliver information crucial to its operation. The fundamental objectives of ECM are to streamline access, eliminate bottlenecks, optimize security, maintain integrity and minimize overhead. |
ECMA | European Computer Manufacturers Association | An industry trade group headquartered in Geneva. The ECMA has developed more than 200 computer standards. |
ECMP | Equal Cost Multipath Routing | distributes traffic across multiple high-bandwidth links to increase performance. One company's OSPF implementation supports multiple equal-cost paths between points and divides traffic evenly among the available paths. |
ECO | Engineering Change Order | Hardware minor revisions, usually in the days of minicomputers, where a change wasn't made to the PCB layout (which would probably carry the major revision number/letter) |
ECP | electronic check presentment | The electronic presentation of check data to processing banks. In the first ECP phase, one bank presents a second bank with electronic check information based on the check's MICR line, which states the correct customer account and the amount of the payment. |
ECS | Extended Character Set | An industry acronym for a specialized ASCII character set. The main differences are in the control characters and the decimal character representations of decimal 128-255. |
ECTF | Enterprise Computer Telephony Forum | Brings together the best industry thinkers on the planet to deliver on a shared vision in the computer telephony industry to allow for open access to a diversity of communications products and services. See also http://www.ectf.org/ |
E_D_TOV | error detect timeout value | The time that a switch waits for an expected response before declaring an error condition. This value is adjustable in 1 microsecond increments from 2 - 10 seconds. |
ED2K | eDonkey2000 | a decentralized, mostly server-based, peer-to-peer file sharing network best suited to share big files among users, and to provide long term availability of said files. |
EDA | event-driven architecture | EDA is a software architecture pattern that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke. |
EDC | electronic dispersion compensation Electronic Data Capture | EDC technology is supported by the Optical Internetworking Forum (OIF) - a group currently defining a 10 Gbps interoperability specification targeting optical links. The transmission distance of this specification supports up to 120 km (2400 ps/nm) EDC system is a computerized system designed for the collection of clinical data in electronic format |
EDI | electronic data interchange | The exchange of structured electronic data between computer systems according to predefined message standards. |
EDIFACT | Electronic Data Interchange For Administration, Commerce and Transport | international EDI standard developed under the United Nation, also named UN/EDIFACT |
EDO | Extended Data Output | a type of dynamic random access memory. EDO memory is much faster than DRAM because it can access more than one block of information at a time. EDO memory accesses a block of memory and as it is sending the information from one block it starts accessing another block to fetch information. |
EDGE | Enhanced Data Rates for GSM Evolution | A radio interface technology with enhanced modulation designed to provide GSM and time division multiple access (TDMA) networks with the capacity to rival third-generation (3G) cellular networks. |
EDI | Electronic Data Interchange |
The process of automating the exchange
of business information such as purchase orders, delivery notes and
invoices over a data network.
|
EDM | Electronic Document Management EMC Data Manager |
A system that manages different kinds of documents, using computer
programs and storage. An EDM system allows a company and its users to
create a document or capture the hard copy of a file in electronic form. A centralized, high-performance backup and restore system optimized for large enterprise database environments, from storage vendor EMC. |
edress | e-mail address | e-mail address |
EDS | Electronic Data Systems | A multibillion-dollar system integration and IT services firm, founded in 1962 and headquartered in Plano, Texas. Acquired by HP. |
EDW | enterprise data warehouse | enterprise data warehouse |
EEPROM /EPROM | Electrical Erasable Programmable Read Only Memory | This type of memory can be reprogrammed and erased electronically repeatedly by using a device programmer which provides an electric surge. |
EF | Expedited Forwarding | A Per-Hop Behavior in the Differentiated Service standard, used to create a virtual leased line service |
EFI | Extensible Firmware Interface | Software that runs automatically when an Intel-based Macintosh first starts up. It determines the computers hardware configuration and starts the system software. |
EFM | Enterprise fraud and misuse management | saves users money by enabling operational efficiencies, and by stopping fraud and misuse that occur across multiple channels, accounts or products |
EFT | Electronic Funds Transfer | A system where money is transferred electronically from one bank account to another, without the need for any paper work such as the traditional cheque. |
EFS | Encrypting File System Error Free Seconds |
An encryption method based on digital certificates, which allows users
to protect the confidentiality of their data on a per-file or
per-folder basis. A unit used to specify the error performance of T carrier systems, usually expressed as EFS per hour, day, or week. This method gives a better indication of the distribution of bit errors than a simple BER. |
EGA | Enhanced Graphics Adapter | A computer display standard that provides a resolution of 640 by 350 pixels, a palette of 64 colors, and the ability to display as many as 16 colors at one time. |
EGL | Enterprise Generation Language | A high-level language that allows developers to focus on business logic as they create complex business applications for deployment in any of several environments, including the Web. |
EGNOS | European Geostationary Navigation Overlay Service | a satellite based augmentation system developed by the European Space Agency. |
EGP | Exterior Gateway Protocol | A reachability routing protocol used by gateways in a two-level internet. EGP is used in the Internet core system. |
EH&S | Environmental, Health and Safety |
EH&S compliance systems capture product or process data according to a regulatory authority's standards, forms and procedures for compliance with laws related to occupational health and safety; hazardous materials management and product genealogy/content; and environmental management. |
EHA | Ethernet Hardware Address | MAC address, a unique identifier assigned to network interfaces for communications on the physical network segment. |
EHR | Electronic Health Record | n electronic record of health-related information on an individual that conforms to nationally recognized interoperability standards and that can be created, managed, and consulted by authorized clinicians and staff across more than one health care organization. |
EIA | Electronic Industries Alliance enterprise information architecture |
High-tech association that represents the full spectrum of U.S. electronics and high-tech industry manufacturers. See also http://www.eia.org enterprise information architecture |
EIGRP | Enhanced Interior Gateway Routing Protocol | Cisco proprietary routing protocol loosely based on their original IGRP. EIGRP is an advanced distance-vector routing protocol, with optimizations to minimize both the routing instability incurred after topology changes |
EII | enterprise integration information |
data integration |
EIM | Enterprise Identity Mapping enterprise information management |
an open architecture from IBM for helping an enterprise manage the
multiple user registries and identities that enable a computer user to
access multiple applications with a SSO. an integrative discipline for structuring, describing and governing information assets, regardless of organizational and technological boundaries, to improve operational efficiency, promote transparency and enable business insight. |
EIRP | Effective Isotropic Radiated Power | The effective power radiated from a transmitting antenna when an isotropic radiator is used to determine the gain of the antenna |
EIS | enterprise information system | In System Manager, all the resources that the applications manage and the functions for managing them. The applications that comprise an enterprise's existing system for handling companywide information. |
EIST | Enhanced Intel SpeedStep Technology | an advanced means of enabling very high performance while also meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. |
EJB | Enterprise JavaBeans | A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications |
EKTS | electronic key telephone set | Any key telephone with a built-in microprocessor which allows access to PBX-like features as well as access to multiple CO lines and uses two- to four-pair wiring. |
ELAN | Emulated Local Area Network | A logical network initiated by using the mechanisms defined by LANE (LAN Emulation). This could include ATM and legacy attached end stations. |
ELM | Expertise location and management | the identification of human expertise, determining the status of that resource and integrating that person into the interaction process. |
ELT | extract, load, and transform | The process of extracting data from one or more sources, loading it directly into a relational database, and then using the database engine to run data transformations. |
EMA | Enterprise Management Associates | leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. www.enterprisemanagement.com |
EMC | Electromagnetic Compatibility | capability of systems or equipment to be tested in the intended environment at designed levels of efficiency without degradation due to electromagnetic interactions |
EMF | ElectroMagnetic Field ElectroMotive Force |
These fields are produced by power lines, transformers, appliances and
radio frequency-RF sources such as microwave ovens, cellular phones,
AM/FM/TV transmitters, radars,etc. use to describe anything which behaves like an electrical pump. Batteries, generators, thermoelectric devices, solar cells, and piezoelectric crystals all do the same job in an electrical circuit. |
EMI | Electromagnetic interference Enhanced Multilayer Image |
An alias for this term is 'RFI' or 'RF' or 'induced noise'. In
sensitive and/or badly designed equipment, EMI can cause serious
malfunctions or loss of control. EMC aims to prevent this ever
happening. Cisco's multicast routing implentation permits any host to send a packet but only members of the multicast group to receive it if "EMI" is enabled on the Stack Master. |
EMOTICON | EMOTion ICON | A group of symbols used to indicate emotions in email or newsgroups. |
EMPI | Enterprise Master Patient Index | EMPI is a database that contains a unique identifier for every patient in the enterprise. |
EMR | electronic medical record | A system used to compile computerized patient healthcare information. EMRs generally deal with information only in the form of document images or text formatted for output to a printer or video display. |
EMS | Enhanced Messaging Service enterprise messaging system Expanded Memory Specification |
Messaging comprising simple pictures, sounds, animations, and modified text. enterprise-grade system that enables "program-to-program" messaging between applications and systems throughout an enterprise. a technique for utilizing more than 1MB of main memory in DOS -based computers. The limit of 1MB is built into the DOS operating system. |
EMV | Europay-MasterCard-Visa | An emerging general payment standard for smart cards. |
ENIW | Web-enabled Ethernet Networking Interface | module presents additional remote Web capabilities by providing read/write access via the Internet. |
ENQ | Enquiry | A control character used in the ASCII code set to request identification status. |
ENS | enterprise nervous system | Gartner's term for the intelligent network that provides unifying connectivity among people, application systems and devices in different locations and business units across a virtual enterprise. |
ENTL | Electronic New Hire/Termination/Leave of Absence | electronic document used to set up new staff, termination, or leave. |
ENUM | electronic numbering / Electronic Number Mapping system |
ENUM is an IETF standard
for mapping the public telephone number address space into the DNS.
|
ENX | European Network Exchange | the communications network of the European automotive industry. www.enxo.com |
EOF | end-of-file | On a data medium, a coded character indicating the end of the medium. A code that signals that the last record of a file has been read end-of-file delay |
EOL | End Of Life | It usually refers to the time period of support for a software product after a new revision has been placed into use. From time to time, hardware vendors also use the term to describe a time period of support for a given hardware item. |
EoS / EoSDH | Ethernet over SONET / Ethernet Over SDH | EoS is a set of protocols which allow Ethernet traffic to be carried over synchronous digital hierarchy networks in an efficient and flexible way.Ethernet frames which are to be sent on the SDH link are sent through an "encapsulation" block to create a synchronous stream of data from the asynchronous Ethernet packets.. |
EPABX | Electronic Private Automatic Branch Exchange | refer to PABX |
ePC | electronic product code | a vision for using next-generation technology to supplant the bar code based Universal Product Code (UPC) system for identifying supply chain objects such as vehicle and pallet loads, case loads and individual articles. |
EPG(s) | electronic program guides | two-way television services |
EPIC | Explicitly Parallel Instruction Computing | designed to fully incorporate all of the features of the Itanium series of processors from Intel. The uniquely designed EPIC architecture allows the highest possible performance via new levels of parallelism for enterprise and technical applications. |
EPGs | electronic program guides | two-way television services |
EPL | Ethernet Private Line | A point-to-point service that employs dedicated SONET channels over a shared SONET infrastructure |
EPM | Enterprise Performance Management | Oracle Fusion release |
EPN | Extended Port Network | A remote switching module of a telephone switch. Different vendors use different names. EPN is specific to Avaya and Definity line of PBXs. |
ePO | EPolicy Orchestrator | McAfee tool that delivers real-time information and application integration for network, desktop, and server security |
EPO | emergency power off | A means of turning off power during an emergency, referring usually to a switch. |
EPOC | Electronic Piece of Cheese | A 32-bit operating system designed by Symbian and written in C++. It is used in mobile phones and PDAs, including PDAs manufactured by Psion. |
EPP | Enhanced Parallel Port Enterprise Portal Platform |
An enhanced version of the parallel port specification for PCs. Red Hat's JBoss EPP is the commercial version of the open-source GateIn community portal. |
EPR | Electronic Patient Record EndPoint Reference |
designed to allow fast and easy on-line access to each patient's
records in all areas across the Hopkins continuum of care, thus
enhancing patient care. Combination of Web services elements that define the address for a resource in a SOAP header |
EPS | Encapsulated PostScript Events Per Second |
Adobe file format for graphics and text supported by several graphics drawing applications. metric used in evaluating log management and related tools. It represents the total number of network and security events, accumulated from various network devices, that must be managed per second. |
EPU | Energy Processing Unit | ASUS EPU utilizes innovative technology to digitally monitor and finetune the CPU power supply with improved VR responses in heavy or light loadings. |
ERL | Echo Return Loss | A frequency-weighted measure of return loss over the middle of the voiceband (approximately 560 to 1965 Hz) where talker echo is most annoying. |
ERMS | electronic records management systems | electronic records management systems |
ERP | Enterprise resource planning error recovery procedure |
applications represent the core business applications of most
enterprises. These applications encompass management and administrative
functions, including financial management and HR, as well as components
for managing revenue activities and expenditures and operations. A procedure designed to help isolate and, where possible, to recover from errors in equipment. The procedure is often used in conjunction with programs that record information on machine malfunctions. |
ERR | ERRor | ERRor |
eRX | e-Prescribing | a type of computer technology whereby physicians use handheld or personal computer devices to review drug and formulary coverage and to transmit prescriptions to a printer or to a local pharmacy. |
ES-IS | End System to Intermediate System | The International Organization for Standardization's Open Systems Interconnection (OSI) protocol by which end systems announce themselves to intermediate systems. |
ESA | Enthusiast System Architecture | Nvidia ESA is the industry’s first open-standard PC monitoring and control protocol for real-time communication and control of system thermal, electrical, acoustic and operating characteristics. http://www.nvidia.com/object/nvidia_esa.html |
ESB | enterprise service bus | ESB brings flow-related concepts such as transformation and routing to a Service-Oriented Architecture. |
ESCD | Extended System Configuration Data | Setup data that is stored in a Plug-and-Play-compatible system BIOS. It consists of the system resource requirements of legacy (non-PNP) devices, and the last working configuration of Plug-and-Play-compliant devices. |
ESCON | Enterprise Systems Connection | an IBM fiber optic connection technology that interconnects S/390 mainframe computers, workstations and network-attached storage devices across a single channel and supports half duplex data transfers. |
ESDI | Enhanced Small Device Interface | This was a popular form of hard drive and controller interface before IDE took over the PC market. |
ESE | Extensible Storage Engine | Stores all active directory objects |
ESF | Extended Superframe Format | A T1 framing format that uses the framing bit to provide mainte-nance and diagnostic functions. |
ESG | Enterprise Strategy Group | an integrated, full-service IT analyst and business strategy firm, world-renowned for forward-looking market intelligence, analysis, and consulting services that deliver proven, measurable results. www.enterprisestrategygroup.com |
ESI | Edge Side Include | A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network. |
ESL | electronic shelf labels | programmable wireless electronic device that can be affixed to store shelves/shelf channels |
ESM | Enterprise Security Manager | Symantec scalable security policy compliance and host-based vulnerability assessment tool ArcSight ESM is the market-leading security correlation engine |
ESM | Enterprise Service Management | consists of solutions and related professional services in the IT management areas |
ESN | electronic serial number | Unique identification number embedded in a wireless phone by the manufacturer to prevent fraud. |
ESP | estimated street price Encapsulated Security Payload |
a manufacturer or developer's estimated price for a product in a specific region or market sector. In a VPN, a security protocol that provides data confidentiality and integrity. |
ESPN | Entertainment and Sports Programming Network | ESPN is an American global cable television network focusing on comprehensive sports coverage. http://espn.go.com/ |
ESRB | Entertainment Software Rating Board | a non-profit, independent organization established in 1994 that reviews entertainment software and web sites and assigns standardized ratings based on suitability for children. www.esrb.org |
ESS | employee self-service Extended Service Set |
Once simply defined as employee access to human resources (HR) systems,
for the purpose of reviewing or updating benefits or address
information that had previously been in an HR-staff-controlled domain. a set of one or more interconnected BSSs and integrated local area networks that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs. |
ETA | Embedded Transport Acceleration | Intel ETA is the ability to deliver high-performance server communication |
ETAS | Encrypted Transaction Audit System | This technology, developed by Computer Support Group, is used within many business websites. I-Biz and Ecommerce software are to enable security and special transaction auditing and tracking. |
etc | Essential Text Configuration | In any unix (and variants like linux) system the /etc directory |
ETC | Enhanced Throughput Cellular | Cellular modem protocol by AT&T |
ETN | electronic tandem network | A private telecommunications network in which calls are automatically switched over specific trunks. |
ETL | Extract, Transform and Load | Used to refer to sets of tools or processes for extracting data from a data warehouse, transforming data in a data warehouse or loading data into a data warehouse. |
ETRN | Extended Turn | an extension to the SMTP mail delivery protocol that allows an SMTP server to request from another SMTP server any e-mail messages it has for a specific domain. |
ETSI | European Telecommunications Standardisation Institute | produce the telecommunications standards that will be used throughout Europe and beyond. European Telecommunications Standardisation Institute |
ETTb/ETTh | Ethernet To The Business/Home | Telecommunications carrier service providing Ethernet to a business subscriber (ETTb) or home subscriber (ETTh). |
ETX | end-of-text character | The BSC transmission control character used to end a logical set of records that began with the start-of-text character. |
EUC | Extended UNIX Code | A protocol that can support sets of characters from 1 to 4 bytes in length. EUC is a means of specifying a collection of code pages rather than actually being a code page encoding scheme itself. |
EUEM | end user experience monitoring | end user experience monitoring |
EULA | End-User License Agreement | The standard license agreement delivered with each copy of a Microsoft software product, describing the software rights that pertain to the user of that particular copy |
EUP | Enterprise Unified Process | EUP is a software development methodology that helps companies create software in an structured and organized manner. It is an extension of the Rational Unified Process (RUP), adding two new development phases -- Production and Retirement. |
Eutelsat | European Telecommunications Satellite Organization | A Paris-based European satellite network operator. It offers capacity on 23 satellites for television and radio broadcasting, data networks, Internet services and mobile communications. |
EVA | Enterprise Virtual Array | enterprise storage disk array sold by Hewlett-Packard. |
EVDO | Evolution Data Only/Evolution Data Optimized | Provides fast wireless broadband 3G internet service to your lap via pcmci slot. You can take the internet with you in your car, airport, train, anywhere your service provider supports in order to surf the web at your convenience. |
EWS | Early Warning Status | System that alerts the host system if drive performance approaches unacceptable reliability levels |
EX | exchange |
A room or building equipped so that telephone lines
terminating there may be interconnected as required. The equipment may
include manual or automatic switching equipment. A telephone switching center; an aggregate of traffic-carrying devices, switching stages, controlling and signaling means at a network node that enables subscriber lines and/or other telecommunication circuits to be interconnected as required by individual callers. The territory served by an exchange, within which local service rates apply; also known as the exchange area or local service area. |
EXE | EXEcutable | common filename extension denoting an executable file (a program) in the DOS, OpenVMS, Microsoft Windows, Symbian, and OS/2 operating systems. |
EXIF | EXchangeable Image File format | Standard for storing interchange information in image files, especially those using JPEG compression. Most digital cameras now use the EXIF format. See also http://www.exif.org/ |
E-book readers | a class of devices the primary purpose of which is to enable the reading of "trade books" and other content not dependent on color, rich graphics or video. |
|
eBay | eBay Inc. (NASDAQ: EBAY) is an American internet consumer-to-consumer (c2c) corporation that manages eBay.com, an online auction and shopping website. http://www.ebay.com/ | |
Echelon | an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. Monitored transmissions are said to include up to 3 billion communications daily. | |
Eclipse | Open-source application development tools, www.eclipse.org | |
Electronic paper | several reflective display technologies that do not require a backlight and can be viewed in conditions of moderate to good ambient illumination. | |
embed embedded system |
When adding an element from one document to another document. Example: A
sound file is created in one document, then it is embedded in an
HTML document for publication to the Web. A specialized computer system that is part of a larger system or machine. Typically, an embedded system is housed on a single microprocessor board with the programs stored in ROM. |
|
emulate / emulation | a program or device that has the ability to imitate another. A method by which an imitating system can accept the same data, execute the same computer programs and achieve the same results as the original system. |
|
encapsulation | A software design technique in which data and procedures related to the data are undled together within a single entity, called the object. | |
encrpytion | The process of converting data into an unreadable format so that unauthorized views of the data can be blocked. | |
Erlang | In telecommunications, a unit of traffic intensity. One Erlang is the intensity at which one traffic path would be continuously occupied. | |
ethernet | Baseband LAN specification invented by Xerox Corporation and developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps. more... | |
Ethical Hacker | The dream job for a generation of hackers: A company paying you to break into its network. By simulating attacks from the net or from an internal source, ethical hackers locate weak spots in a company's network. | |
exit plan | The plan developed for coping with the end of the contract -- whether because the term is up or because termination clauses have been invoked. | |
exploit | an attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders. Used as a verb, the term refers to the act of successfully making such an attack. | |
extract | A data synopsis from a given system which is passed to another system to complete processing. | |
Extranet |
A virtual intranet. Companies desiring an intranet but not having the
internal bearer network on which to provide it, can look to an external
service provider to supply it. Two or more autonomous and separately owned intranets, connected together in order to form an extended intranet. For example, a car manufacturer and its suppliers may each have their own Intranets, accessible only to their respective employees. |
|
eyeballs | an industry term for the raw number of people who look at a website. |
F
F for Flash
abbreviation / acronyms | Term | Definition |
---|---|---|
FA | Foreign Agent | Node in a mobile IP network that enables roamed users to register on the foreign network. The FA will communicate with the HA (Home Agent) to enable IP datagrams to be transferred between the home network and the roamed user on the foreign network |
FACCH | Fast Associated Control Channel | the channel derived by preempting information in a traffic channel. It is used to send handoff and similar messages. |
FAN | File Area Network | A File Area Network (FAN) enhances standard network and storage infrastructure. FAN technology provides centralized, heterogeneous, and enterprise-wide network file management and control. |
FAQ | Frequently Asked Questions | Most Internet sites and many ISP areas will have a "FAQ" section to explain what is in the area and how to use its features. While many FAQ areas are true compilations of users' questions, some are attempts at anticipated questions. |
FAR | false acceptance rate | one of the most important specifications in any biometric system, is defined as the percentage of identification instances in which false acceptance occurs. This can be expressed as a probability. |
FARE | Film Automatic Retouching and Enhancement | Canon film scanner technology |
FASS | Fast Access Station Switching | a concept in the WiMAX network, is a method by which an MS can change its access station from frame to frame depending on the station selection mechanism. |
FAST | Federation Against Software Theft File And Settings Transfer |
A European vendor organization concerned with preventing piracy and other forms of unauthorized software usage. The FAST wizard helps you transfer files in windows XP |
FAT | file allocation table | An index for mapping logical files to physical locations on a disk storage device. Each FAT entry is 16- or 32-bits long (depending on whether it is FAT16 or FAT32). |
favicon | favorites icon | A small image or icon used by most recent web browsers (Internet Explorer 5 and above). It can be displayed in a number of different places depending on which browser you're using. |
FAW | Frame Alignment Word | a unique digital word used by codecs to allow them to resynchronize to the framing structure in the event of errors. |
FAX | FACSimile | FACSimile |
FBA | fixed-block architecture | An architecture for a logical device that specifies the format of and access mechanisms for the logical data units on the device. The logical data unit is a block. |
FBD | Fully Buffered DIMM | Fully Buffered DIMM (or FB-DIMM) is a memory technology which can be used to increase reliability, speed and density of memory systems. Conventionally, data lines from the memory controller have to be connected to data lines in every DRAM module. |
FBGA | Fine-pitch Ball Grid Array | FBGA is a chip-scale package option for AMD flash devices. |
FBSS | Fast Base Station Switching | defined in the IEEE 802.16-2005 (mobile WiMAX) network, is a method to allow switching between any type of access stations |
FC / FCS | Fibre Channel (Standard) | The Fibre Channel Standard (FCS) [1] defines a high-speed data transfer interface that can be used to connect together workstations, mainframes, supercomputers, storage devices and displays. |
FC-AL | Fibre Channel Arbitrated Loop | A ring-style network topology comprising 125 nodes, usually configured as a double loop to protect the system against device failure. |
FCC | Federal Communications Commission | the agency of the U.S. government that regulates all equipment that produces radio-frequency signals, including computers. http://www.fcc.gov |
FCCH | Frequency Correction Channel | the logical channel in GSM systems used to transmit a frequency correction data burst of all "zeros". The resulting frequency shift seen by the mobile is then used for frequency correction. |
FCD | Floating car data or floating cellular data | a method to determine the traffic speed on the road network. |
FCH | Frame Control Header | a field in the IEEE802.16-2004 WIMAX protocol. The FCH specifies the burst profile and the length of one or more DL bursts that immediately follow the FCH. |
FCIP | Fibre Channel over Internet Protocol | FCIP mechanisms enable the transmission of Fibre Channel (FC) information by tunneling data between SAN facilities over IP networks; this capacity facilitates data sharing over a geographically distributed enterprise |
FCL | Framework Class Library | A collection of classes which are part of Microsoft's .NET platform |
FCoE | Fibre Channel over Ethernet | FCoE is a proposed standard designed to enable Fibre Channel communications to run directly over Ethernet. Thus, FCoE makes it possible to move Fibre Channel traffic across existing high-speed Ethernet infrastructures and extend the reach and capability of storage area networks (SANs). This ability allows organizations to protect and extend existing investments in their storage networks. |
FCP | Fibre Channel Protocol | he serial SCSI command protocol used on Fibre Channel networks. |
FCPGA | Flip Chip Pin Grid Array | the package of certain Intel Celeron, Pentium III, and Pentium 4 microprocessors. FC-PGA processors fit into Socket 370 or Socket 478 motherboard sockets. |
FCS | Fluorescence Correlation Spectroscopy Frame Check Sequence |
a single-molecule detection technique for high-sensitivity measurement
of molecular interactions. Unique features of FCS measurements make it
ideal for use in assaying techniques. Any mathematical formula that derives numeric value based on bit pattern of transmitted block of information and uses that value at receiving end to determine existence of any transmission errors. |
FCSI | Fibre Channel Systems Initiative | formed by Hewlett-Packard, IBM, and Sun in 1993. |
FDD | Frequency Division Duplex | used in cellular communication systems such as GSM, is a radio technology using a paired spectrum. |
FDDI | Fiber Distributed Data Interface | A standard for transmitting data on optical fiber cables at a rate of around 100,000,000 bits-per-second (10 times as fast as 10-BaseTEthernet, about twice as fast as T-3). |
FDE | Full-disk encryption | FDE is encryption at the hardware level. FDE works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to “undo” the conversion. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. |
FDM | Feature Download Management Frequency Division Multiplexing fused deposition modeling |
An ADSI protocol that enables a number of alternative key and screen
overlays to be stored in an ADSI telephone and to be selected by
predetermined events at the telephone. Method by which the available transmission frequency range is divided into narrower bands; each of these bands is used for a separate channel. This allows several signals to be sent over the same transmission medium. HP Designjet 3D printers employ Stratasys' patented FDM technology |
FDS | Fraud Detection System | VeriSign's product, acquired by Symantec in the middle of 2010 |
FDX | Full Duplex | Simultaneous two-way communication path. |
FE | Fast Ethernet field engineer |
An extension of the IEEE's 802.3 standard — IEEE 802.3u — supporting
100-Mbps data rates instead of 10 Mbps, and using 100Base-T or
100Base-F families of cabling standards An engineer who works on-site (i.e., "in the field"). |
FEC | Fast Etherchannel | A proprietary technology developed by Cisco that creates a team of two to four 10/100 Ethernet adapters or ports to increase transmission and reception throughput. |
FEC | Forward Error Correction | Sending redundant data so that if data loss occurs, data recovery is possible without retransmission |
FECN | Forward Explicit Congestion Notification | A bit sent by a frame relay network to notify an interface device (DTE) that congestion avoidance procedures should be initiated by the receiving device |
FEFO | First Ended, First Out | A message ordering in which, among messages of the same priority level, the messages which are finished first will be transmitted first. |
FEMA | Failure mode and effects analysis | provide an analytical approach, when dealing with potential failure modes and their associated causes. |
FEP | Front-End Processor | telephony and computer term. A FEP communications computer associated with a host computer that manages the lines and routing of data through the network. |
FER | Frame Erasure/Error Rate | a measure of the number of frames of data that contained errors and could not be processed. FER is usually expressed as a percentage or exponent. |
FERPA | Family Educational Rights and Privacy Act | federal legislation in the US that protects the privacy of students' PII. The act applies to all educational institutions that receive federal funds. |
FET | field effect transistor | A transistor in which the current between a source terminal and a drain terminal is controlled by a variable electric field. |
FEXT | Far End Cross Talk | This is a term used in network cable troubleshooting. It is a displayed symptom of electrons traveling the network and bouncing around there for lack of anywhere else to go. |
FFD | Flicker Free Display | A computer screen that has a fast enough refresh rate that no flicker can be detected; this kind of display is easier on the eyes. |
FFPF | fairly fast packet filter | an alternative platform for network monitoring under Linux. It is a stream-based networking subsystem for Linux that spans from hardware to userspace to offer high-speed communication paths to all applications. |
FFT | Fast Fourier Transform | an efficient algorithm to compute the discrete Fourier transform (DFT) and its inverse. FFTs are of great importance to a wide variety of applications, from digital signal processing to solving partial differential equations to algorithms for quickly multiplying large integers. |
FGA/B/C/D | feature group A/B/C/D | The different types and qualities of public switched network connection between local telephone companies and long distance companies. |
FHS | Fan Heat-Sink | Fan Heat-Sink, see also HSF. |
FHSS | Frequency Hopped Spread Spectrum | a spread-spectrum method of transmitting signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is used in WLAN 802.11 physical layer. |
FICON | Fiber Connection | IBM's fiber optic channel technology that extends the capabilities of its previous fiber optic channel standard, ESCON. |
FIDNET | Federal Intrusion Detection Network | extensive computer monitoring system, developed by the Federal Bureau of Investigation (FBI), to protect U.S. government and private data networks from being attacked by terrorists or hostile foreign governments. |
FIFO | first in, first out | A network queuing method, wherein data packets are dealt with in a simple queue on a first-come, first-served basis. No packets are given preferential treatment; all are queued in the order in which they are received. |
FIGS | Figures Shift | A control character used in the Baudot Code to enable the printing of symbols and numbers by actually allowing a physical shift of the carriage. |
FIM | federated identity management | an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group. The use of such a system is sometimes called identity federation. |
FINDDEST | Find Destination | An internal service in IMS used for finding certain IMS resources, most of which represent IMS destinations. For searches other than CVBs and CCBs, if the block is not found, then if requested, a search for an LU 6.2 descriptor is made. |
FINRA | Financial Industry Regulatory Authority | an association that regulates its members through the adoption and enforcement of rules and regulations governing business conduct of member firms. www.finra.org |
FiOS | Fiber Optic Service |
FiOS is a data communications service
provided by Verizon that uses fiber optic cables to transfer data. FiOS
is called a "Fiber to the Premises," or FTTP service, since it brings
fiber optic data transmission to residential homes as well as
businesses.
|
FIPS | Federal Information Processing Standards | Standards that are publicly recognized by the U.S. Federal Government; also for use by non-government agencies and contractors. |
FIR | Finite Impulse Response | a technique used to characterize electrical circuits and networks in the time domain. |
FIRST | Forum of Incident Response and Security Teams | A nonprofit volunteer group whose goal is to foster cooperation and coordination in incident prevention across diverse sectors, and prompt rapid reaction to incidents. Through an annual conference and its Web site at www.first.org |
FISMA | Federal Information Security Management Act | defines a comprehensive framework to protect government information, operations, and assets against natural or humanmade threats. FISMA was signed into law part of the Electronic Government Act of 2002. |
FIX | Financial Information Exchange | A messaging standard for the electronic exchange of securities transactions. FIX is a public-domain specification owned and maintained by FIX Protocol, Ltd. |
FLAC | Free Lossless Audio Codec | a popular free audio compression codec that is lossless. Unlike lossy codecs such as MP3 and AAC, it does not remove any information from the audio stream and is suitable both for everyday playback and for archiving audio collections. http://flac.sourceforge.net/ |
FLAG | Fiber Link Around the Globe | An undersea fiber-optic cable network connecting Europe to the Asia/Pacific region. It became operational in 1997. |
FLOGI | fabric login | The process by which a device gains access to the fabric. |
FLOPS | Floating Point Operations Per Second | A slightly more meaningful measure of processor speed than MIPS. Computers essentially work with integer numbers. Decimal values are harder to process, particularly if the figures after the decimal point are not fixed. |
FM | Frequency Modulation | A process by which, say, music is transmitted using a radio signal. Input audio-frequency signals modify the frequency of the transmitted signal around its nominal value. |
FM-200 | Firemaster / Fire Master 200 | Fire Master (FM-200) is gas-based fire suppression systems |
FMA99 | Financial Services Modernization Act of 1999 | Signed into U.S. law in November 1999, this legislation — also known as the "Gramm-Leach-Bliley Act," after the senators who sponsored it — allowed many financial institutions to engage in a broader spectrum of activities. |
FMC | fixed-mobile convergence |
FMC is the trend towards seamless
connectivity between fixed and wireless telecommunications networks. The
term also describes any physical network that allows cellular telephone
sets to function smoothly with the fixed network infrastructure.
|
FMEA | Failure Mode and Effects Analysis | analytical methods used to identify potential weaknesses. FMEA is mainly employed in the design and development of new products and processes. |
FMH | function management header | One or more headers, optionally present in the leading request units (RUs) of an RU chain In SNA, a record that contains control information for the data that follows. |
FMV | Full-Motion Video | Video that runs at the same rate at which it was filmed. Moving video images and sound available on a computer; usually stored on CD-ROM because of the large size of the files. |
FOC | Field Oriented Control | Field Oriented Control |
FoIP | Fax Over Internet Protocol | enables the transmission of fax messages over a VoIP line. In this technology, every digital message is distributed into various packets and then relayed through the Internet. |
FOIRL | FiberOptic InterRepeater Link | Fiberoptic communication signaling methodology based loosely on the IEEE 802.3 fiberoptic specification and 10Base-F guideline. FOIRL is a forerunner of the 10Base-FL specification, which is designed to enhance and replace it. |
FOMA | Freedom of Mobile Multimedia Access | the brand name for the 3G services being offered by Japanese mobile phone operator NTT DoCoMo. FOMA was the world's first W-CDMA 3G service when launched in 2001. |
FOP | Formatting Objects Processor | an XSL-FO processor written in Java, which provides the feature to convert XSL-FO files to PDF or direct-printable-files. |
FORTRAN | formula translation | the oldest computer language in the world. It is typically compiled and is quite fast. Its primary drawbacks are portability and ease-of-use -- often different FORTRAN compilers on different platforms behave quite differently in spite of standardization efforts in 1966 (FORTRAN 66 or FORTRAN IV), 1978 (FORTRAN 77), and 1991 (FORTRAN 90). |
FOSS | Free and open source software | software developed by informal collaborative networks of programmers. The source code is licensed free of charge, encouraging modifications and improvements. |
FOSSIL | Fido Opus Seadog Standard Interface Layer | Fido Opus Seadog Standard Interface Layer |
FOT | Fiber Optic Terminal | Connects optical fiber to copper wire. |
FOTS | Fiber Optic Transmission System | Fiber Optic Transmission System |
FPA | Floating Point Accelerator | Special hardware for performing mathematical calculations with floating point numbers; the FPA may function as a coprocessor to the central processing unit. |
FPP | Full Product Package | Full Product Package. |
FPS | frames per second | A video transmission metric. |
FPA | Function point analysis | a method used to gauge the size and complexity of computer software, employing a function point as a unit of measure. Function points are a unit measure for software size, much like an hour is to measure time. |
FPE | Forefront Protection for Exchange | a e-mail security software solution that runs on Exchange |
FPGA | Field Programmable Gate Array | A microchip that can be made with thousands of programmable logic gates. FPGAs are often used for prototype or custom designs, including DSP and logic emulation. |
FPM | Fast Page Mode | A kind of DRAM memory. Fast page mode improved upon the original page mode memory by eliminating the column address setup time during the page cycle. |
FpML | Financial Products Markup Language | A programming language — based on XML — introduced by J.P. Morgan and PricewaterhouseCoopers in June 1999. |
FPS | Flexible Payments Service | Amazon's payment services |
FPU | floating point unit | a part of a CPU specially designed to carry out operations on floating point numbers. Not all CPUs have a dedicated FPU. |
FQDN | Fully Qualified Domain Name | The official name assigned to an individual computer. |
FR | frame relay | A network technology that transmits data packets at high speeds across a digital network encapsulated in a transmission unit called a frame. It requires a dedicated connection during the transmission period. It is used on wide area networks and also in private network environments with leased lines over T1 lines. |
FRAD | Frame Relay Access Device | A combination of hardware and software that is used to convert communications packets from formats like TCP, SNA, IPX, and others into frames that can then be sent over a frame relay network. |
FRAG (21) | Financial Reporting & Auditing Group Guidelines | Financial Reporting & Auditing Group Guidelines |
FRDS | Failure Resistant Data Systems | term from the RAID advisory board which describes server systems which are designed to protect against data loss due to any single component failure within the system and against loss of data to single disk failure. |
FRED | Fair Random Early Detection | A variation of Random Early Detection (RED) |
FreeBSD | Free Berkeley Software Distribution | a Unix-like free operating system descended from AT&T UNIX via the BSD branch through the 386BSD and 4.4BSD operating systems. It runs on processors compatible with the Intel x86 family, as well as on many other processors such as AMD64 and PowerPC processors. |
freeware | free software | several kinds of computer software that can legally be copied and given free of charge to other users |
FRR | fast retransmit and recovery | congestion control algorithm that makes it possible to quickly recover lost data packets. |
FRS | File Replication Service | A service on Windows Servers (2000 and later) that is responsible for replicating policies and scripts to clients. |
FRU | field-replaceable unit | An assembly that is replaced in its entirety when any one of its components fails. |
FSAA | Full Screen Anti-Aliasing | A method used by 3D graphics cards to provide anti-aliasing to all objects in a 3D environment. This acts to smooth out the jagged appearance of edges on some 3Dobjects. |
FSAM | Federated Storage Area Management | HP naturally scalable environment of pooled, federated (i.e., available when needed), modular, multivendor storage resources |
FSB | frontside bus | The FSB connects the computer's processor to the system memory (RAM) and other components on the motherboard. These components include the system chipset, AGP card, PCI devices, and other peripherals. |
FSM | finite state machine | a model of behavior composed of states, transitions and actions. A state stores information about the past, i.e. it reflects the input changes from the system start to the present moment. |
FSML | Financial Services Markup Language | A language developed by the Financial Services Technology Consortium to control the identification and processing of electronic checks. |
FSMO | Flexible Single Master Operations | a feature of Microsoft's AD. The schema master FSMO role holder is the domain controller responsible for performing updates to the directory schema. |
FSN | Full-Service Network | A video network that makes it possible for the television to work like a computer, through the use of special equipment; users have access to video, home shopping, interactive games, and other services. |
FSS | File system server | The StorNext File System term for the computer that manages metadata in a SAN. In Xsan, this is called a metadata controller. |
FSSS | Fast Serving Station Switching | refers to the serving station switching with which a Moble Station (MS) can change its serving station from frame to frame depending on the serving station selection mechanism. |
FSPF | fibre channel shortest path first | A routing protocol used by fibre-channel switches. |
FSTC | Financial Services Technology Consortium | A nonprofit organization whose membership includes banks, government agencies, universities, and high-tech businesses; FSTC is interested in developing e-commerce and making it practical. www.fstc.org |
FTA | failure to acquire | a biometrics term that is used to describe a biometric system's failure to extract usable identification data from a biometric sample. |
FTAM | File Transfer Access and Management | The International Organization for Standardization's OSI remote file service and protocol |
FTDS | Failure Tolerant Data Systems | term from the RAID advisory board which describes server systems which must offer continuous data availability in the event of any single system component failure. |
FTNS | Fixed Telecommunication Network Services | FTNS are telecommunications services provided between fixed points. |
FTP | File Transfer Protocol |
A TCP/IP standard used to log onto a network, list directories and
copy files. FTP authenticates users and allows them to transfer files,
list directories, delete and rename files on a remote host, and perform
wild-card transfers. In LAN technology for user authentication, file transfer, list directories of the foreign host, etc. |
FTTB | Fiber to the building |
This technology involves bringing fiber
all the way to the building. Inside the building,
signals would be carried over the existing copper wire or
coaxial cable, or over optical fiber.
|
FTTN | Fiber to the neighborhood |
This technology involves bringing fiber
into the neighborhood. From there, signals would be
carried to businesses and residences via the existing
copper wiring.
|
FR | Frame Relay |
A technology for transmitting data
packets in high-speed bursts across a digital network encapsulated in a
transmission unit called a frame. Frame relay requires a dedicated
connection during the transmission period.
|
FTAM | File Transfer, Access, and Management | an application layer protocol for file transfer and remote manipulation (ISO 8571). |
FTBFS | Fails To Build From Source | Fails To Build From Source in computer programming |
FTL | Flash Translation Laye | new software layer that redirects each update to an empty block which is already erased and copies other valid data to a new location. |
FTP | File Transfer Protocol |
The usual way you send files to your
server (or receive some). Using FTP, you can also update (delete,
rename, move, and copy) files at a server. People who create Web home
pages use FTP to get their files to the server where they will be
accessed.
|
FUD | Fear, Uncertainty, and Doubt | A set of sales tactics employed by market leaders to cast aspersion on competing computer products. |
FUSC | Fully Used SubChannel | also known as Fully Used SubCarrier, is a method used in the WiMAX network that uses all the subchannels and employs full-channel diversity by distributing the allocated subcarriers to subchannels using a permutation mechanism. |
FW | Firewall | A boundary that helps keep computers on the Internet private. Firewall software helps prevent users from coming to a secure site, or conversely, keeps users inside the firewall from going out. Firewalls can also verify websites, helping to ensure they originate from an authorized source. |
FWA | Fixed wireless access | also known as wireless local loop, is a wireless system in which office or home users directly connect with the switching center of the telecommunications carrier or the inter-exchange channel to use the system. |
FX | foreign exchange |
Account settlements or transfers of credit or currency across national
borders, a process that typically relies heavily on computer
technology. A telecommunications connection between a customer's location and a remote exchange. see also FXO, FXS |
FXO | Foreign Exchange Office | An FXO interface connects to the PSTN central office and is the interface offered on a standard telephone. Cisco's FXO interface is an RJ-11 connector that allows an analog connection at the PSTN's central office or to a station interface on a PBX. |
FXP | File eXchange Protocol Foreign Exchange Protocol fxp |
allows you to copy files from one FTP server to another FTP server (two remote hosts) using an FXP client. a simple, automatic way of retrieving currency exchange rates over the Internet. file extension for the compiled source code for FoxPro |
FXS | Foreign Exchange Station | An FXS interface connects directly to a standard telephone and supplies ring, voltage, and dial tone. Cisco's FXS interface is an RJ-11 connector that allows connections to basic telephone service equipment, keysets, and PBXs. |
face recognition | A biometric technique that uses the geometry of a person's face to authenticate identity. Limited deployments, such as those for check cashing, are in place. | |
failover | Failover is a backup operational mode in which the functions of a system component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. | |
FastIP | An IP switching protocol developed by 3Com. Fast IP differs from other IP switching in that the end user initiates the process, not a router or switch. | |
Fault-tolerance | Ability of a system or component to continue normal operation despite equipment failures, power outages or other catastrophic events. | |
Federation | A technical approach where one security domain has a system to authenticate users and another security domain has a system that trusts the authenticating system | |
female connector | A cable connector that has holes and plugs into a port or interface to connect one device to another. | |
fetch | The process of 'fetching' a data or instruction item from memory and writing it to a register. The 'fetched' item is then either executed (instruction), or acted upon (data). | |
fiber optics | A technology that transmits infrared and visible light frequencies through strands of glass or plastic fiber. | |
File extension | .gif .txt .doc .log etc. are all examples of file extensions. These are the letters after the period in a file name that indicates the type of file. | |
FileZilla | FileZilla is free, open source, cross-platform FTP software, consisting of FileZilla Client and FileZilla Server. Binaries are available for Windows, Linux, and Mac OS X. It supports FTP, SFTP, and FTPS (FTP over SSL/TLS). http://filezilla-project.org/ | |
Finger |
A program that you point at the username of someone on a networked
system. It uncovers that person's full name, most recent log-in time,
and other information. It's also used as a verb, meaning to apply the
program to the user name. A Unix command that provides information about users logged in; and it can also be used to retrieve the .plan and .project files from a user's home directory. A gesture by a programmer to another person that has ripped off his code without even recognition. |
|
Fire Fighting | Desperately working to fix bugs to avoid being fired. | |
firewire | technology that allows a computer to have an almost unlimited number of devices running without using up all the hardware interrupts. the registered trademark of Apple's IEEE 1394 digital connection. | |
Firmware | A computer program or software stored permanently in PROM or ROM or semi-permanently in EPROM. Software stored in PROM, ROM or EPROM; essential programs that remain even when the system is electrically turned off. Firmware is considerably easier to modify than hardware but more permanent than software stored on disk or volatile memory. |
|
five 9s | The five 9s of accuracy: 99.999% accuracy | |
flash | Flash memory (FLEXIBLE ARCHITECTURE for SHARED MEMORY): This type of non-volatile memory has the ability to retain its information even when there is no power source. FLASH is erased (or bulk erased) electrically erasable programmable read-only memory (EEPROM). FLASH has the electrically erasable benefits of EEPROM but the small, economical cell size of EPROM technology A bandwidth friendly and browser independent vector-graphic animation technology. As long as different browsers are equipped with the necessary plug-ins, Flash animations will look the same. As of late 2005, Macromedia is now owned by Adobe |
|
flatrate | pricing plan for Telco | |
flooding | An attack that attempts to cause a failure in (especially, in the security of) a computer system or other data processing entity by providing more input than the entity can process properly. | |
footer | A formatting style designated in HTML by a specific tag and used at the end of an HTML file. | |
forest | A collection of one or more domain trees with a common schema and implicit trust relationships between them. | |
fork |
A stream of data that can be opened and accessed individually under a
common filename. The Mac OS Standard and Extended file systems store a
separate data fork and resource fork as part of every file. In BSD, fork is a system call that creates a new process. |
|
frame | A packet of data including start and end of frame delimiters. An HTML feature that allows web designers to segment the window of a web browser into distinct sections. |
|
Frixo | UK road travel reporting website, that provides our users with the most up-to-date road traffic information. Our data is updated every 5 minutes using sensors placed on motorways and common A / B roads. www.frixo.com | |
fuzzy logic | a formal system of reasoning developed by Lotfi Zadeh in which the values “true” and “false” are replaced by numbers on a scale from 0 to 1. |
G
G for gateway
abbreviation / acronyms | Term | Definition |
---|---|---|
G | giga | Prefix for 10 power 9 (or, in IT parlance, 2 power 30) |
G2C | Government to Citizen | Lagan's underlying platform for the Government CRM solution for contact centers and citizen self-service |
GAIA | GUI Application Interoperability Architecture | GAIA is acronym of GUI Application Interoperability Architecture |
GAMS | General Algebraic Modeling System | high-level modeling system for mathematical programming problems. The program itself consists of a language compiler and a group of integrated solvers. |
GAP | Groups, Algorithms and Programming | A System for Computational Discrete Algebra, with particular emphasis on Computational Group Theory. http://www.gap-system.org/ |
GAPE | Google Apps Premier Edition | Google's web-based messaging and collaboration apps require no hardware or software and need minimal administration, creating tremendous time and cost savings for businesses. http://www.google.com/apps/intl/en/business/details.html |
GARP | Generic Address Resolution Protocol | An IEEE standard for a generic method by which various devices (e.g., clients, servers, and bridges) can automatically disseminate attribute information across a bridged LAN. GARP is a Layer 2 (i.e. Data Link Layer) protocol used extensively in VLANs. |
Gas | GNU Assembler | the default GNU Compiler Collection (GCC) back-end and is used to compile Linux and other operating systems such as the GNU operating system. It is a part of the GNU Binutils package. It runs and assembles on and for a number of different architectures. |
gb | Giga bit | 1,024 megabits or 1 billion information bits. |
GB | Gigabyte | Approximately 1 billion bytes of data (actually 1,073,741,824 bytes) |
GBIC | GigaBit Interface Converter | A transceiver that converts between electrical and optical signals for high-speed networking |
GBP | group buffer pool | A coupling facility cache structure that is used by a data sharing group to cache data and to ensure that the data is consistent for all members. |
Gbps | gigabits per second | A measure of data transmission speed |
GCC | GNU Compiler Collection | the free compiler that made the free Linux operating system possible. The GCC C/C++ language tools support the cross-compiler requirements for a number of target processors families and their variants. |
GCD | Grand Central Dispatch | a technology for executing asynchronous tasks concurrently. GCD is available in Mac OS X v10.6 and later and is not available in iPhone OS. |
GCGID | graphic character global identifier | A 4- to 8-character alphanumeric identifier assigned to a registered graphic character. Each graphic character that is to be assigned a code point must have a GCGID. |
GCI | General Communication Inc. | a telecommunications corporation operating in Alaska http://www.gci.com/ |
GD&T | geometric dimensioning and tolerancing | a symbolic language used on engineering drawings and computer generated three-dimensional solid models (CAD) for explicitly describing nominal geometry and its allowable variation. |
GDB | GNU debugger | GNU debugger |
GDI | Graphics Device Interface | GDI provides a common set of drawing routines (including both text and graphics). The GDI can be used to draw to most devices, such as screens, printers, plotters or bitmap images. Central to the GDI is the concept of a Device Context (DC) which is a handle to the specific device to be written to. |
GDM | global delivery model |
the model of applications testing services |
GDP | Gateway Discovery Protocol | Gateway Discovery Protocol |
GDPS | Geographically Dispersed Parallel Sysplex | An application that integrates Parallel Sysplex technology and remote copy technology to enhance application availability and improve disaster recovery. |
GDS | Global data synchronization | consists of technology and applications used to receive, approve and manage product, price, forecast, promotion and contract data from suppliers via the GDSN, in support of standards from the Global Commerce Initiative. |
GDSN | Global Data Synchronization Network | Global Data Synchronization Network |
GDTs | Global data types | The enterprise service interface is defined based on standard data types, and GDTs are the basic data building blocks. |
GEAR | Gigabyte Enhanced Agp Riser | Used to provide AGP support for PCI-E motherboards |
GEDCOM | GEnealogical Data COMmunication | A common file format used to exchange computerized genealogical data between different genealogy programs. |
GEMMS | Global Enterprise Manufacturing Management System | A process manufacturing product once offered by Datalogix (which was acquired by Oracle in 1997). |
GEnie | General Electric Network for Information Exchange | An online service from GE Information Services, with news, sports, business, computer technical support, games, software downloads, reference services, chat, bulletin boards, email, and fax. |
GEO / GEOS | Geo-Stationary Earth Orbit System | A system that communicates with satellites in geosynchronous orbit some 22,300 miles above the earth. |
GEOS | graphic environment operating system | a lightweight OS with a GUI. It runs on several different processors, including the 65xx, the x86 and numerous different PDAs, embedded devices, and hand-held machines. |
GERAN | GSM(GPRS)/EDGE Radio Access Network | the 3GPP standards for GSM(GPRS)/EDGE radio access, which has been specified to connect the A, Gb and Iu interfaces to the CN (Core Network). The architecture allows two BSS (Base Station Subsystem) to be connected to each other. |
gfortran | GNU Fortran compiler | GNU Fortran compiler is part of the GNU compiler collection. http://gcc.gnu.org/fortran/ |
GFP | Generic Framing Procedure | a multiplexing technique defined by ITU-T G.7041. This allows mapping of variable length, higher-layer client signals over a transport network like SDH/SONET. |
GFS | Grandfather, Father, Son | Backup methodology |
GGP | Gateway-gateway protocol | protocol on the Internet. |
GGSN | Gateway GPRS Support Node | a gateway from a cellular network to an IP network that allows mobile cell phone users to access the public data network (PDN) or specified private IP networks. |
GHC | Glasgow Haskell Compiler | also known as Glorious Haskell Compiler, is an open source native code compiler for the functional programming language Haskell which was developed at the University of Glasgow. |
Ghost | General Hardware-Oriented Software Transfer | a disk cloning program, originally produced by Binary Research, but purchased by Symantec in 1998. |
GIAC | Global Information Assurance Certification | Certification programs designed to serve the people who are or will be responsible for managing and protecting important information systems and networks. See also http://www.giac.org/ |
GiB / gib | gibibyte | 1,073,741, 824 bytes. 1024 mebibytes. |
GID | group identification number | A 4 byte, unsigned integer (GID) that is used to identify a group profile. |
GIF | Graphic Interchange Format | A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG. |
GIFT | GNU Image Finding Tool | a Content Based Image Retrieval System (CBIRS). The GIFT is based on Viper, the result of a research effort at the Vision Group at the computer science center of the University of Geneva. The GIFT is an open framework for content-based image retrieval. It is designed to accommodate new ways of querying the framework. |
GIGO | Garbage In, Garbage Out. |
It means that if invalid data is entered
in a computer program, the resulting output will also be invalid. So
if a program asked you to enter a letter of the alphabet and you
decided to be funny and enter "3.14159", there's a good chance the
results you would get back would be pretty messed up, or "garbage."
Because we computer users aren't always smart enough to enter valid
data, programmers have to take extensive mesaures to prevent GIGO
errors.
|
GIMP | Gnu Image Manipulation Program | Freely distributed piece of software suitable for such tasks as photo retouching, image composition and image authoring. See www.gimp.org |
GINA | Graphical Identification and Authentication | the subsystem that handles the logon presentation to the user. The Microsoft GINA is represented by the logon screen that pops up on the PC when the user presses Ctrl+Alt+Delete. |
GINI | Gateway Interface for Network Initialization | A process on large Enterprise systems to set up an entire network from another network. |
GIOP | General Inter-ORB Protocol | A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages. |
GIS | Geographical Information System |
A computer application involving maps and the storage and manipulation of data associated with them.
|
GIX | Global Internet eXchange | A routing exchange point that helps networks all over the world to connect to the Internet. |
GKTMP | Gatekeeper Transaction Message Protocol | A proprietary Cisco protocol used for communication between the Cisco IOS Gatekeeper and external applications. |
GLA | Generic Log Adapter | A tool that allows generic data collection from multiple heterogeneous data sources by converting individual records and events into the Common Base Event format. |
GLB / GLBA | Gramm-Leach-Bliley (Act) | covers the financial services industry, basically defining financial institutions as depository institutions and their holding companies, security firms and broker/dealers. |
GLONASS | Global Navigational Satellite System | A satellite-based geographic-location system run by the Russian government. |
GLPK | GNU Linear Programming Kit | a software package intended for solving large-scale linear programming (LP), mixed integer programming (MIP), and other related problems. |
GLUT | openGL Utility Toolkit | a window system independent toolkit for writing OpenGL programs. It implements a simple windowing API for OpenGL |
GMA | Gmail Drive | A free shell namespace extension ("add-on") for Microsoft Windows Explorer, makes it possible to create a new network share on the workstation. In order to use this add-on, you need a Gmail account from Google Gmail. |
GMM | GPRS Mobility Management | a GPRS signaling protocol that handles mobility issues such as roaming, authentication, and selection of encryption algorithms. |
GMR | Giant Magneto Resistance | A technology for a read/write head which uses thin film layers to get a greater change in resistance, and is more sensitive than MR (Magneto Resistance). |
GMRP | Garp Multicast Registration Protocol | It allows a device to declare membership of a Layer 2 multicast group |
GMRS | General Mobile Radio Service | GMRS has been transformed from the now antiquated Class A section of the Citizens Radio Service to the personal radio service available for conducting an individual's personal and family communications. |
GMS | generalized main scheduling General MIDI Standard Global Messaging Service Google Message Security |
A set of algorithms that allow the system programmer to tailor job
scheduling and selection to the specific needs of the installation. A standard designation of specific instruments to specific MIDI patch locations, so that a composition produced on one system will sound the same when played on another Novell service. Google services that protect your email from spam and viruses and set email policies to stay compliant. www.google.com/postini/ |
GMSK | Gaussian Minimum Shift Keying | a modulation technique involving Gaussian filtering of the input data prior to its application to the phase modulator. |
GMX | Global Mail eXchange, in Germany: Global Message eXchange | GMX Mail is a German-based free webmail service provided by GMX.http://www.gmx.com/ |
GNAT | GNU NYU Ada Translator | the GNU Ada Compiler based on GNU Compiler Collection (GCC). The front-end and runtime are written in Ada, and are licensed using the General Public License. |
GNN | Global Network Navigator | A collection of free services on the Internet, including The Whole Internet Catalog, the Internet Help Desk, and NetNews. |
GNOME | GNU Network Object Model Environment | the most popular graphical desktop environment for Linux, based on the X WINDOW SYSTEM and similar in look and feel to Windows 95 and 2000 |
GNSO | Generic Names Supporting Organization | ICANN Supporting Organization responsible for developing policy for the DNS gnso.icann.org |
GNU | GNU's not Unix | An ongoing project by the Free Software Foundation to create a free, freely distributable, set of UNIX like utilities.
Relevant links: |
GOCA | Graphic Object Content Architecture | An architecture that provides a collection of graphics values and control structures used to interchange and present graphics data. |
GOLC | Growth Opportunity License Charge | An IBM software pricing program. |
GOMS | Goals, Operators, Methods, and Selection rules | a kind of specialized human information processor model for human computer interaction observation. |
GOPS | Giga (billion) Operations Per Second | A unit of measurement of computing speed. |
GOS | Grade of Service | a measure of the success a subscriber is expected to have in accessing a network to complete a call. |
GOSIP | Government OSI Profile | A standard issued by the National Institute of Standards and Technology. GOSIP specifies the details of an interoperable OSI configuration for networking products procured by the U.S. government. |
GOW | Gears of War God of War | Gears of War is a military science fiction third-person shooter video game developed by Epic Games and published by Microsoft Game Studios. http://www.gearsofwar.com/ God of War is an action adventure video game for the PlayStation 2 first released by Sony Computer Entertainment's Santa Monica division in March 2005. http://www.godofwar.com/ |
GPF | General Protection Fault | an error that arises in Microsoft Windows when a program tries to access a location in memory that is not allocated to it. GPFs are usually caused by programming errors such as uninitialized pointers. |
GPL | General Public License | Normally taken to the mean the GNU GPL. A license statement from GNU, used on most of their software and on many free software packages from other sources. www.gnu.org/copyleft/gpl.html - Full text of the GNU General Public License. |
GPIO | general-purpose I/O | Customizable input/output pins on a microcontroller. |
GPO | Group Policy Object | In the Windows 2000 operating system, a GPO is a collection of settings that define what a system will look like and how it will behave for a defined group of users. Microsoft provides a program snap-in that allows you to use the Group Policy MMC. |
GPRS | general packet radio service | GPRS is a packet-oriented overlay to GSM networks supporting connection- and connectionless-oriented services and diverse quality-of-service mechanisms. The theoretical maximum speed is 171.2 Kbps, but real-life user throughput is expected to be 56 Kbps or less. |
GPS | Global Positioning System GNAT Programming Studio |
a satellite navigation system used to determine ground position and
velocity (location, speed, and direction). Though it was created and
originally used by the U.S. military, GPS is now available to the
general public all over the world. a free multi-language IDE for GNU/Linux, MS Windows and Solaris/Sparc. GPS uses GTK+ as graphical user interface. |
GPSL | General Purpose Scripting Language | General Purpose Scripting Language |
GPSS | General Purpose Simulation System | A powerful general purpose simulator which provides a wide range of capacities for discrete system modeling. |
GPU | Graphics Processing Unit | Like the CPU (Central Processing Unit), it is a single-chip processor. However, the GPU is used primarily for computing 3D functions. |
GPWW | group practice without walls | An umbrella organization for a group of independent physician practices that performs certain business operations, such as technology procurement. |
GRC | governance, risk and compliance | GRC reflects a new way in which organizations can adopt an integrated approach to these three areas. |
GRCM | GRC management | the management, measurement and reporting of IT controls, and the distribution and attestation of policies, compliance reporting and risk assessment. |
GRC.SQ | Governance, Risk Management, Compliance, Security, and Data Quality | used often by Data Governance and Data Quality programs to acknowledge the interdependencies of these five disciplines in managing data. |
GRE | generic routing encapsulation | Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. |
grep | global-regular-expression-print | a UNIX utility that allows the user to search one or more files for a specific string of text and outputs all the lines that contain the string. |
GROW | GNU Remote Operations Web | An architecture for building networked applications and services using WWW. |
GRT | Granular Recovery Technology | a single-pass backup while maintaining full DR and individual email, folder or mailbox restores |
GSAM | generalized sequential access method | A database access method that allows batch application programs to access a sequential data set record that is defined as a database record. |
GSC | Gecko System Connect | a bus used in many of the HP 9000 workstations and servers. The GSC bus was 32-bit and reached 40MHz in its final iterations. |
GSI | Gigascale Integration | Gigascale integration is a long-term goal of making chips with billions of components on them. |
GSK | Global Security Kit | A toolkit for managing digital certificates used in implementing Secure Sockets Layer (SSL) security. |
GSM | Global System for Mobile communication |
Acronym for the digital cellular radio
system based on pan-European specifications. Originally stood for
Groupe Speciale Mobile, now Global System for Mobile communication.
|
GSO | global sign-on | A flexible single sign-on solution that enables the user to provide alternative user names and passwords to the back-end Web application server. |
GSR | Gigabit Switch Router | A family of router products from Cisco Systems. |
GTL | Gunning Transceiver Logic | A low-power standard for electrical signals used in CMOS circuits which allows for low electromagnetic interference at high speeds of transfer. |
GTM | global trade management Global Traffic Manager |
the processes and technologies used to support the unique logistical,
regulatory, and fnancial aspects of the import and export
processes. F5 product to perform geography-based datacenter traffic management |
GTP | GPRS Tunneling Protocol | protocol used by the GPRS backbone network for packet switching. GTP is a protocol defined on both the Gn and Gp interfaces between GSNs in a GPRS network. |
GTS | Generic Traffic Shaping | A mechanism to control the traffic flow on a particular interface. |
GTT | Global Title Translation | GTT is a process that allows dialed digits to be translated into a network node address and an application address. The process is performed in the SS7 network by the STP. |
GUA | graphical user authentication | A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a GUI. |
GUI | Graphical User Interface |
Pronounced goo-ee. A pictorial 'front end' program to
simplify the operation of computers like the IBM PC and the Apple
Macintosh. Documents are stored in pictures ('icons') of drawers or
filing cabinets (which represent files or directories in disk drives).
|
GUID | Globally Unique Identifier | a 128-bit number used by Microsoft WINDOWS to identify a user, software component, or other entity. GUIDs are most often written as groups of hexadecimal digits in braces. |
GUTBN | Globally Unique Time Based Number | applies to a "code" that is unique in all the world. Globally unique time based numbers are globally unique identifiers (GUID) that you can create by yourself and that are registered for you. |
GVN | Global value numbering | compiler optimization based on the SSA intermediate representation. It sometimes helps eliminate redundant code that common subexpression evaluation (CSE) does not. |
GVPN | Global Virtual Network Service | Global Virtual Network Service is a multi-network international service proposed by the ITU. GVNS allows service providers to offer subscribing customers a service with features and functionality similar to that of a private network without requiring the customers to purchase and manage the networks. |
GVRP | Generic VLAN Resolution Protocol | a GARP application that provides registration services in a VLAN context. |
GVU | Graphic, Visualization, and Usability | Graphic, Visualization, and Usability |
GWEN | Ground Wave Emergency Network | communications system that the US military constructs. It operates in a very-low-frequency range, with transmissions between 150 and 175 kHz. |
GWT | Google Web Toolkit | Open source Java software development framework that makes writing AJAX applications like Google Maps and Gmail easy for developers who don't speak browser quirks as a second language |
GXA | Global XML Web Services Architecture | an announcement by Microsoft in 2002 of several proposals for extensions to SOAP. Some of the components of GXA were developed into standards in combination with other companies, including IBM. |
GXS | Global eXchange Services |
delivers global B2B e-commerce integration solutions www.gxs.com |
gzip | GNU zip | a GNU free software file compression program. It was created by Jean-loup Gailly and Mark Adler. gzip is based on the DEFLATE algorithm, which is a combination of LZ77 and Huffman coding. |
G.7xx | A series of ITU standards for voice and data communications. e.g. G.703: Specifications for plesiochronous digital hierarchy | |
gain | Gain refers to the ratio of the output amplitude of a signal to the input amplitude of a signal. This ratio typically is expressed in dBs. | |
gateway | A hardware or software set-up that translates between two dissimilar protocols A link from one computer system to a different computer system. |
|
Gesture Recognition | involves determining the movement of a user's fingers, hands, arms, head or body in three dimensions through the use of a camera; or via a device with embedded sensors that may be worn, held or body-mounted. | |
Ghost site | a Web site that remains live but is no longer updated or maintained or only done so very infrequently. | |
Go Daddy | Go Daddy is an Internet domain registrar and Web hosting company that also sells e-business related software and services. http://www.godaddy.com/ | |
googling | searching through the Google search engine | |
Googol | 1 googol = 10 raised to the power 100. The number was named in 1983 by Milton Sirotta after his uncle (the mathematician Edward Kasner) asked him to think up a name for the number. The search engine Google is rumoured to be named as a play on the word Googol. | |
green IT | Technology assets, services, and operational best practices that allow organizations to reduce harmful environmental impacts while at the same time achieving their financial and risk imperatives within and outside of IT. | |
Grid computing | applying the resources of many computers in a network to a single problem at the same time - usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. | |
groupware |
|
H
H for http
abbreviation / acronyms | Term | Definition |
---|---|---|
h-menu | Hierarchical menu | A pull-down menu that has sub-menus. The sub-menus are indicated by arrows. Putting the pointer on the item that has an arrow opens up the sub-menu. |
H/S LAN | High-Speed Local-Area Network | A LAN operating at 4 Mbits per second or more to facilitate rapid exchange of files, mail, etc., within a broader departmental or divisional environment. |
H&H | Hoot & Holler | A dedicated point-to-point voice facility between international offices of a trading facility. |
H3C | (previous) Huawei Technologies—3Com | HP company, supplier of routers, Ethernet switches, wireless LAN, security and Voice/Video over IP and network management systems www.h3c.com |
HA | high availability |
Pertaining to a clustered system that is reconfigured when node or
daemon failures occur, so that workloads can be redistributed to the
remaining nodes in the cluster. The ability of IT services to withstand all outages and continue providing processing capability according to some predefined service level. |
HAAT | Height Above Average Terrain | a measure of an antenna's height above average terrain. This value is used by the FCC in determining compliance with height limitations and transmitting powers for high sites. |
HACMP | High-Availability Cluster Multi-Processing | Software that provides host clustering, so that jobs are moved to other hosts within the cluster if one host fails. |
Hactivism | from "hack" and "activism" | the concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message. |
HAD | Holographic Autostereoscopic Display | Simple conversion of LCD technology, replacing the LCD's backlight with an HOE (holographic optical element) |
HADR | high availability disaster recovery | A disaster recovery solution that uses log shipping and provides data to a standby system if a partial or complete site failure occurs on a primary system. |
HAE | Height Above Ellipsoid | Vertical difference between a reference ellipsoid model and the known, or derived, elevation at a given spatial location (typically in meters). |
HAL | Hardware Abstraction Layer | A translation protocol in Windows NT for porting NT to another platform. |
HAN | home area network | a network contained within a user's home that connects a person's digital devices, from multiple computers and their peripheral devices to telephones, VCRs, televisions, video games, home security systems, "smart" appliances, fax machines |
HARC | Hitachi Asynchronous Remote Copy | A remote copy function for HDS storage products. HARC allows movement of large amounts of data over any distance with full data integrity and minimal impact on performance. |
HARQ | Hybrid Automatic Repeat reQuest | a sheme wherein information blocks are encoded for partial error correction at receiver and additional, uncorrected errors are retransmitted. |
HASP | Houston Automatic Spooling Program | A mainframe spooling program that provides task management, job management, and data management functions. |
HAT | Heap Analysis Tool | Tool for tracking down heap problems in Java programs |
HAVi | Home Audio Video interoperability | a vendor-neutral audio-video standard aimed specifically at the home entertainment environment. |
HBA | host bus adapter | An adapter used to connects a host computer to a storage network. |
HCI | Host Controller Interface Human-Computer Interaction |
BlueTooth technology The study of how humans interact with computers, used to design computers which are easy for humans to use. |
HCL | Hardware Compatibility List | A list of computers and peripherals that have been tested by Microsoft to work with Windows NT or Windows 2000. |
HCM | human capital management | Social software covers a range of functionality, from wikis and blogs to social networks and social bookmarking. |
HCO | High-Capacity Optical | HCO drives use blue-laser technology and standard 120-millimeter CD/DVD-size discs for as much as six times the capacity of traditional 5.25-inch magneto-optical (MO) technology. |
HCR | Huffman Codeword Reordering | MPEG-4 Audio Error Resilience (ER) technique that avoids error propagation within spectral data |
HCT | hardware compatibility tests | A suite of tests from WHQL to verify hardware and device driver operations under a specific operating environment. These tests exercise the combination of a device, a software driver, and an operating system under controlled conditions. |
HD / HDD | Hard Disk Drive | permanent storage medium used on computers. A HDD consists of a number of rigid discs that store all of the computer programs and data on the computer, even when the power to the computer is switched off. |
HD DVD | high-density DVD | a high-density optical disc similar to, but not compatible with, BLU-RAY DISC, formerly marketed by Toshiba but discontinued in 2008. |
HDA | Head Disk Assembly | The mechanical parts of a disk drive, including the read/write heads, platters, and other non-electronic components. |
HDCP | High-bandwidth Digital Content Protection | a specified method from Intel for protecting copyrighted digital entertainment content that uses the DVI by encrypting its transmission between the video source and the digital display (receiver). |
HDLC | High Level Data Link Control | An ITU-TSS link layer protocol standard for point-to-point and multi-point communications. |
HDMI | High-Definition Multimedia Interface | HDMI is a digital interface whose purpose is to permit the transmission of audio and video signals through a single cable, while supporting faster data rates than its normal counterparts. http://www.hdmi.org/ |
HDML | Handheld Device Markup Language | Specifications allow Internet access from wireless devices such as handheld personal computers and smart phones. |
HDR | header label | A set of information on a diskette or tape that describes the contents of the diskette or tape. The label or data set label that precedes the data records on a unit of recording medium. |
HDR | host-discovered resource | A set of storage hardware resources that are attached to a host system and are available on the operating system. |
HDS | Hitachi Data Systems | A vendor of enterprise and modular storage systems and software. HDS is a wholly owned subsidiary of Tokyo-based electronics firm Hitachi, Ltd. |
HDSL | High bit-rate Digital Subscriber Line | Provides repeaterless digital transmission at 2Mbit/s for about 12000 feet (4km) over twisted pair. |
HDTP | Handheld Device Transport Protocol | It presents the HDML to the HDML interpreter in an appropriate format. Developed by HTTP://WWW.PHONE.COM for use in wireless applications. |
HDTV | High Definition television |
High Definition television means broadcast of television
signals with a higher resolution than traditional formats allow. It's a
step change in television technology which provides far clearer and
more detailed pictures than normal "standard definition" TV.
|
HDx / HD | Half duplex | A device can either receive or send data at a given time. |
HE-AAC | High Efficiency Advanced Audio Coding |
Lossy data compression scheme for streaming audio. It combines three techniques: AAC, Spectral Band Replication (SBR), and Parametric Stereo (PS) |
HEC | Header Error Control | Using fifth octet in ATM cell header, ATM equipment may check for error and correct contents of header. Check character is calculated using CRC algorithm allowing single bit error in header to be corrected or multiple errors to be detected. |
HEL | Hardware Emulation Layer | This provides software-based emulation of features that are not directly available in hardware. |
HEP | horizontal enterprise portal | A portal that serves a broad population of users across an enterprise — unlike a VEP, which serves only a specific segment of this population |
HERF | high energy radio frequency | A HERF gun is used to disrupt digital equipment such as computers by blasting them with HERF emissions. |
HFC | Hybrid Fiber Coax | second generation cable TV infrastructure. HFC networks combine both optical-fiber and coaxial cable lines. Optical fiber runs from the cable head end to neighborhoods of 500 to 2,000 subscribers. |
HFS | Hierarchical File System |
HFS is the file system used for
organizing files on a Macintosh hard disk. When a hard disk is
formatted for a Macintosh computer, the hierarchical file system is
used to create a directory that can expand as new files and folders are
added to the disk.
|
HFS+ | Hierarchical File System Plus | The Mac OS Extended file-system format. This format was introduced as part of Mac OS 8.1, adding support for filenames longer than 31 characters, Unicode representation of file and directory names, and efficient operation on very large disks. |
HGFS | Host-Guest File System | VMware's name for the guest-visible aspect of a Shared Folder. |
HGML | Hypertext General Markup Language | A formatting code for marking up text files, which makes up part of SGML. |
HHO | Hard Hand Off | used in CDMA systems, describes a hand-off involving a frequency change. |
HHT | Hand-Held Terminal | Hand-held programming terminal to communicate with a programmable logic controller (PLC) on the fly |
HID | High-Intensity Discharge Human Interface Device |
Light bulb technology used mainly in projectors The HID profile defines the protocols, procedures and features to be used by Bluetooth HID such as keyboards, pointing devices, gaming devices and remote monitoring devices. |
HIDAM | hierarchical indexed direct access method | A database access method used for indexed access to records in a hierarchic direct organization. It provides indexed access to the root segments and pointer access to subordinate segments. |
HIDS | Host based Intrusion Detection System | A system for detecting unauthorised access to a single computer. A HIDS may monitor logs or activity on network ports, or use other techniques to detect possible intrusions |
HiFD | HIgh-capacity Floppy Disk | Sony term. |
HighMAT | High-performance Media Access Technology | a set of standards co-developed by Microsoft and Matsushita (Panasonic) for CDs and DVDs that are created on personal computers but played back on consumer electronic devices such as CD players and DVD-equipped television sets. |
HIL | Hardware-in-the-Loop | applications used by design and test engineers to evaluate and validate vehicle components during development of new systems |
HIMEM | HIgh MEMory | A DOS and Windows extended memory manager. |
HIP | Host Identity Protocol | host identification technology for use on IP networks, such as the Internet. |
HIPAA | Health Insurance Portability and Accountability Act | An act passed by the U.S. congress in August 1996. HIPAA's directives call for the use of EDI in healthcare transactions, and for protecting the privacy of patient healthcare information. |
HiPerLinks | High-Performance Links | A high-speed coupling-link technology introduced by IBM in 1997 for its S/390 mainframes. |
Hiperspace | High-Performance Space | Introduced with ESA/370, a hiperspace is, in essence, an address space occupied only by data and to which access is controlled by hardware via special instructions. |
HIPPI | HIgh Performance Parallel Interface | A high-speed communications bus used with supercomputers or high-speed LANs. |
HIS | healthcare information system | A system or application used to manage hospital or other healthcare-related operations (such as financial, registration, scheduling and back-office functions); also called a "hospital information system." |
HISAM | hierarchical indexed sequential access method | A database access method used for indexed access to records in a hierarchic sequential organization. |
HITECH | Health Information for Economic and Clinical Health | Act collectively refers to the health information technology provisions included at Title XIII of Division A and Title IV of Division B of the ARRA. |
HIToolbox | Human Interface Toolbox | A collection of procedural APIs that apply an object-oriented model to windows, controls, and menus for Carbon applications. |
HKCC | HKey_Current_Config | Windows NT Registry key |
HKLM | HKey_Local_Machine | Windows NT Registry key |
HL7 | Health Level 7 | HL7 is a standard interface for exchanging and translating data between computer systems. HL7 is also a not-for-profit organization accredited by the American National Standards Institutes (ANSI) that develops standards for data transfer. http://www.hl7.org/ |
HLA | High Level Architecture | a general purpose architecture for distributed computer simulation systems. Using HLA, computer simulations can communicate to other computer simulations regardless of the computing platforms. |
HLLAPI | High Level Language Application Programming Interface | used with IBM mainframes to allow PC's to communicate with the mainframe using an emulator. |
HLR | Home Location Register | a database residing in a local wireless network that checks the identity of a local subscriber. HLR contains information about subscribers to a mobile network and registers subscribers for a particular service provider. |
HMA | High Memory Area | Method to access the first 64kB segment above the 1MB boundary in DOS/Windows 16-bits |
HMD | Head Mounted Display | A helmet with stereoscopic goggles for the wearer's eyes, and stereo headphones over the ears; used as an interface through which the wearer can experience a virtual reality environment. |
HMP | Hybrid Multiprocessing | refers to a kind of multitasking which provides some elements of symmetric multiprocessing, using add-on IBM software called MP/2. IBM OS/2 supports HMP. |
Honeynet | A network of honeypots. | A network of honeypots. |
HOSED | Hardware Or Software Error Detected | General error not yet diagnosed. |
HP | Hewlett-Packard HoneyPot |
A manufacturer of workstations,
electronic instrumentation and
test equipment etc. Founded in 1939 by Stanford
University graduates, William R. Hewlett and David Packard, HP is the
original garage start-up. www.hp.com An Internet-attached server that acts as a decoy, luring in potential hackers in order to study their activities and monitor how they are able to break into a system |
HPA | High Performance Addressing | A kind of display used on some multimedia notebook computers, that delivers high-quality graphics comparable to Active Matrix (TFT) Displays. |
HPB | High Ping Bastard | Network multiplayer games attribute |
HPC | High Performance Computing | HPC is a generic and relative term since the desktop computers of today are capable of the same performance as supercomputers from a few years back. |
HPF | High Pass Filter | a telephony term. A signal filter which would be installed in a customer premises ADSL modem (ATU-R), which only allow higher frequency data to be delivered to the modem. |
HPFS | High Performance File System | The file system for IBM OS/2. |
HPGL | Hewlett-Packard Graphics Language | HP Language to describe vector graphics (usually for plotters) |
HPIB | Hewlett Packard Interface Bus | Is a version of GPIB (also known as IEEE.488) and was used on Hewlett Packard (Now Aligent Technologies) lab equipment. Early versions used a different connector |
HPNA | Home Phoneline Networking Alliance | An alliance to advance technologies for high-speed local-area networking over conventional phone wires. It was founded in 1998 by 3Com, AMD, AT&T Wireless Services, Compaq, Conexant Systems, HP, IBM, Intel, Lucent and Tut Systems. |
HR | horizontal rule | tag used in HTML to indicate a horizontal rule. |
HR/DSSS | High Rate/Direct Sequence Spread Spectrum Physical Layer | the enhanced physical layer defined by IEEE 802.11b which supports data transfer at up to 11Mbps. |
HRAA | High Resolution Anti Aliasing | Technology found in the nVidia GeForce3 Chip |
HRC | Hitachi Remote Copy | A controller-based remote-copy capability used in Hitachi Data Systems storage products. |
HRMS | human resource management system | Business applications for the management of human resource (HR) transactions, best practices and enterprise reporting. Functions typically include core HR tracking, payroll and benefits. |
HRPD | High Rate Packet Data | also known as TIA/EIA IS-856 or 1xEV-DO, is a packet data protocol in the 3G mobile communicaitons network based on CDMA2000. |
HPR | High-Performance Routing | IBM's technology to enable users to send SNA traffic over frame and cell-based networks, making for more efficient communications. |
HSB / HSV | Hue, Saturation, Brightness (or Value) | HSV is a way of defining a colour based on a colour wheel. Hue measures the angle around the colour wheel. The saturation indicates the radius on the colour wheel so indicates the proportion between dark to pure colour to white. Value indicates the brightness. |
HSCSD | High Speed Circuit Switched Data | a circuit-linked technology for higher transmission speeds -- up to 57 kilobits per second -- primarily in GSM systems. |
HSD | High Speed Data | Interface normally using V.35 or EIA53 standards. |
HSDPA | High-Speed Downlink Packet Access | also called 3.5G, a packet-based data service in W-CDMA downlink with data transmission up to 8-10 Mbit/s (and 20 Mbit/s for MIMO systems) over a 5MHz bandwidth in WCDMA downlink. |
HSF | Heat Sink Fan High Sierra Format |
This is a combination of a fan blowing air across the fins of a heatsink, usually on a high horsepower microprocessor. A logical format and file structure for CD-ROMs that paved the way for ISO 9660. As the industry began to evolve many different proprietary CD-ROM formats, the need for a common standard became obvious. |
HSIL | Host Side Igmp Library | Cisco term |
HSM | Hardware Security Module Hierarchical storage management |
Generate and/or store secrets for use in crytography, commonly used in card payment systems The automated migration of data objects among storage devices, usually based on inactivity. By accepting lower access performance (higher access times), one can store objects less expensively. |
HSO | Hot Spot Operator | A company that sets up and operates commercial hot spots in cafes, airports, hotels, train stations, convention centers and office buildings. An HSO typically installs one or more access points and an access control device along with a high speed Internet connection to the location. |
HSR | Horizontal Scan Rate | The number of scan lines displayed per second on a computer monitor, expressed in kHz. |
HSRP | Hot Standby Router Protocol | Provides high network availability and transparent network topology changes. HSRP creates a Hot Standby router group with a lead router that services all packets sent to the Hot Standby address. The lead router is monitored by other routers in the group, and if it fails, one of these standby routers inherits the lead position and the Hot Standby group address. |
HSS | Home Subscriber Service | a key component in the IP Multimedia Subsystem (IMS), refers to a system including the master user database and software that supports IMS network entities that handle calls and sessions. |
HSSDC | High Speed Serial Direct Connect | A type of connector used on Fibre Channel optical cables. |
HSSI | High Speed Serial Interface | Standard for a serial interface at high speeds (64 Kbps and higher up to 52 Mbps) between DTE and DCE equipment over very short distances. Used for a physical connection between a router and a DSU. |
HSUPA | High-Speed Uplink Packet Access | part of the specifications for 3GPP Release 6. It improves upstream data bit rates on 3G systems and complements High-Speed Downlink Packet Access (HSDPA), theoretically up to a maximum 5.8 Mbps uplink data rate at the cell level. |
HT | Hyper-Threading HyperTransport |
Intel technology with which a single processor can function as two virtual processors and execute two threads simultaneously. AMD Technology is a high-speed, low latency, point-to-point link designed to increase the communication speed between integrated circuits in computers, servers and embedded systems up to 48 times faster |
HTC | formerly High Tech Computer Corporation | a Taiwan-based manufacturer of smartphones http://www.htc.com/ |
HTML or HTM | HyperText Markup Language |
The coding language used to create Hypertext documents
for use on the world wide web. HTML looks a lot like old-fashioned
typesetting code, where you surround a block of text with codes that
indicate how it should appear. Additionally, in HTML you can specify
that a block of text, or a word, is linked to another file on the
Internet.
|
HTML5 | HyperText Markup Language 5 | a whole set of new elements that make it much easier to structure pages, which commenced in 2004, is currently being carried out in a joint effort between the W3C HTML WG and the WHATWG. |
HTT | Hyper-Threading Technology | Implementation of simultaneous multithreading on Intel Pentium 4, Mobile Pentium 4, and Xeon processors |
HTTP | HyperText Transport Protocol |
The protocol for moving hypertext files across the
internet. Requires a HTTP client program on one end, and an HTTP server
program on the other end. HTTP is the most important protocol used in
the world wide web (WWW).
|
HTTPS | Secured HTTP or HTTP Secure | An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet. |
HTTPS | HTTP over SSL | A Web protocol for secure transactions that encrypts and decrypts user page requests and pages returned by the Web server. |
HUD | Head Up Display | A display that is usually projected to a position where the user only has to look up to see. |
HURSE | Hasp Unit Record SErvice | IBM term. To get a punch or print of your cards |
HWS | high watermark setup | A method to allocate a minimum number of unique device types that fulfill the requirements for each job step. Devices used in one step can be released and used again in later steps. |
HXRC | Hitachi Extended Remote Copy | A remote-copy function for Hitachi Data Systems storage products. HXRC uses an asynchronous copy approach to deliver high data integrity with minimal disruption and performance impact to the primary system. |
Hz | hertz | A unit of frequency equal to one cycle per second. |
H.x | A series of computing standards from the ITU. e.g. H.323: a standard in 1996 to promote compatibility in videoconference transmissions over IP networks. | |
Hack / hacker | Term used to describe the unauthorised access of a computer as a means to
gain information that the hacker is not entitled to or to access services and
facilities for malicious purposes. Originally used to describe a computer enthusiast who pushed a system to its highest performance through clever programming. More commonly it is becoming synonymous with 'cracker' which is used to describe people who break into secured computer systems. An expert programmer who likes to spend a lot of time figuring out the finer details of computer systems or networks, as opposed to those who learn only the minimum necessary. |
|
Handshake | Exchange of predetermined signals between two devices establishing a connection. | |
hard-coded | Referring to instructions that are written directly into a program and therefore cannot be easily modified, rather than instructions that can be modified by a user. | |
Hardening | Hardening is the process of identifying and fixing vulnerabilities on a system. | |
Haptic | Haptic is the science and physiology of the sense of touch. more... | |
hash | A scrambled, or encrypted, form of a password or other text. | |
header | A formatting style designated in HTML by a specific tag and used to set titles and subtitles apart from plain text. | |
heat sink | A metal plate on some processors that helps dissipate heat. | |
Heuristics | Heuristics means 'rule based'. Normally, for an Anti-Virus product to detect a virus, the virus must have been seen before, analyzed and detection added to the signature update files. | |
hex dump | a hexadecimal view of computer data, from RAM or from a file or storage device. | |
hi5 | hi5 is a social networking website based in San Francisco, California. http://hi5.com/ | |
hit | As used in reference to the world wide web, hit means a single request from a web browser for a single item from a web server | |
honeypot | a trap for people who tamper with computers maliciously through the Internet, just as a pot of honey traps flies. | |
host | Any computer on a network that is a repository for services available to other computers on the network. The ISP's computer complex. The host process members' requests and keeps track of members' online experience. |
|
hot potato routing | A form of routing in which the nodes of a network have no buffer to store packets in before they are moved on to their final predetermined destination. | |
Hot Swap | A hot swap is the replacement of a hard drive, CD-ROM drive, power supply, or other device with a similar device while the computer system using it remains in operation. The replacement can be because of a device failure or, for storage devices, to substitute other data. | |
Hotmail | Windows Live Hotmail, formerly known as MSN Hotmail and commonly referred to simply as Hotmail, is a free web-based email service operated by Microsoft. http://www.hotmail.com/ | |
hotspot | A wireless Internet connection available for public use. Beyond mere convenience, hotspots offer broadband Internet access with connection speeds similar to cable and DSL. While some hotspots charge for access, more and more are opening their networks for free. | |
hourglass | In computing, especially by means of the Windows operating system, an icon that replaces the pointer when the computer is performing a function and cannot receive new input. | |
hub | Generally, a term used to describe a device that serves as the center of a star-topology network. | |
Human Augmentation | sometimes referred to as "Human 2.0", creating cognitive and physical improvements as an integral part of the human body. | |
hunting | Automatic routing of calls to an idle circuit in a prearranged group when the circuit called is busy. The movement of a call as it progresses through a group of lines. |
|
Hybrid network | A hybrid network is one that doesn't just rely on a singly type of bearer or leased line. | |
Hype Cycle | A Gartner model designed to help clients make intelligent decisions about when to implement emerging technologies. | |
Hypertext | Generally, any text that contains links to other documents - words or phrases in the document that can be chosen by a reader and which cause another document to be retrieved and displayed. | |
hypervisor | a form of control software layer that enables multiple operating systems to run on the same physical hardware. The oldest hypervisor is IBM's VM — but this only runs on S/370-style hardware (where it hosted MVS, VSE, and other operating systems). |
I
I for IP address
abbreviation / acronyms | Term | Definition |
---|---|---|
I²C | Inter-Integrated Circuit | a multi-master serial computer bus invented by Philips that is used to attach low-speed peripherals to a motherboard, embedded system, or cellphone. The name is pronounced eye-squared-see or eye-two-see. |
I/O | Input/Output | Input/Output |
I2 | Internet2 | next-generation Internet refers to consortium and government efforts to define a next-generation high-speed Internet with strong educational tools. |
I2C | Inter-Integrated Circuit | 2-wire bus developed by Philips Semiconductors in the early 1980's for efficient inter-IC communications. |
IA-32/64 | Intel Architecture - 32/64 | acronym used in the names of Intel processor architectures. IA-32: Intel proprietary CISC architecture IA-64 :based on Explicitly Parallel Instruction Computing and certainly designed as the foundation for Intel's line of microprocessors through 2005. |
IaaS | integration as a service | integration as a service |
IAB | Internet Architecture Board (previous Internet Activities Board) | The group that administrates the development of the Internet suite of protocols TCP/IP. The IAB has two investigative task forces, the IRTF and the IETF. http://www.iab.org/ |
IAD | integrated access device | A network device that collects multiple types of traffic (such as voice, data or video) at an enterprise site for transmission over a service provider's network. |
IAM | Identity and Access Management | IAM is an authoritative association of people with identifiers such as ID numbers and ID cards, access credentials such as usernames/passwords and authorization to access data and services. Identity and access management is fundamental for providing access to university services. |
iAMT | Intel Active Management Technology | Hardware-based technology for remotely managing and securing PCs out-of-band |
IANA | Internet Assigned Numbers Authority | they manage IP address space, root nameservers and domain names among other things. They're being replaced by ICANN. http://www.iana.org/ |
IAP | Internet Access Provider | a company that provides access to the Internet. IAPs generally provide dial-up access through a modem and PPP connection, though companies that offer Internet access with other devices |
IAS | Internet Authentication Service | a RADIUS Server which performs connection authentication and accounting for remote access. |
IAT | Inside Air Temperature | This is used in the electronics industry to mean the ambient air temperature of the air mass within the unit in discussion. |
IB | Interface Bus | IB stands for Interface Bus |
IBM | International Business Machines | Known informally as "Big Blue," IBM is one of the largest, most well-known corporations that designs and manufactures computer systems, software, networking systems, storage devices, and microelectronics. www.ibm.com |
IBG | interblock gap | The space between records on a storage medium. An area or space on a data medium (tape or diskette) to indicate the end of a physical record or block. |
IBO | industry business unit | SAP's Public Services Solution Management |
IBR | intelligent browser referencing | Web acceleration function |
IBS | Internet Banking System Group |
IBS is term for Internet Banking System |
IBSG | Internet Business Solutions Group |
Cisco IBSG, company's global consultancy, helps CXOs from the world's largest public and private-sector organizations solve their most pressing challenges. |
IBT | IntelliLight Broadband Transport Internet Based Training |
A SONET-based point-to-point service providing high bandwidth interfaces over shared SONET infrastructure facilities. Evolution of the computer based training, which offers real-time learning over the Internet with a teacher. |
IC | Integrated Circuit I see |
Many transistors and other circuit elements
“integrated” on a single silicon chip Shorthand slang, IC, meaning "I see". |
ICA | Independent Computing Architecture International Compliance Association |
A proprietary protocol for an application server system, designed by
Citrix Systems. The protocol lays down a specification for passing data
between server and clients, but is not bound to any one platform. International Compliance Association www.int-comp.org |
ICANN | Internet Corporation For Assigned Names and Numbers |
The ICANN is an non-profit corporation
that is responsible for allocating IP address and managing the domain
name system. Every computer connected to the Internet, from servers to
home PCs, has an IP address. http://www.icann.org/
|
ICC | Internet Commerce Corporation | Provides business-to-business electronic commerce services like Internet EDI, EDI fax, web commerce, infosafe document management and subsidiary services. www.icc.net |
ICCs | integration competency centers | SOA COEs, ICCs rely on metadata repositories and service registries to help them manage the ever-changing SOA and integration scenarios. |
ICDL | International Computer Driving Licence | The ICDL Foundation works to promote an International certification of industry-standard computing skills. See http://www.ecdl.com |
ICE | in-circuit emulator information and content exchange Interactive Connectivity Establishment |
ICE is a debugging tool that takes the place of (emulates) the processor on the target board. ICE, an XML-based standard protocol for electronic business-to-business (B2B) asset management. ICE is a network protocol |
ICF | Internet Connection Firewall |
ICF is a Windows XP feature that
protects computers connected to the Internet from unauthorized access.
When ICF is enabled, Windows keeps a log of incoming requests from
other systems on the Internet. If the request is something the user has
requested, like a Web page, the transmission will not be affected.
|
ICI | Information-centric infrastructure Interexchange Carrier Interface |
a technology framework that enables
information producers and information consumers to organize, share and exchange any content, anytime, anywhere. The interface between carrier networks that support SMDS (Switched Multimegabit Data Service). |
ICM | incentive compensation management | applications automate functions for calculating and reporting on commissions and associated variable compensation methods for sales channels |
ICMP | Internet Control Message Protocol |
When information is transferred over the Internet, computer systems send and receive data using the TCP/IP
protocol. If there is a problem with the connection, error and status
messages regarding the connection are sent using ICMP, which is part of
the Internet protocol.
|
ICMS | incentive compensation management system | A system that provide the sales manager with decision support tools to model various compensation scenarios, measure the impact of those plans on sales performance and effectively communicate incentive compensation objectives |
ICP | Internet Content Provider | ICP license is a permit issued by the Chinese Ministry of Industry and Information Technology to permit China-based websites to operate in China. The ICP license numbers for Chinese websites can often be found on the bottom of the front webpage. |
ICPP | Intel Channel Partner Program | a program that provides benefits and support to registered members selling Intel products, or solutions based on Intel products. The ICPP provides its members with resources and support to help build, promote, sell, and service Intel technologies. |
ICQ | I Seek You | Instant messenger program |
ICRA | Internet Content Rating Association | an organization that promotes voluntary labeling of the content of web pages so that filter software can prevent access to objectionable sites. See www.icra.org. |
ICS | Incremental Change Synchronization Internet Connection Sharing |
A mechanism to monitor, export, and import changed items (both
hierarchy and content) between a database and an information store or
between two information stores Abbreviation used by Microsoft to refer to the internet connection sharing facility built into more recent versions of Windows. Allows multiple computers to share a single internet connection which is provided by one computer in a group. |
ICSA | International Computer Security Association | International Computer Security Association |
ICSI | Institute for Clinical Systems Improvement | ICSI is a non-profit organization that brings together diverse groups to transform the health care system so that it delivers patient-centered and value-driven care. http://www.icsi.org/ |
ICT | information and communication technology | A categorical term sometimes used (particularly in Europe) to refer the combined fields of computing and communications. More commonly, "information technology" (IT) is used in this sense, since the latter term, by definition, includes both types of technology. |
ICU | International Components for Unicode | an Open Source set of C/C++ and Java libraries for Unicode and software internationalization support. For information, see http://www.icu-project.org/ |
ID | identifier |
A sequence of bits or characters that identifies a user, program,
device, or system to another user, program, device, or system. In the C language, a sequence of letters, digits, and underscores used to identify a data object or function. In COBOL, a data name that is unique or is made unique by the correct combination of qualifiers, subscripts, or indexes. The name of an item in a program written in the Java language. One or more characters used to identify or name a data element and possibly to indicate certain properties of that data element. |
IDA | (Verizon) Internet Dedicated Access | Verizon's IDA offers permanently open, high bandwidth, dedicated connections to a global Internet backbone network via access circuits |
IDARS | integrated document archive and retrieval system | IDARS is a consolidated system for
storing, accessing, managing, distributing and viewing fixed content, which includes print-stream-originated reports, images and other fixed content. |
IDC | Internet data center | A data center containing Internet-related facilities for the use of enterprises, Internet service providers, ASPs, e-commerce companies and other firms. IDSs typically provide server outsourcing, hosting and colocation services, Internet connectivity, VPNs, and other network and transport services. |
IDD | international direct dial / dialing | The placement of international calls by dialing them directly, rather than using operator assistance. |
IDE | Integrated Development Environment integrated drive electronics |
A development environment that is integrated into an application. A standard computer interface for storage devices, such as internal hard disk drives. A later version, enhanced IDE (EIDE), supports more capacity and peripherals. |
IDEA | International Data Encryption Algorithm | Patented, symmetric block cipher that uses a 128-bit key and operates on 64-bit blocks. |
I-DEAS | Integrated-Design Engineering Analysis Software | a CAD/CAM software package of SDRC which was bought in 2002 by EDS and now merged into UGS's product NX (Unigraphics). |
IDEMA | International Disk drive Equipment and Materials Association | International not-for-profit trade association that represents the Hard Disk Drive (HDD) industry and its infrastructure. See also http://www.idema.org/ |
iDEN | integrated digital enhanced network | A Motorola-enhanced mobile radio network technology that integrates two-way radio, telephone, text messaging, and data transmission into a single network. |
IDIM | Identity Information Management | A set of principles, practices, policies, processes and procedures that are used within an organization to manage identity information and realize desired outcomes concerning identity |
IDIOT | Intrusion Detection In Our Time | Project to develop a new approach to efficient misuse detection methods. Its design made use of a new classification of intrusion methods based on complexity of matching and temporal characteristics |
IDIQ | indefinite delivery/indefinite quantity; | Contracts that enable government customers to buy IT services from pre-selected vendors at pre-negotiated rates. These contracts, developed and administered by individual government organizations to meet their own IT service requirements, are usually available to all federal agencies for a small administrative fee. |
IDL | Interface Definition Language | A language used to describe the interface to a software component or routine in a manner that is not dependent on a particular programming language or operating system. |
IDM | Internet Download Manager | IDM is a tool to increase download speeds by up to 5 times, resume and schedule downloads. http://www.internetdownloadmanager.com/ |
IDOL | Intelligent Data Operating Layer | heart of Autonomy's infrastructure |
IDOM | integrated document and output management | Gartner's term for an integrated collection of technologies, architectures and services aimed at applying the value of information in documents to business practices. IDOM takes a digital approach to reducing the burden and cost of paper-based documents. |
IDQ | Informatica Data Quality | Informatica Data Quality Solution delivers pervasive data quality |
IDR | Intelligent Disaster Recovery | Backup exec option for tape-based system recovery |
IDS | intrusion detection system | Software that detects attempts or successful attacks on monitored resources that are part of a network or host system. Software that notifies the user of attempts to hack into, disrupt, or deny service to the system. |
IDT | (originally) International Discount Telecommunications | a telecommunications and energy company headquartered in Newark, New Jersey. http://www.idt.net/ |
iDTV | Interactive digital television | A digital television broadcast linked to a return path that enables consumers to send and receive individualized messages in real time on their television set. |
IDU | interface data unit | interface data unit |
IE | Internet Explorer | Microsoft Internet Explorer. cf IE4, IE5, IE6, MSIE. |
IEC | Inter-exchange Carrier International Electrotechnical Commission |
A long distance telephone company. an organization that sets numerous standards for the electronics industry. Web address: www.iec.ch. |
IEE | Institution of Electrical Engineers | See them at HTTP://IEE.ORG |
IEEE | Institute of Electrical and Electronics Engineers |
An organization of engineers,
scientists and students involved in electrical, electronics and
related fields. IEEE 802 standard is the most widely recognized in the
computer industry. See also: http://www.ieee.org/
|
IES | Integrated Environmental Solutions | The IES SketchUp plug-in is a toolbar that sits within the Google SketchUp application and gives direct access to all of Integrated Environmental Solutions (IES) building simulation tools. |
IETF | Internet Engineering Task Force | This subgroup of the Internet Society is responsible for recommending protocols and procedures used over the Internet. It comprises representatives from vendor, government and academic communities, and is divided into six subcommittees. http://www.ietf.org/ |
IFB | Internet Free/Busy | Microsoft Outlook feature |
iFCP | Internet Fibre Channel Protocol | an emerging protocol dealing with backup and storage. It is a gateway-to-gateway protocol for the implementation of a Fibre Channel fabric in which TCP/IP switching and routing elements replace Fibre Channel components. |
IFL | Integrated Facility for Linux | an IBM mainframe processor dedicated to running the Linux operating system, with or without z/VM. |
iFrame | inline frame | a browser feature that enables an HTML page to be displayed within its own rectangle anywhere on another HTML page. When necessary, inline frames contain horizontal and vertical scrollbars to enable users to view all of the page's contents within the frame. |
IFRS | International Financial Reporting Standards | principles-based Standards, Interpretations and the Framework (1989)[1] adopted by the International Accounting Standards Board (IASB). |
iGEMS | Integrated Global Enterprise Management System | AT&T system correlates network events to predict and solve potential problems before they impact clients’ applications. |
IGF | Internet Governance Forum | a multi-stakeholder forum for policy dialogue on issues of Internet governance. Its establishment was announced by the UN Secretary General in July 2006. It first convened in October/November 2006. |
IGMP | Internet Group Management Protocol | The TCP/IP protocol that permits Internet hosts to take part in IP multicasting. It is an efficient means of broadcasting messages to groups of end-stations |
IGP | interior gateway protocol | A type of network protocol used by interior routers to move information within an autonomous system or group of networks under the control and authority of a single entity. IGPs transfer packets from one network to an adjacent one. |
IGRP | Interior Gateway Routing Protocol | Kind of IGP which is a distance-vector routing protocol invented by Cisco, used by routers to exchange routing data within an autonomous system |
IGS | IBM Global Services | IBM Global Services |
IHS | Integrated Heat Spreader | The top surface of the IHS is designed to be the interface for contacting a HS/HSF. Allows more effecient heat transfer out of the package to an attached cooling device. Transform non-uniform heat from the die to the top of the IHS for more uniform spread |
IHV | Independent hardware vendor | a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. |
IIOP | Internet Inter-ORB Protocol | a protocol that extends TCP/IP by adding CORBA defined messages for objects to connect to each other over the network. |
IIS | Internet Information Server | Microsoft's Hypertext Transport Protocol (HTTP) server, originally packaged with the Windows NT operating system. |
IKE | Internet Key Exchange | an IETF standard approach to exchanging keys for communications, typically used with implementations of IPSec. |
ILEC | Independent Local Exchange Carrier | These companies are the historical "Independents" who operate a local telephone business. |
ILEs | Immersive learning environments | learning situations that are constructed using a variety of techniques and software tools including game-based learning, simulation-based learning and virtual worlds. |
ILM | IBM License Manager Information Lifecycle Management |
Planned technology announced by IBM as part of the zSeries product
launch in October 2000. The ILM monitor would have allowed IBM and
other participating vendors to supply usage information to determine
license compliance and provide a vehicle for software asset management. Information Lifecycle Management. |
iLO | Integrated Lights-Out | Remote management feature on HP servers. |
ILP | initial loader program | reads an existing file containing database records; also called a boot-loader |
IM | Identity Management Instant Messaging |
an integrated system of business processes, policies and technologies
that enable organizations to facilitate and control their users' access
to critical online applications and resources while protecting
confidential personal and business information from unauthorized users. The facility to send and receive virtually instantaneous text messages across the internet allowing a text based conversation in real time. This allows two (or more) people with the same (or compatible) instant messaging software to type messages to each other. |
IMAC | installations, moves, adds and changes | General term for the routine work performed on computer equipment in an enterprise, including installations, relocations and upgrades |
IMAP | Internet Message Access Protocol |
It is a method of accessing e-mail
messages on a server without having to download them to your local hard
drive. This is the main difference between IMAP and another popular
e-mail protocol called "POP3." POP3 requires users to download messages
to their hard drive before reading them. The advantage of using an
IMAP mail server is that users can check their mail from multiple
computers and always see the same messages.
|
IMAPI | Image Mastering Application Programming Interface | Allows an application to stage and burn a simple audio or data image to CD-R or CD-RW devices |
IMC | Intelligent Management Center Internet Mail Consortium |
HP's single pane management platform that allows for management/visibility and integration of traditionally separate management tools an international organization focused on cooperatively managing and promoting the rapidly-expanding world of electronic mail on the Internet. http://www.imc.org/ |
IME | Input Method Editor | A program that performs the conversion between keystrokes and ideographs or other characters, usually by user-guided dictionary lookup. |
IMEI | International Mobile Equipment Identifier | Unique code given to mobile phones to identify them. The code is locked to the phone and not the sim. |
IMS | Information Management System IP multimedia systems |
DBMS from IBM IMS is an emerging architecture standard that defines how network elements interoperate to provide voice, data, and video services and applications in any combination, on any network (fixed or mobile). |
IMSI | International Mobile Subscriber Identity | A unique number within the SIM card that identifies the subscriber to the system |
IMUX | Inverse Multiplexer | Inverse Multiplexer |
INAP | Intelligent Network Application Protocol | Allows applications to communicate between various nodes/functional entities of an intelligent network. The protocol defines the operations required to be performed between nodes/functional entities for providing intelligent network services |
INC | International Network of Crackers | one of the premier cracking/releasing warez for the IBM PC during the very late 1980s and early 90s. |
InfoSec | Information Security | Protection of information to insure confidentiality, integrity, and availability. |
INI file | initialization file | Commonly used in Microsoft Windows 3.x and earlier, INI files have been used by both the operating system and individual applications to store persistent settings related to an application, driver, or piece of hardware. |
Inmarsat | International Maritime Satellite Organization | A global mobile satellite communications operator with headquarters in London. Originally formed as an intergovernmental organization, Inmarsat became a limited company in 1999. |
INTAP | Interoperability Technology Association for Information Processing | The technical organization that officially develops Japanese OSI profiles and conformance tests |
Intel | INTegrated ELectronics | CPU market leader. |
InterNIC | Internet Network Information Center |
he InterNIC is an organization created
by the National Science Foundation to provide Internet information and
domain name registration services. While the InterNIC was started as a
joint effort between Network Solutions and AT&T, it is now run by
the Internet Corporation For Assigned Names and Numbers (ICANN).
|
IOA | input/output adapter | A functional unit or a part of an I/O controller that connects devices to an I/O processor. For devices, the electrical circuits on a logic card that connect one device to another. A circuit board containing logic and internal software that bridges an internal processor or memory interconnect scheme and an external, common, standard channel or link. |
IOCA | Image Object Content Architecture | A defined data stream used to store raster image data. An architecture that provides a collection of constructs used to interchange and present images. |
IOD | in-order delivery | In fibre-channel technology, a parameter that, when set, guarantees that frames are either delivered in order or dropped. |
iODBC | Independent Open DataBase Connectivity | Open source, platform independent implementation of both the ODBC and X/Open specifications. It is rapidly emerging as the industry standard for developing solutions that are language, platform and database independent. See also http://www.iodbc.org/ |
IOM | Integrated Object Model | a set of object-based interfaces to features or services that are provided by Base SAS software. IOM enables application developers to use industry-standard programming languages, programming tools, and communication protocols to develop client programs that access these services on IOM servers. |
IONL | Internal Organization of the Network Layer | The ISO/OSI standard for the architecture of the network layer. The IONL divides the network layer into subnetworks interconnected by convergence protocols (internetworking protocols), resulting in a catenet or internet |
IOP | Interoperability | Ability of equipment from different manufacturers (or different implementations) to operate together. |
IOPS | Input/Output operations per second | Input/Output operations per second. |
IoS | Internet over Satellite | This technology allows a user to access the Internet via a satellite that orbits the earth. From a fixed position (also referred to as GEOS), the statellite is able to maintain a reliable connection to the antennas on the earth. It orbits the earth at the exact speed of the earth's rotation. |
IOS | international operator services (IOS Telecom) Internetwork Operating System |
call center operator-services providers in the U.S. http://www.iostelecom.com/ the software used on the vast majority of Cisco Systems routers and current Cisco network switches. |
IOTP | Internet Open Trading Protocol | an IETF specification which defines a way to create a business trading environment that is more reliable and personal than existing methods by giving the consumer more opportunities to interact directly with all parties of a transaction. |
I-PNNI | Integrated Private Network-Network Interface | PNNI-compatible protocol used to exchange information between routers that augment or replace protocols such as OSPF and IPX. |
IP | Intellectual Property Internet Protocol |
IP is the rights in ideas (e.g. in an invention
which will be protected by patent law) or expression of ideas (e.g. a book or
drawing which will be protected by copyright law) The basic underlying protocol of the Internet, originally developed during a 15-year period under the auspices of the U.S. Department of Defense. Used in conjunction with TCP, it provides a common address system and communications protocol to track the addresses of network nodes, route outgoing messages and recognize incoming ones. |
IP address /number | Internet Protocol addresss /number | Internet Protocol address (IP address) is a unique number consisting of 4 parts separated by dots, e.g. 165.113.245.3 Every machine that is on the Internet has a unique IP number. |
IP PBX | Internet Protocol private branch exchange | IP PBX vendors replace the traditional TDM/PCM circuit switching and offer a IP-switching platform for voice communications. The communication servers provide true multimedia capability and offer many advantages for high bandwidth applications. |
IP telephony | Internet Protocol telephony | Voice traffic or data traffic that has traditionally been treated like voice traffic — it is transmitted over an IP network. Three distinct types of IP telephony traffic exist: real-time voice, non-real-time voice and fax. |
IPA | intelligent process automation | The automation of repeatable operational decisions within business process sets |
IPAM | Intellectual property asset management IP Address Management |
Discovering and exploiting gaps in competitors' patent strategies and
their own patent strategies and inventing or acquiring intellectual
property (IP) to cover those gaps. IP Address Management |
IPC | interprocess communication | The process by which programs send messages to each other. A mechanism of an operating system that allows processes to communicate with each other within the same computer or over a network. |
IPL | initial program load |
The process that loads the system programs from the system auxiliary
storage, checks the system hardware, and prepares the system for user
operations. The process of loading the operating system and other basic software into main storage. |
IPL / IPLC | international private line / international private leased circuit | point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world. |
IPM | Internetwork Performance Monitor | Cisco network response time and availability troubleshooting application |
IPMX | IP management exchange | A service, residing in the network, operated by a neutral provider that mediates quality of service, revenue settlement, and performance management among different carrier networks. |
IPP | Internet Printing Protocol | A client-server protocol for printing over the Internet. The Mac OS X printing infrastructure and the Mac OS X Server print service that’s built on it support IPP. |
IPPP | Internet presence provider and promoter | a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it. |
IPR | Intellectual Property Rights | a legal field related to creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. |
IPRM | intellectual property rights management | IPR management |
IPRR | Intellectual property rights and royalties | software lets companies with digital
media assets monetize those assets by issuing contracts that license the use of their IP for
distribution, incorporation with advertising, use in consumer products, or display through traditional and digital means in vehicles other than those owned by the copyright holder. |
IPS | intrusion prevention system | Beyond an IDS, an IPS takes the additional step of blocking the attempted intrusion. IPS monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. |
IPSec | IP Security |
A collection of Internet Engineering Task Force (IETF) standards that
define an architecture at the IP layer to protect IP traffic by using
various security services. A protocol that provides cryptographic security services at the network layer. |
IPT | Identity Protection Technology IP telephony |
technology in 2nd Generation Intel® Core™ processor platforms
the transmission of voice conversations (phone-to-phone) over packet IPT — switched IP data networks, such as private enterprise LANs, WANs, intranets and the Internet. Specifically, IP telephony involves the delivery of the telephony application over IP, instead of a circuit-switched or other modality. |
IPTV | Internet Protocol Television |
a term used to describe the distribution of video and TV services via a
broadband connection using Internet technology. IPTV is commonly
associated with the delivery of on-demand TV, where viewers access
programming as and when they want without waiting for broadcast
schedules. In PC Internet terms, IPTV is used to describe the delivery of content over Internet infrastructure using a set of proprietary protocols developed by a technology provider such as Joost. |
IPv4 | Internet Protocol, version 4 | The most widley used version of the IP. IPv4 allows for a theoretical maximum of approximately four billion IP Numbers (technically 232), but the actual number is far less due to inefficiencies in the way blocks of numbers are handled by networks. |
IPv6 | Internet Protocal version 6 |
Every computer system and device
connected to the Internet is located by an IP address. The current
system of distributing IP addresses is called IPv4. This system assigns
each computer a 32-bit numeric address, such as 120.121.123.124.
|
IPv6CP | IPv6 PPP Control Protocol | responsible for configuring, enabling and disabling the IPv6 protocol modules on both ends of a PPP link. |
IPX | Internetwork Packet Exchange |
It is a networking protocol used to
connect networks based on Novell's NetWare. IPX is "connectionless,"
meaning it doesn't require connections to be maintained during an
exchange of packets, like a phone call does.
|
IR | InfraRed Internet Registry |
An IR device is one which is able to use infrared for communication, a type of wireless device. The IANA has the discretionary authority to delegate portions of its responsibility and, with respect to network address and Autonomous System identifiers, has lodged this responsibility with an IR. |
IRC | Internet Relay Chat | Basically a huge multi-user live chat facility. There are a number of major IRC servers around the world which are linked to each other. Anyone can create a channel and anything that anyone types in a given channel is seen by all others in the channel. |
IRF | Intelligent Resilient Framework | HP frankwork built to fail over to other switches in case of an outage or other disaster. |
iRMC | Integrated Remote Management Controller | Implementation of a Remote Access Card (RAC) by Fujitsu |
IRP | I/o Request Packet | Data structure used by Windows to communicate to kernel-mode device drivers |
IRQ | Interrupt Request | PCs use interrupt requests to manage various hardware operations. Devices such as sound cards, modems, and keyboards can all send interrupt requests to the processor. |
IRS | Interrupt Source | Synonymous with bad guys, snakes, nightmares, ulcers, high blood pressure, audits and system crashes! See them at HTTP://WWW.IRS.GOV |
IRTF | Internet Research Task Force | a group focused on researching Internet protocols, applications, architecture and technology http://www.irtf.org/ |
IRU | Indefeasible Right of Use | a contractual agreement between the operators of a communications cable, such as submarine communications cable |
IS | Information Systems | the department that is in charge of information services, information management and computing in general in larger businesses. |
ISA | Industry Standard Adapter Internet Security and Acceleration |
The original 8- and 16-bit expansion card standard used in PCs. ISA cards run at a bus speed of 8MHz. Microsoft Firewall Client. |
ISACA | Information Systems Audit and Control Association | See http://www.isaca.org/ |
ISAM | Indexed Sequential Access Method | a popular form of record retrieval from files on larger systems. This method was consistent with IBM's method of dealing with multiple users in the same file at the same time. |
ISATAP | Intra-Site Automatic Tunnel Addressing Protocol | an IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes |
ISC | Internet Software Consortium | a nonprofit corporation dedicated to production-quality software engineering for key Internet standards http://www.isc.org/ |
iSCSI | Internet SCSI | A proposed network transport standard — supported by a group of vendors that include Cisco Systems, Adaptec and IBM — designed to enables SANs to be built using SCSI protocols. It works by encapsulating SCSI data in IP packets for transport over IP-based networks. |
ISDN | Integrated Services Digital Network |
A technical standard and design
philosophy for digital networks. ISDN provides
high-speed, high-bandwidth channels to subscribers via the
public switched telephone network, achieving end-to-end digital
functions with standard equipment interface devices.
|
IS-IS | Intermediate-System-to-Intermediate-System | A routing method among intermediate systems that requires the end systems, rather than the intermediate systems, to be responsible for providing error correction. It reduces complexity and overhead of routing protocols. |
ISIS | Image and Scanner Interface Specification | A common interface standard that allows consistent scanner control dialogue. Created by Pixel Translations (now part of ActionPoint), ISIS has become a popular standard for document-imaging scanners. |
ISL | inter-switch link | The physical connection that carries a protocol for interconnecting multiple routers and switches in a SAN. |
ISM | industrial, scientific and medical | The industrial, scientific and medical (ISM) radio bands. |
ISN | Initial Sequence Numbers | A number, created by an operating system, that computers use to reconstruct data sent over the Internet. |
ISO | International Organization for Standardization | ISO followed by a number is used to identify one of the published ISO standards. www.iso.org - ISO Home Page |
ISOC | Internet SOCiety | Based in Herndon, Virginia, the Internet Society promotes the Internet and coordinates standards. You can visit their site (http://www.isoc.org/) |
ISP | Internet Service Provider | An institution that provides access to the Internet in some form, usually for money. |
ISR | interrupt service routine | A small piece of software executed in response to a particular interrupt. |
ISS | Internet Security Systems | An security software vendor headquartered in Atlanta. acquired by IBM |
ISTG | InterSite Topology Generator | Managing active directory replication |
ISUP | ISDN User Part | part of the SS #7 which is used to set up telephone calls in PSTN |
ISV | independent software vendor | A software producer that is not owned or controlled by a major IT vendor. An ISV is a company whose primary function is to distribute software. |
IT | Information Technology | broad subject concerned with technology and other aspects of managing and processing information, especially in large organizations. |
ITAD | IT asset disposition | Processes to redeploy, remarket, donate, recycle, or dispose of IT assets in compliance with data security, environmental, and industry regulations. |
ITAM | IT asset management | A systematic approach to managing IT assets throughout their life cycle, from procurement through retirement and disposal. |
ITC | IT consolidation | IT consolidation |
ITCAM | IBM Tivoli Composite Application Monitoring | IBM Tivoli IT management sofware |
ITCM | IT Change Management | tool functionality governs documentation, review, approval, coordination, scheduling, monitoring and reporting of RFCs. The basic functional requirements begin in the area of case documentation, with industry-standard assignment capabilities of classification and categorization. |
ITCS | Intermodal Transport Control System | Performance-minded transport system place high demands on the quality of their transport network. |
ITeS | Information Technology Enabled Services | outsourcing of processes that can be enabled with information technology and covers diverse areas like finance, HR, administration, health care, telecommunication, manufacturing etc. Armed with technology and manpower, these services are provided from e-enabled locations. |
ITIL | Information Technology Infrastructure Library | An initiative developed by the Central Computing and Telecommunications Agency consultancy for the government of the United Kingdom. It offers a set of best practices in 24 service delivery and IT service support areas, including help desk, problem management, change management, software distribution and cost control. |
ITL | Instructional Technology Lab | The ACCC's ITL, which helps faculty and computer support staff work with instructional technology. see the ITL home page. |
ITLA | Incremented Three Letter Acronym | at one time IBM ran out of TLAs. In order to move to four letter acronyms, they had to come up with a four letter acronym to replace TLA. So ITLA was adopted as the "standard" to describe all four letter acronyms! |
ITO | IT outsourcing | The contractual vehicle through which enterprises use external sources to provide life cycle service and support operations for their IT infrastructure. Outsourcing can be partial or total, and can involve not only operations but also the acquisition of customer assets and personnel. |
ITOM | IT operations management | IT operations management |
ITU | International Telecommunication Union |
This is an international organization,
headquartered in Geneva, Switzerland, within which
governments and the private sector coordinate global
telecommunications networks and services. See also: http://www.itu.int/
|
ITWAB | IT Workload Automation Broker Tools | technology designed to overcome the static and manual nature of scheduling jobs. It's capable of managing mixed workloads based on business policies, where resources are assigned and unassigned in an automated fashion to meet service-level objectives. |
ITXC | Internet Telephony Exchange Carrier | a US based wholesale provider of VoiP, Internet-based phone calls. acquired by Teleglobe Bermuda Ltd. in 2004 |
IVANS | International Value Added Network Services | IVANS is an external public telecommunication service which provides customers with enhanced services such as electronic mailbox messaging, data interchange or database access and retrieval etc. |
IVDT | Integrated Voice and Data Terminal | A dual function device incorporating both a terminal keyboard/display and voice telephone. |
IVIS | in-vehicle information system | A system that enables intelligent vehicles to provide the functionality to increase the productivity and safety of the driver. |
IVR | interactive voice response |
This function enables callers to push
buttons in response to voice prompts to listen to
recorded information, or have their calls automatically routed to an
appropriate queue or party.
|
IXC | Interexchange Carrier | Any individual, partnership, association, joint-stock company, trust, governmental entity or corporation engaged for hire in interstate or foreign communication by wire or radio between two or more exchanges. |
IXS | Integrated xSeries Server | An Intel server that fits inside System i products to support larger Windows application demands. |
icon |
|
|
Idea management | a structured process of generating, capturing, discussing and improving, organizing, evaluating and prioritizing valuable insight or alternative thinking that would otherwise not have emerged through normal processes. | |
IGN | IGN is an entertainment website that focuses on video games, films, music and other media. http://www.ign.com/ | |
index | The name on some operating systems for a directory listing of files. The starting point of a data set. For example, say a record within a sector of a cylinder of a disk. The first bit of the container does not have user data. It is the pointer to the index of that container. A file of information, usually small amounts of the same information in another file that is much larger. The smaller file also keeps track of the exact record number of the record in the large file containing the same information, only in much greater detail. |
|
iLink | iLink is the registered trademark of Sony's IEEE 1394 digital connection. | |
insourcing | The process of separating the IS organization from the enterprise, usually as a business unit measured by its own profit and loss. The insourced IS organization provides the enterprise with IT services on a business-rules basis. | |
interface | Connection between two systems or devices. A display technique, used primarily in the early 1990s, that enables a monitor to provide more resolution inexpensively. The preparation a graphic image so that alternating rows are displayed in separate passes. Interlaced images give a unique effect because the entire image is displayed quickly and then details are filled in gradually. |
|
Internet | The word "internet" literally means "network of networks". In itself, the Internet is comprised of thousands of smaller regional networks scattered throughout the globe. | |
Internet telephony | Use of Internet protocols for transmitting two-way audio signals in real time, as an alternative to traditional telephone carriers. | |
InterNIC | the entity that controls the registration of most domain names on the Internet. The InterNIC is a cooperative activity between the National Science Foundation, Network Solutions, Inc. and AT&T. HTTP://WWW.INTERNIC.NET. | |
intranet | An intranet is a constrained version of the Internet usually owned and controlled by a single company or organisation. Intranets can still be world-wide, use TCP/IP protocols, and be structured as a collection of networks but the greatest difference is that access is limited to a set of authorised users using firewalls and other mechanisms. | |
IsoHunt | isoHunt is a BitTorrent index with over 1.7 million torrents in its database and 20 million peers from indexed torrents. http://isohunt.com/ | |
iOS | a mobile operating system developed by Apple for its iPhone devices, but now used for other Apple products such as the iPod Touch, iPad tablet and Apple TV | |
Itanium | A new processor generation introduced by Intel in 2001, based on IA-64 architecture. |
J
J for Java
Abbreviation | Term | Definition |
---|---|---|
J-code | Japan code | a slang nickname for the software written in Japanese companies, which has a reputation for being overly complex. J-code is also slang for rules that are enforced only to preserve a hierarchy of management. This refers to the multiple layers of management in Japanese business culture. |
J2EE | Java 2 Platform, Enterprise Edition | A Sun Microsystems platform specification and branding initiative that provides a unifying umbrella for enterprise-oriented Java technologies. J2EE focuses on server-side, multitier services. J2EE includes the Java Server Pages, Java Servlets and Enterprise JavaBeans programming models, a number of protocols and application programming interfaces, a reference implementation, a test suite, and an application model. |
J2ME | Java 2 platform, Micro Edition | refer to J2EE |
J2SE | Java 2 platform, Standard Edition | refer to J2EE |
JAAS | Java Authentication and Authorization Service | a package that enables services to authenticate and enforce access controls upon users. It implements a Java version of the standard Pluggable Authentication Module (PAM) framework, and supports user-based authorization |
JACK | JACK Audio Connection Kit | soundserver or daemon that provides low latency connections between so-called jackified applications. It is created by Paul Davis and others and licensed under the GPL. JACK is free audio software. |
JAD | joint application development | a RAD (Rapid Application Development) concept, which involves cooperation between the designer of a computer system and the end user to develop a system that exactly meets the user's needs. |
JAMES | Java Apache Mail Enterprise Server | a 100% pure Java server, designed to be a complete and portable enterprise mail engine solution based on currently available open protocols |
JAR | Java Archive | a file containing a collection of Java class files that can be downloaded more efficiently than would be possible if each file were downloaded separately. |
JBIG | Joint Bi-level Image experts Group | This was (and is) a group of experts nominated by national standards bodies and major companies to work to produce standards for bi-level image coding. See also http://www.jbig.org/ |
JBL | Jame B. Lansing | (Jame B. Lansing) Speakers |
JBOD | Just a Bunch of Disks | refers to drives that reside in their own enclosure external to the server, but contain no RAID intelligence. JBOD drives are dependent on the server for RAID functionality. |
JCA | Java Connector Architecture |
Java interoperability techniques |
JCAHO | Joint Commission on Accreditation of Healthcare Organizations | An U.S. independent, not-for-profit organization devoted to healthcare standards setting and accreditation. |
JCB | job control block | A group of data containing the execution-control data and the job identification when. |
JCL | Job Control Language | JCL is a set of control statements punched onto computer cards used to direct the execution of computer programs and describe the input/output devices used on IBM computers running the OS/360 and later operating systems. JCL serves as a means of communication between the user's program and the system. |
JCP | Java Community Process | A program created by Sun Microsystems to provide an open forum for Java developers, licensees and other members. JCP's charter is to develop Java technology specifications, reference implementations and technology compatibility kits. |
JDBC | Java DataBase Connectivity | An application program interface specification for connecting programs written in Java to the data in a database. It is a Java API that enables Java programs to execute SQL statements and interact with any SQL-compliant database. |
JDK | Java Development Kit | A software development package from Sun Microsystems that implements the basic set of tools needed to write, test and debugJava applications and applets |
JEDEC | Joint Electronic Devices Engineering Council | An international body of semiconductor manufacturers that set IC standards. |
JES | Job Entry Subsystem | An IBM licensed program that receives jobs into the system and processes all output data that is produced by jobs. |
JFK | Just Fast Keying | a simple protocol for establishing VPN sessions |
JFS | Journaling File System | The native file system in the AIX operating system. A technology designed for high-throughput server environments, which are important for running intranet and other high-performance e-business file servers. |
JIA | Joint Innovation Assessment | an engagement whereby a full audit of a client’s and a supplier's innovation capabilities can be assessed in order to prepare future joint innovation work or a joint innovation program. |
JIT | Just-in-time | This is a type of Java compiler that interprets a class file, then compiles the information into native code. |
JITA | Just In Time Activation | Allows an objects to tell COM+ that its work is done and that it can be destroyed |
JITT | just-in-time training | A training methodology in which users are trained in a technology just when they begin using it. |
JJ | Josephson Junction | A thin insulating layer surrounded by superconducting material in a superconducting circuit. |
JMS | Java Messaging Service |
part of the Java EE specifications |
JMX | Java Management eXtensions |
Java API |
JNI | Java Native Interface | A technology for bridging C-based code with Java. |
JOA | Joint Opportunity Assessment | an engagement whereby a service provider helps his client elicit the requirement and the potential impact of a large project or an outsourcing project. JOA's typically include but are not limited to: strategic guidelines to improve work efficiency, business processes, TCO, etc |
JOLAP | Java Interface for OLAP | A Java application programming interface for the J2EE environment. JOLAP supports the creation and maintenance of OLAP data and metadata, independent of vendor. |
JPDL | jBoss process definition language | based on a model of nodes, transactions and actions. jPDL specifies an xml schema and mechanism to package all process definition related files. |
JPEG / JPG | Joint Photographic Experts Group | JPEG (pronounced JAY-peg) is most commonly mentioned as a format for image files. JPEG format is preferred to the GIF format for photographic images as opposed to line art or simple logo art. |
JRE | Java Runtime Environment |
The JRE is developed by Sun
Microsystems (the creator of Java) and includes the Java Virtual
Machine (JVM), code libraries, and components, which are necessary to
run programs written in Java. The JRE is available for multiple
computer platforms, including Mac, Windows, and Unix.
|
JS | JavaScript | a language that allows a web page to include commands to be executed by the web browser. For example, you may wish your web page to have dialog boxes that appear when the user clicks on certain places. |
JSON | JavaScript Object Notation | A format for exchanging data that are structured as a collection of name-value pairs or an ordered list of values. JSON.org |
JSP | Java Server Page |
This standard was developed by Sun
Microsystems as an alternative to Microsoft's active server page (ASP)
technology. JSP pages are similar to ASP pages in that they are
compiled on the server, rather than in a user's Web browser. However,
JSP is Java-based, whereas ASP is Visual Basic-based.
|
JSR | Java Specification Request |
worked in the Java community |
JTAG | Joint Test Action Group | the common name used for the IEEE 1149.1 standard entitled Standard Test Access Port and Boundary-Scan Architecture for test access ports used for testing printed circuit boards using boundary scan. |
JTC | Join Transitive Closure | Allows the DBMS optimizer to consider a join order other than those made available explicitly by the query's WHERE clause |
JTC1 | Joint Technical Committee | created by ISO and IEC. It is comprised of standards organizations from over 75 countries, and is involved with setting standards for information processing. |
JTRS | Joint Tactical Radio System | a software radio that will work with many existing military and civilian radios. |
JVM | Java virtual machine | JVM s a set of computer software programs and data structures that use a virtual machine model for the execution of other computer |
JVT | job volume table | A table that contains volume information obtained from data definition (DD) statements. |
J# | pronounced “J sharp”, a programming language very similar to JAVA but implemented in the Microsoft .NET Framework; essentially a combination of Java and C#. | |
jabber | An error in which a faulty device (usually a NIC ) continuously transmits corrupted or meaningless data onto a network. A sent data packet greater than the maximum 1518 bytes specified in IEEE 802.3. an open XML protocol for message and presence exchange in real time between two points on the Internet. |
|
jack | A connecting device having springs which make electrical contact with mating contacts of a plug. | |
Jailbreaking | the act of bypassing the App Store as a means for distributing applications after installing unsupported software. | |
Java | A high level programming language, developed by Sun Microsystems. Compiled Java code can run on most computers because Java interpreters and run time environments, known as Java VMs. http://www.java.com | |
JavaScript | A scripting language targeted specifically to the Internet. It is the first scripting language to fully conform to ECMAScript, the Web's only standard scripting language. Despite its name, JavaScript is not a derivative of Java; its origin is Netscape's Livescript language. | |
Jitter |
A slight movement of a transmission signal in time or phase, which can introduce errors
and loss of synchronization for high-speed, synchronous communications. |
|
Joe job | an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source. A Joe job is sometimes conducted as an act of revenge on someone who reports a spammer to their ISP or publicly advocates anti-spam legislation. | |
Joomla! | a free, open source content management system written with PHP for publishing content on the world wide web and intranets using a MySQL database. | |
jQuery | a library that makes it quicker and easier to build JavaScript webpages and web apps. Often with jQuery you can write a single line of code to achieve what would have taken 10-20 lines of regular JavaScript code. jQuery | |
jQuery Countdown | A jQuery plugin that sets a div or span to show a countdown to a given time. | |
jumbo frames | Jumbo frames are large IP frames used in high-performance networks to increase performance over long distances. | |
Junk Mail | Unsolicited email. | |
Jython | an implementation of PYTHON based on JAVA. See www.jython.org. |
K
K for key
Abbreviation | Term | Definition |
---|---|---|
k | kilo | This is 210 or 1024 in computer terminology. |
k-map | knowledge map | A representation of concepts and their relationships (e.g., hierarchy, taxonomy and network). A K-map is a navigational aid that enables a user to hone in rapidly on the desired concept, and then follow links to relevant knowledge sources (information or people). |
kaid | Kai console daemon | a service that provides tunneling for console games that do not have an inherent connection to the Internet. Although the label refers to XBOX, the daemon works well with PS2, and Gamecube consoles as well |
Kb | Kilobit | One thousand bits (103) or 1024 bits (210). A unit of measurement of the capacity of memory integrated circuits. |
kB | Kilobyte | One thousand bytes (103) or 1024 (210) bytes. A unit of measurement used for computer file sizes. |
KBE | knowledge-based engineering | A system that encapsulates design knowledge that can be recalled, reused and extended to create product designs. |
Kbps | Kilobits Per Second |
Don't confuse this with Kilobytes per
second (which is 8 times more data per second). This term is commonly
used in describing data transfer rates. For example, two common modem
speeds are 33.6 Kbps and 56 Kbps.
|
KBS | Knowledge-Based System | A computer system that is programmed to imitate human problem-solving by means of artificial intelligence and reference to a database of knowledge on a particular subject. |
KBMS | KeyBoard/MouSe | Connector. It's simply a duplicate of the PS/2 ports and it's used to connect other devices that use the PS/2 without having to give up the keyboard and mouse, and also is convenient for things that you need to mount internally |
KBW | keyboard wedge | KBW can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader ( MSR ) into keyboard strokes for a computer. The software form of a keyboard wedge intercepts the dignal signals from the reader when they arrive at the computer and instantly translates them into keyboard strokes. |
KCC | Knowledge Consistency Checker | A domain service that creates and modifies the replication topology of AD |
KDC | Key Distribution Center | A network service that provides tickets and temporary session keys. The KDC maintains a database of principals (users and services) and their associated secret keys. |
KDD | Knowledge Discovery in Databases | A branch of Artificial Intelligence Artificial-Intelligence. |
KDE | K Desktop Environment | KDE is an open source graphical desktop environment for Unix workstations. Initially called the Kool Desktop Environment, KDE is anongoing project with development taking place on the Internet and discussionsheld through the official KDE mailing list, numerous newsgroups, and IRC channels. |
KDSI | thousand (K) Delivered Source Instructions | It is a measure of a programmer's productivity or a project productivity. |
keychan | Key changer | a small program/software, that can change a software license key to another key. A key changer is not illegal, since it only changes a key |
keygen | Key Generator | Refers to a program that will automatically generate a registration or serial number. Its usual purpose is to eliminate software piracy. |
keylogging | keystroke logging | the act of recording the keys that a person presses as he or she uses a computer. Keystroke logging is often done surreptitiously by malicious SPYWARE in an attempt to capture passwords. |
KGD | Known Good Die | a process where customers can get fully tested, bare-die flash devices. No additional packaging, like a TSOP, is provided. |
KiB | kibibyte | 1024 bytes. |
KIPS | Thousands of instructions per second | a unit used to measure the speed at which a processor executes instructions. See also MIPS. |
KIS | Knowbot Information Service | A directory retrieval service for Internet addresses, that uses intelligent agents to process requests. Also called netaddress. |
KISS | Keep It Simple, Stupid | The New Hacker's Dictionary, edited by Eric Raymond, says that the KISS Principle is sometimes cited on a development project to fend off feature creep. The somewhat related idea of Ockham's razor is about always looking for the simplest explanation. |
KLOC | thousands of lines of code | a traditional measure of how large a computer program is or how long or how many people it will take to write it. The code measured is usually source code . Since a higher-level source language compiles into more lines of machine code than a lower-level language, a KLOC of C++ statements would generate a larger program than a KLOC of assembler language statements. |
KM | knowledge management | A business process that formalizes the management and use of an enterprise's intellectual assets. KM promotes a collaborative and integrative approach to the creation, capture, organization, access and use of information assets. |
KML | Keyhole Markup Language | KML is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth). In fact, KML was initially developed for use with Google Earth. When Google acquired Keyhole in 2004, that project came with it and eventually became Google Earth. |
KMS | Key Management Server Knowledge Management System |
Mostly used in Microsoft Exchange to issue security certificates a distributed hypermedia system for managing knowledge in organisations |
KNI | Katmai New Instructions | This is the original code-name for Intel’s SSE instruction set, named after the first Pentium III processor core, code-named “Katmai.” |
knowbot | Knowledge robots | designed to search files on the Internet "a robotic librarian." It is a registered trademark of the Corporation for national Research Initiatives. |
KOLs | Key opinion leaders | more discerning in who they accept information from and with whom they will work. |
KPCMS | Kodak Precision Color Management System | Kodak Precision Color Management System |
KPN | (formerly) Koninklijke PTT Nederland | a Dutch landline and mobile telecommunications company http://www.kpn.com |
KPI | key performance indicator | KPIs are applied in BI to gauge business trends and advise tactical courses of action. |
KPO | Knowledge Processing Outsourcing | he combination of BPO, Research Process Outsourcing (RPO) and Analysis Proves Outsourcing (APO). KPO business entities provide typical domain-based processes, advanced analytical skills and business expertise, rather than just process expertise. |
KSAM | Keyed Sequential Access Method | Accessing a flat file using a simple or compound key |
ksh | Korn shell | A command interpreter for UNIX. An interactive command interpreter and a command programming language. |
KSR | Keyboard Send/Receive | A teletypewriter transmitter and receiver operated by means of a keyboard, with no monitor. |
KSU | Key Service Unit | a telephony term. A central control cabinet serving many multi-button key telephones. Contains equipment which enables the user to pick up and hold PABX or Central Office (CO) lines and provide flashing line, steady, busy and wink hold signals. Dial intercom service is also an option. May all be contained in a computer-like device cabinet or chassis. |
KTM | kernel transaction manager | A transaction management service that enables you to create a transaction processing system (TPS) in user mode or kernel mode (or both). |
KTS | Key Telephone System |
The KTS provides communications
services to small businesses that require typically
between 2 and 100 telephones and have a large number of
internal intercom calls in relation to the number of inbound or
outbound calls. Unlike a PBX, a key telephone system is
not a switch.
|
KUIP | Kernel User Interface Package | the human interface to PAW PAW. |
KVA | Kilo Volt Amp | A term describing power in a relationship of both thousands of volts |
KVM | K Virtual Machine Keyboard, Video, and Mouse |
A virtual machine designed from the ground up with the constraints of inexpensive mobile devices in mind a KVM switch allows you to used multiple computers with the same keyboard, video display, and mouse. |
kW | kilowatt | A unit of electrical power, equal to 1,000 watts. |
KWH | KiloWatt Hour | A measure of the amount of watts of energy used. Electricity is measured in units of power called watts. |
KYC | Know Your Customer | a broad variety of products designed to help companies avoid initiating or maintaining commercial relationships with parties that are regulatory-inappropriate or otherwise undesirable. |
Ka-Band | the bandwidth of electromagnetic wave between 33 GHz to 36 GHz, which is primarily used in satellites operating at 30 GHz uplink and 20 GHz downlink for mobile voice communications. | |
keiretsu | a collection of companies that band together for mutual benefit. This Japanese word came into popular use as venture capitalists began building startup keiretsu, companies that benefit from each other's success. | |
Kerberos | derived from Greek mythology which refers to the three-headed dog that guarded the gates of Hades. Kerberos is most widely used in a network to provide secure network authentication. Usually to authenticate users of the network. | |
kermit |
A terminal program and file transfer protocol, kermit can be used to
download files from a remote system to your home computer. A protocol used for transferring files over a dial-up connection that is commonly used on BBS systems. |
|
kernel | The heart of an operating system. The kernel is the part of the operating system that interconnects with the hardware. | |
key | In cryptography, a key is a value that determines the output of an encryption algorithm when transforming plain text to encrypted text. | |
Key logging | Key logging software runs in the background, in a stealth mode that isn't easy to detect on a PC. It collects every keystroke and hides that information in a file. | |
Keyboard Wedge | a hardware device installed between a computer's keyboard and POS terminal that translates digital signals from a barcode reader or magnetic strip reader into keyboard strokes | |
killer app (application) | a computer program that is so useful or desirable that it proves the value of some underlying technology, such as a gaming console, operating system, or piece of computer hardware or deploying an entire network. Killer applications are very rare. | |
Kiosk | Free-standing, interactive devices installed for customer self-service. Besides the computer monitor, a kiosk can have a keyboard or scanner attached for input and a printer attached for output. | |
Klez | pronounced KLEHZ, an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients. It is not necessary for a user to explicitly open an attachment in order for Klez to execute. There have been more than a half-dozen variations of Klez since it was first reported in October of 2001. | |
Ku-Band | the bandwidth of electromagnetic wave between 12 GHz to 14 GHz, which is primarily used in satellites operating at 14 GHz uplink and 11 GHz downlink in supporting braodband TV and DBS system (DSS). |
L
L for Linux
Abbreviation / acronyms | Term | Definition |
---|---|---|
l10n | localization | There are ten letters between the "l" and the "n" |
L1 / L2 cache | level-1/2 cache | L1: the memory cache that is closest to the CPU or included within it. L2: a memory cache outside the CPU |
L2CAP | Logical Link and Control Adaptation Protocol | a Bluetooth Specific Protocol |
L2F | Layer 2 Forwarding | a tunneling protocol from Cisco Systems. L2F has been submitted to the IETF for approval as a standard. |
L2S | Layer 2 Switch | Layer 2 Switch |
L2TP | Layer 2 Tunneling Protocol | A protocol that combines the features of Microsoft's PPTP and Cisco Systems' L2F to support multiprotocol or private-address IP traffic across a public IP network. L2TP is a mature Internet Engineering Task Force standard that has been widely implemented. |
L3F | Layer 3 Forwarding | a tunneling protocol from Cisco Systems. L3F has been submitted to the IETF for approval as a standard. |
L3S | Layer 3 Switch | Layer 3 Switch |
L3TP | Layer Three Tunneling Protocol | an extension to the PPP protocol that enables ISPs to operate VPNs. L3TP merges the best features of three other tunneling protocols |
LA | Load Address | LA is an IBM term |
LAC | L2tp Access Concentrator | Device attached to the switched network or located on an end system supporting L2TP to pass PPP traffic |
LACNIC | Latin American and Caribbean Internet Addresses Registry | one of four regional Internet registries that supply and administer IP addresses. |
LACP | Link Aggregation Control Protocol | Part of an IEEE specification (802.3ad) that allows to bundle several physical ports together to form a single logical channel |
LADDR | Layered Device Driver | s SCSI device driver architecture used in early versions of OS/2. |
LAI | Location Area Identity | the information carried in the SIM of GSM handsets that identify the subscriber's home area. This is used for billing and sub-net operation purposes. |
LAIPE | Link And In Parallel Execute | a high-performance package for scientific and engineering computing, programmed in MTASK. http://www.equation.com/ |
LAMP | Linux, Apache, MySQL and PHP | Also defined as Linux, Apache, MySQL and Pythor or Perl. The term LAMP is used to describe a web based solution produced using PHP (scripting), MySQL (database), Apache (web-server) under Linux (operating system), each of which are free to download. It therefore describes a website using free off-the-shelf components. |
LAN | Local Area Network |
A network of interconnected
workstations sharing the resources of a single processor or server
within a relatively small geographic area. Typically, this might be
within the area of a small office building.
|
LANE | Local Area Network Emulation | A set of services and protocols that provide for the emulation of LANs, using ATM as a backbone to allow connectivity among LAN and ATM attached end stations |
LAPD | Link Access Procedures on the D channel | specified in ITU-T Q.920 and ITU-T Q.921, is the second layer protocol on the ISDN protocol stack in the D channel. |
LAS | logical application structure | A structure of the application to be deployed that is made up of software definitions. |
laser | light amplification by stimulated emission of radiation | Analog transmission device in which a suitable active material is excited by an external stimulus to produce a narrow beam of coherent light that can be modulated into pulses to carry data. Networks based on laser technology are sometimes run over SONET. |
LASINT | laser intelligence | Technical and geolocation intelligence derived from laser systems; a subcategory of electro-optical intelligence. |
LAT | Local Address Table | A table containing the IP address range that is inside a firewalled network |
LATA | Local Access and Transport Area | Denotes a geographical area established for the provision and administration of communications service. It encompasses one or more designated exchanges, which are grouped to serve common social, economic, and other purposes. |
LBA | Logical Block Addressing | a method of accessing hard disk drives. It allows IDE disks larger than 504 megabytes (1024 cylinders) in size to be fully partitioned using the MS-DOS fdisk command. |
LBAC | label-based access control | A security mechanism that uses security labels to restrict user access to individual table rows and columns. |
LBS | Location-based service | Services or applications that center around a user’s location in a mobile environment. Services include finder applications that let mobile phone users locate friends or family, businesses or landmarks. |
LBG | load balancing group | A grouping of Fast Path input messages that are ready for balanced processing by one or more copies of a Fast Path program. |
LBO | line buildout | Abbreviation for line buildout. Synonym building out. |
LCC / LLCC | Leaded Chip Carrier / Leadless Chip Carrier | A square chip package with pin connectors on each side. a type of packaging for integrated circuits which has no "leads", but instead rounded pins through the edges of the ceramic package. |
LCC | Limited combustible cable | also called CMP-50 cable, is fire-resistant cable with insulation made of a synthetic material called fluorinated ethylene propylene (FEP). |
LCD | liquid crystal display | A low-powered, flat-panel display technology. LCD displays create images using liquid crystal molecules controlled by an electrical field. |
LCI | local component installer | In IBM Tivoli Kernel Services, the component that pulls and runs native code, shared libraries, and installation scripts that are needed for deploying components. |
LCM | Life Cycle Management | the management of the entire life of a program including the three typical phases: transition, transformation & end-state |
LCN | local communication network | A communication network within a TMN (telecommunications management network) that supports data communication functions (DCFs) normally at reference points q1 and q2. |
LCO | language context object | A context server object that mediates the routing of inbound customer interactions as well as the supply of outbound responses in a language-appropriate manner. |
LCOS | Liquid Crystal On Silicon | TV technology for flat screen displays; a technology that most major technology and equipment manufacturers have shunned after experimentation. |
LCP | Link Control Protocol | Part of the PPP to establish, configure, and test data link connections |
LCR | least cost routing Lifetime Clinical Record Line Concentration Ratio Local Continuous Replication |
Method for automatic selection of the least costly facility
for transmission of a call. Synonyms: Most Economical Route Selection
(MERS); Route Optimization; Automatic Route Selection; Flexible
Route Selection. A computer-based patient record system from Siemens Medical Solutions Health Services. LCR provides a longitudinal view of patients' lifetime clinical histories. A CO (Central Office) design and engineering term for the optimization of system capacity through the classic act of balancing cost and performance. Microsoft Exchange's ability to replicate locally between two disk volumes |
LCS | Liquid Cooling System Live Communications Server |
a type of cooling system in a computer, which consists of one or more
water blocks, a pump, a radiator, one or more fans, tubing, cooling
liquid, and may also include a reservoir and fittings. Microsoft collaboration infrastructure |
LD | Laser Disc | An optical disc which stores information that can be read by a laser beam. Laser discs can be used to store data, but are usually used for video and audio together. Laser discs come in 8" and 12" diameters. |
LDA | Local delivery agent | A mail service agent that transfers mail messages from incoming mail storage to the email recipient’s inbox. |
LDAP | Lightweight Directory Access Protocol |
If you want to make directory
information available over the Internet, this is the way to do it. LDAP
is a streamlined version of an earlier directory standard called
X.500. What makes LDAP so useful is that it works great over TCP/IP networks, so information can be accessed through LDAP by anyone with an Internet connection.
|
LDCM | LANDesk Client Manager | developed by Intel, is a management tool that constantly monitors networked personal computers and workstations for hardware problems. |
LDIF | LDAP Data Interchange Format | a file format that is widely used for building a database of directories that are stored on multiple servers, for adding large numbers of directories to a directory database, and for synchronizing the contents of those directories. The servers on which the directories are stored must support the LDAP protocol. |
LDM | limited distance modem | limited distance modem |
LDP | Label Distribution Protocol | A fundamental concept in MPLS is that two Label Switching Routers must agree on the meaning of the labels used to forward traffic between and through them |
LDPC | low-density parity-check code | an error-correcting code and a method of transmitting a message over a noisy transmission channel. |
LDR | Light Dependent Resistor | This is a special type of resistor and is sometimes called a photoconductor. LDRs are made so that their resistance decreases as the level of light falling on them increases. |
LDS | logical data stream | In bidirectional text representation, a stream of data that is organized in a readable sequence. |
LDT | Lightning Data Transfer (Bus) | An interconnection standard introduced by AMD that allows for fast data transfers among the Northbridge part of a chipset, the PCI bus(es), and the Southbridge part. |
LEAP | Lightweight Extensible Authentication Protocol | also known as Cisco-Wireless EAP, is a Cisco security technology that builds on Wi-Fi's WEP encryption. |
LED | light-emitting diode | A semiconductor that produces light when activated. |
LEED | Leadership in Energy and Environmental Design | LEED) consists of a suite of rating systems for the design, construction and operation of high performance. |
LEL | Link, Embed and Launch-to-edit | Lotus term |
LEO | Low Earth Orbit | the orbit between 700 and 2,000 kilometers above the Earth for Mobile communications satellite. |
LER | Label Edge Router | Converts IP packets into MPLS packets, and MPLS packets into IP packets. On the ingress side, the LER examines the incoming packet to determine whether the packet should be labeled. |
LF | Line Feed | Feeding the paper through the printer just far enough to print the next line. Also, a button or computer instruction that activates a line feed |
LFB | look-ahead-for-busy | Information concerning network resources available to support higher precedence calls. |
LFS | Linux From Scratch | Project that provides you with the steps necessary to build your own custom Linux system |
LGA | Land Grid Aray | also known as socket T,means that the pins are on the Motherboard, not the Processor. The Prescott is using the LGA 775 socket. |
LGPL | Lesser General Public License (GNU) | An evolution of the Library GNU |
LID | local identifier |
In distributed relational database, an identifier or short label that
is mapped by the environmental descriptors to a named resource. A 1-byte identifier assigned to parts of the data stream to facilitate PSF processing. |
LIDE | Light emitting diode In-Direct Exposure | Scanner technology by Canon |
LIFO | last in, first out | A type of message queuing that puts the last message received first in line. |
LINAC | Linear Accelerator | a particle accelerator commonly used for external beam radiation treatments of cancer patients. LINAc uses microwave technology to accelerate charged particles. |
Lion / Li-ion | Lithium-ion | a type of rechargeable battery widely used in portable computers. |
LION | Lower Indian Ocean Network | LION cable system |
LIP | Loop Initialization Process | The process by which a Fibre Channel arbitrated loop network initializes when started up, or recovers after a failure occurs or a new device appears on the network. |
LIPS | Logical Inferences Per Second | In artificial intelligence, the speed at which an application can process instructions. The human brain works at about 2 LIPS. |
LIS | Laboratory information system | a class of software which handles storing information generated by laboratory processes. These systems often must interface with instruments and other information systems such as HIS. |
Lisp | List Processor or List Processing | A programming language developed at MIT in the 1950s by John McCarthy. |
LKM | Loadable Kernel Modules | allow for the adding of additional functionality directly into the kernel while the system is running. |
LL | local loop | A generic term for the connection between the customer’s premises (home, office, etc.) and the provider’s serving central office |
LLC | Logical Link Control | IEEE 802.2 LAN protocol that specifies an implementation of the LLC sublayer of the data link layer. |
LLDP | Link Layer Discovery Protocol | LLDP is a vendor-neutral Layer 2 protocol that allows a network device to advertise its identity and capabilities on the local network. |
LLDP-MED | Link Layer Discovery Protocol-Media Endpoint Discovery | LLDP-MED is an enhancement to the LLDP that is designed to allow auto-discovery of LAN policies |
LLI | Low Latency Interrupts Lower Layer Interface |
allows latency-sensitive packets to be processed
with the lowest latency. Part of layer 7 with PROFIBUS, in which layer 7 services are mapped onto layer 2 services |
LLTD | Link Layer Topology Discovery | A feature that helps users to troubleshoot their networks. LLTD automatically detects multiple network devices and gives a graphical presentation of the connected hardware to identify configuration errors. |
LLU | local loop unbundling |
LLU is the process of allowing
competitive telecommunications operators to use the
twisted-pair telephone connections from the incumbent telephone
exchange's central office to the customer premises. This local
loop is owned by the ILEC.
|
LMA | Lightspeed Memory Architecture | nVidia term |
LMDS | Local Multipoint Distribution Services | This is a fixed point (non-mobile) wireless technology that operates in the 28 GHz band and offers line of sight coverage over distances up to 5 kilometers. It can deliver data and telephony services to 80,000 customers from a single node. |
LMP | Link Manager Protocol | a data link layer protocol in the Bluetooth protocol stack. LMP carries out link setup, authentication, link configuration and other protocols. |
LMPP | Lighttpd/MySQL/PHP/Python | A web application stack based upon lighttpd, MySQL, , and/or (compare to LAMP). |
LMS | Learning Management System | a software package, that enables the management and delivery of learning content and resources to students. Most LMS systems are web-based to facilitate "anytime, anywhere" access to learning content and administration. |
LNA | launch numerical aperture Low Noise Amplifier |
The numerical aperture of an optical system used to couple (launch) power into an optical fiber. a receiving preamplifier having very low internal noise characteristics placed very near the antenna of a receiver to capture the C/N before it can be further degraded by noise in the receiving system. |
LNIB | like new, in box | slightly used but supplied with original packaging |
LNO | Loop Nest Optimization | a special case of loop transformation which deals with nested loops that makes possible large reductions in the cache bandwidth necessary for some pervasive algorithms. |
LNP | Local Number Portability | Subscribers' ability to switch local or wireless carriers and still retain the same phone number, as is possible now with long-distance carriers. |
LNS | L2tp Network Server | Maintains L2TP sessions with whatever is connected to the LAC |
LOB | large object | A sequence of bytes with a size ranging from 0 bytes to 2 gigabytes less 1 byte. A data type used by databases for large objects. |
LOB | Line-of-Business | Used to refer to a business critical application, i.e. an application that is essential to the trading or survival of a business. Normally written as "LOB app" or "LOB application". |
LOC | Lines of Code | A measure of the size of a program. |
LOCK | local object creator and killer | In IBM Tivoli Kernel Services, the component that starts, monitors, stops, and restarts an ORB. |
LODA | Lombardi On-Demand Assistance | IBM Websphere On-Demand Delivery |
LOFS | LOopback File System | A file system type that lets the user create a new virtual file system. The user can access files using an alternative path name |
LOM | LAN On Motherboard | This is a network device that is built onto the motherboard (or baseboard) of the machine |
Loran | long-range radio navigation | A long-range radio navigation position-fixing system consisting of an array of fixed stations that transmit precisely synchronized signals to mobile receivers. |
LOS | Line of Sight Loss of signal |
describes an unobstructed radio path or link between the transmitting and receiving antennas of a communications system. a condition where the received signal drops below threshold due to a terrain obstruction or other phenomenon increasing the link budget loss beyond design parameters. |
LPA | Linear Power Amplifier link pack area |
The final amplification stage in a multicarrier transmitter that has been designed and optimized to produce a linear response. The portion of virtual storage below 16MB that contains frequently used modules. |
LPAR / LP | logical partition | A set of key or RID pairs in a nonpartitioning index that is associated with a particular partition. One or more subsets of a single system that contains hardware resources and operates as an independent system. In a partitioned database environment, a database partition server on a processor that has more than one database partition server assigned to it. A subset of the processor hardware that is defined to support an operating system. |
LPB | Low Ping Bastard | Network multiplayer games attribute |
LPC | Linear Predictive Coding Local Procedure Call |
a speech encoding scheme that uses periodic pulses to excite a filter, similar to the way human voice is produced. A mechanism that loops remote procedure call without the presence of a network so that the client and server portion of an application can reside on the same machine. |
LPD | line printer daemon |
The receiving portion, or target, of a file transfer that receives the
spooled file that was sent and places the file on a local output
queue. The printer server that allows other hosts to access its printer. |
LPDA | Link Problem Determination Aid | A series of procedures used by products to test modem or other DCE operations, and to provide information about the DCE and the data link. |
LPF | League for Programming Freedom Low-Pass Filter |
A nonprofit organization dedicated to "bringing back the freedom of
programmers to write programs," in the face of the recent trend toward
complicated copyright and patent lawsuits. http://www.lpf.org/ A signal filter which would be installed in a customer premises ADSL modem (ATU-R), which would not modify the low frequencies present in its input signal |
LPFM | low-power FM radio | A broadcast service that permits the licensing of 50- to 100-watt FM radio stations within a service radius of up to 3.5 miles and 1- to 10-watt FM radio stations within a service radius of 1 to 2 miles. |
LPI | lines per inch Linux Professional Insitute |
a measure of the resolution of a halftone screen Serves the community of Linux and open source software users vendors and developers, in the interest of increasing and supporting professional use of such software throughout world. See also http://www.lpi.org/ |
LPP | Land Pre-Pits | Addressing aid in writing DVD-R |
LPPL | Latex Project Public License | http://www.latex-project.org |
LPR | line printer requester | The sending portion, or client portion, of a spooled file transfer. A client that lets the local host submit a file for printing on a remote printer server. |
LPT | line print terminal | The designation for a parallel connection to a printer or other parallel device. |
LPTV | low-power television | A broadcast service that permits program broadcasting via television translators operating with low power. LPTV service includes the existing translator service and operates on a secondary basis to regular television stations. |
LPWA | Lucent Personalized Web Assistant | Anonymous web browsing service |
LPX | Low Profile eXtension / Extended | a motherboard form factor used for low-profile computer cases. LPX boards use a riser card arrangement for expansion cards, which means that installed expansion cards are parallel to the motherboard instead of perpendicular to it. |
LQA | link quality analysis | In adaptive high-frequency (HF) radio, the overall process by which measurements of signal quality are made, assessed, and analyzed. |
LQSR | Link Quality Source Routing | a routing protocol for wireless mesh networks. The protocol was developed by Microsoft for use with their MCL technology, which facilitates the interconnection of computers into a mesh network |
LR | Lightroom | Adobe Photoshop Lightroom is a photography software program developed by Adobe Systems for Mac OS X and Microsoft Windows, designed to assist professional photographers managing thousands of digital images, and do post production work. www.adobe.com/products/photoshoplightroom/ |
LRC | longitudinal redundancy check Loop Resiliency Circuit |
A system of error control based on the formation of a block check following preset rules. Hub circuitry that allows devices to be inserted into or removed from an active FC-AL loop. |
LRF | Little Rubber Feet | Support devices for computer cases and other equipments |
LRN | Location Routing Number | The ten-digit (NPA-NXX-XXXX) number assigned to a switch/POI used for routing in a permanent local number portability environment. |
LRU | least recently used | Pertaining to an algorithm used to identify and make available the cache space that contains the data that was least recently used. |
LS | Loop-Start Signaling | A type of switched access line signaling in which the network provides a battery source. To initiate a call, customer premise equipment will provide a loop closure that causes DC loop current to flow, which is detected by the network. |
LSA | Local Security Authority | The Local Security Authority is the service provided to manage local security, domain authentication, and Active Directory processes. The Security Accounts Manager, Net Logon and Protected Storage services run within the context of lsass.exe |
LSAP | Link Service Access Point | including both DSAP and SSAP, is the identifier field to indicate data types. |
LSAS | Local Security Authentication Server | Verifies validity of user logons to PC/Server. |
LSASS | Local Security Authority Subsystem Service | Provides an interface for managing local security, domain authentication, and Active Directory processes. The Security Accounts Manager, Net Logon and Protected Storage services are components of LSA |
LSB | Least Significant Bit | The bit of a binary number which is farthest to the right, indicating the number of ones; also designated as bit zero. |
LSH | Locality-Sensitive Hashing | an algorithm for solving the (approximate/exact) Near Neighbor Search in high dimensional spaces. |
LSI | Large Scale of Integration | IC manufacturing integration level: it's the process of placing from 3,000 to 100,000 transistors on one chip |
LSM | Linux Software Map Local Service Manager |
a standard text format for describing Linux software. LSM for a program
is a single text document, named software_package_name.lsm. In IBM Tivoli Kernel Services, a component that runs on each system that is part of the distributed system. |
LSP | License Service Provider | An Netware Loadable Module (NLM) that responds to requests from NLS clients and licensing service managers for licensing information or license units |
LSR | label switch router Leaf Setup Request Line Service Request Local Service Request |
The role of an LSR is to forward packets in an MPLS network by looking only at the fixed-length label. An ATM term. A setup message type used when a leaf node requests connection to existing point-to-multipoint connection or requests creation of a new multipoint connection. Document in the LEC world which is used for porting requests, directory listing changes, trunk ordering etc. A term that was spawned by the Telecommunications Act of 1996, which formalized competition in local telecommunications. A LSR is a form, or series of forms, used by a CLEC to request local service from the ILEC. |
LSR | local shared resource |
A file that shares a common pool of buffers and a common pool of
strings; that is, control blocks supporting I/O operations, with other
files. In the VSAM, a resource in the local resource pool. |
LSSGR | LATA Switching System Generic Requirements | Multi-volume set of Bellcore technical references dealing with basic switching requirements used by switch manufacturers, procurement staffs, planners, and switch technicians. |
LTC | line traffic coordinator | In a DDN switching center, the processor that controls traffic on a line. |
LTE | Lite Terminating Equipment Long-Term Evolution |
ATM
equipment terminating communications facility using SONET
Lite Transmission Convergence (TC) layer. Usually reserved for
end user or LAN equipment. next-generation network standard developed by the 3GPP as an evolution of today's 3G mobile networks. The standard, which relies on Internet Protocol end-to-end, aims to deliver higher capacity and greater throughput in a given cell, with maximum target speeds of 100 Mbps downstream and 50 Mbps upstream. |
LTF | Leap To Frogans | http://www.frogans.com/ |
LTM | Local Traffic Managers | F5 product to provide offloading of SSL, connections, compression; intelligent traffic management |
LTPA | Lightweight Third Party Authentication | An authentication framework that allows single sign-on across a set of Web servers that fall within an Internet domain. A protocol that uses cryptography to support security in a distributed environment. |
LTRAN | local transaction | A recoverable unit of work managed by a resource manager and not coordinated by an external transaction manager. In a multisystem environment, a transaction that is processed totally by the system in which it is defined. |
LTRS | Letters Shift | A code character used to command a Teletype - like device to perform a physical shift for alphabetic characters |
LTS | Leaning Toothpick Syndrome | Expresses readability in PERL regular expressions |
LU | Logical Unit | IBM's term for a logical node that is the user's "port" into a SNA network. LU 1 is a high-performance print and 3270 data stream. LU 6 enables host-to-host data exchange, and provides a peer-to-peer data stream. |
LU-LU | between two logical units | a session between two logical units (LUs) in an SNA network. It provides communication between two end users, or between an end user and an LU services component. |
LUF | lowest usable high frequency | The lowest frequency in the HF band at which the received field intensity is sufficient to provide the required signal-to-noise ratio for a specified time period, e.g., 0100 to 0200 UTC, on 90% of the undisturbed days of the month. |
LUN | logical unit number | A number used in a SCSI bus to identify a peripheral device (such as an attached storage system) |
LUNT | line unit network termination | The customer side of any DSL that does not terminate on the customer installation (CI). |
LUS | LookUp Service | Provides the functionality to discover and register services |
LUW | logical unit of work | The processing that a program performs between synchronization points. The work that occurs between the start of a transaction and commit or rollback and between subsequent commit and rollback actions. |
LVD | Low Voltage Differential | the Low Voltage Differential interface used in Ultra2 and Ultra3 SCSI. |
LVDS | Low Voltage Differential Signaling | a low noise, low power, low amplitude method for high-speed (gigabits per second) data transmission over copper wire. |
LVM | Logical Volume Manager Low Voltage Differential Signaling |
Provides a higher-level view of the disk storage on a
computer system than the traditional view of disks and
partitions. This gives the system administrator much more
flexibility in allocating storage to applications and users IBM term |
LVOL / LV | logical volume | A collection of physical partitions organized into logical partitions, all contained in a single volume group. The combined space on all volumes for either the database or the recovery log. The storage medium associated with a single logical unit (LU). |
LWL | long wavelength | A type of fiber-optic cabling that is based on 1300-mm lasers and supports link speeds of 1.0625 Gbps. |
LWP | light-weight process | means of achieving multitasking. In contrast to a user thread, which is handled at the application level, a light-weight process is scheduled by the kernel. |
LZH | Lempel-Ziv-Haruyasu | Compression algorithm with a sliding window and additional compression applied to the output of the LZSS compressor by dynamic Huffman coding |
LZW | Lempel Ziv Welch | a standard algorithm widely used for compression of data. |
landline | A telephone circuit that travels over land-based circuits | |
LANlord | The alpha geek responsible for an office's Local Area Network. | |
laptop | A portable PC, with system unit, screen and keyboard crammed into one small package. They can do pretty much everything a desktop PC can do, but are substantially more expensive because of the extra miniaturisation required. | |
last mile | The final leg in delivering connectivity in a telecommunications network. Often perceived as the most critical in terms of both service provision, cost and bandwidth. | |
Latency | The time interval during which a network station seeks access to a transmission channel and access is granted or received. | |
layer | In the OSI reference model, a layer is a collection of related network-processing functions that constitute one level of a hierarchy of functions. | |
Lazy evaluation | a computation optimization technique that attempts to delay computation of expressions until the results of the computation are known to be needed. | |
Leased Line | A private telephone line without inter-exchange switching arrangements. Also called Private Line and Dedicated Line | |
Legacy | Term used to describe enterprise applications or systems installed in the distant past, but still being used. Typically, they are characterized by outdated technologies, but are still critical to day-to-day operations. | |
a social networking site (www.linkedin.com) designed for business professionals to use for work contacts and communication. | ||
Linux (“Linus’ UNIX”) | A widely used Open Source Unix-like operating system. Linux was first released by its inventor Linus Torvalds in 1991. There are versions of Linux for almost every available type of computer hardware from desktop machines to IBM mainframes. | |
LISTSERV | a commercial software package for operating e-mail mailing lists and discussion groups, produced by L-Soft International (www.lsoft.com) | |
load balancing | In routing, the capability of a router to distribute traffic over all its network ports that are the same distance from the destination address. Good load-balancing algorithms use both line speed and reliability information. | |
lock | A data structure used to synchronize access to a shared resource. The most common use for a lock is in multithreaded programs where multiple threads need access to global data. | |
log | A record of a computer's or application's activity, used for system information, backup, and recovery. | |
Login | Noun or a verb. Noun: The account name used to gain access to a computer system. Not a secret (contrast with Password). Verb: the act of connecting to a computer system by giving your credentials (usually your "username" and "password") | |
Longhorn | internal code name used for Windows Vista (Windows 6.0) before its release. | |
lookup | searching a data structure for an item that satisfies some specified property. | |
loopback | A diagnostic test that returns the transmitted signal back to the sending device after it has passed through a network or across a particular link. The returned signal can then be compared to the transmitted one. The discrepancy between the two help to trace the fault. | |
lossy | If a process is lossy, it means that a little quality is lost when it is performed. If a format is lossy, it means that putting data into that format will cause some slight loss. Lossy processes and formats are typically used for performance or resource utilization reasons. | |
lurker | A user who does not participate in an online discussion (e.g., in a chat room), but merely observes the activity. | |
lyco s |
An Internet search engine (http://www.lycos.com/) created at Carnegie Mellon University.
|
Comments
Thankyou for wonderful article. It has more Information in Your Website
SAP Simple Logistics Online Access