Triplet Computers logo

CALL TODAY (603) 410-6770

Glossary

# - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

#

3G 

4G 

802.11a 

802.11b 

802.11g 

802.11n 

A

Access Point (AP)

ActiveX

Adapters

Advanced Web Services

Affective Computing

Algorithm

Analytical Hierarchy Process (AHP) 

Analytics

Answer Marketplace

API management

Applet

Appliances

Application Architecture (AA)

Application Clustering (software clustering)

Application Control

Application Delivery Controller (ADC)

Application Development (AD)

Application Infrastructure

Application Infrastructure Suite (AIS)

Application Integration 

Application Life Cycle Management Platform as a Service (ALM PaaS) 

Application Management 

Application Modernization Services 

Application Obfuscation 

Application Platform as a Service (aPaaS) 

Application Program 

Application Program Interface (API)

Application Release Automation (ARA)

Application Sandboxing

Application Server

Application Service Provider (ASP)

Application Sharing 

Application Software Services 

Application-Specific Integrated Circuit (ASIC) 

Application-Specific Standard Product (ASSP) 

Applications Outsourcing 

Applications Portfolio Analysis (APA) 

Architecture 

Archival Storage

Array-Based Replication

Artificial Intelligence (AI) 

Asynchronous Replication

Attenuation 

Audio Mining/Speech Analytics 

Authentication Service

Authentication Technologies

Authorization

Automated Backup 

Automated Business Process Discovery (ABPD) 

Automated System Operations (ASO) 

Automated Testing 

Automatic Content Recognition (ACR)

Automatic Restart

Automatic Storage Tiering (Auto-Tiering)

Autonomous System (AS)

Autonomous System Number (ASN)

Autonomous Vehicles

Availability

Avatar

B

B-tree

B2B Gateway Software

B2B Web Services

Back-End

Backbone

Backbone Network 

Backbone Router 

Backhaul 

Backplane 

Backup

Backup Log

Backup/Recovery Software 

Backup Storage

Backward Compatible (backward compatibility)

Backward Mapping

Band 

Bandwidth 

Bandwidth as Currency 

Bar Code Marketing 

Baseband 

Basic Input/Output System (BIOS) 

Battery Life

Baud 

Bayesian Filter

Bayesian Logic

Benchmarking 

Best-in-Class 

Beta Testing 

Bid 

Bidirectional Replication

Big Data

Big Data Analytics

Binary Tree

Biochips 

Bioinformatics 

Black Hat

Blade Servers 

Block Error Rate 

Blog 

Blu-ray

Bluetooth

Bluetooth 3.0 (BT3.0)

Bluetooth 4.0 (BT4.0)

Bluetooth Low Energy (LE)

Bookmark

Bottleneck

Brand Extension

Brand Service Company

Branded Content Management

Bring Your Own Device (BYOD)

Broadband

Broadband Wireless Access (BWA)

Brownout

Browser

Brute Force Cracking

Buffer

Bug

Bug Bounty Program

Build-Operate-Transfer

Bundling

Burn-in

Burst

Business Activity Monitoring (BAM)

Business Analytics

Business Continuity Management Planning (BCMP)

Business Continuity Planning (BCP)

Business Impact Analysis (BIA)

Business Intelligence (BI)

Business Intelligence (BI) Platforms

Business Intelligence (BI) Services

Business Pattern Recognition

Business Process

Business Process Analysis Tools

Business Process Automation (BPA)

Business Process management (BPM)

Business Process Management (BPM) Standards

Business Process Management Suites (BPMSs)

Business Process Modeling (BPM)

Business Process Outsourcing (BPO)

Business Process Utilities (BPUs)

Business Rule Engines (BRE)

Business Service Provider (BSP)

BYOA (bring your own apps)

BYOD Policy

BYON (bring your own network)

Byte Code

C

C (Programming Language)

C++ 

C-band 

Cable Service Provider 

Cache 

Caching Server 

Call Center 

Call Detail Recording (CDR) 

Call Processing

Caller ID

Campaign Management

Capacity Utilization

Captive Centers

Car Connectivity Consortium (CCC)

Carrier Frequency

Carrier Network Infrastructure (CNI)

Carrier System

Cascading Faults

cdma2000

Cell

Cell Site

Cell Splitting

Cellular Radio

Cellular to Wi-Fi Authentication

Centralized Backup

Certification Authority (CA) 

Channel 

Channel Analytics

Channel Bank 

Channel Capacity 

Channel Integration 

Character

Charge-Coupled Device (CCD) 

Checkpoint

Checksum

CIFS (Common Internet File System) 

CIM (Common Information Model) 

CIM (computer-integrated manufacturing) 

CIO (chief information officer) 

CIR (committed information rate) 

Circuit 

Circuit Board 

Circuit Grade 

Circuit Switching 

Circular Logging

CIRP (cyber incident response plan) 

CIRT (cyber incident response team) 

CISC (complex instruction set computer) 

CISSP (Certified Information Systems Security Professional) 

Citizen Developer 

CKO (chief knowledge officer) 

Cladding 

Clamshell 

Classless Inter-Domain Routing (CIDR) 

Clean Electricity

CLI (Common Language Infrastructure) 

Click-Through 

Clicks and Bricks 

Clickstream Analysis 

Client 

Client Appliance 

Client computing hardware services 

Client Management Tools

Client/Server

Clinical Data Repository (CDR)

Cloud Access Security Brokers (CASBs)

Cloud Advertising

Cloud Application Development (AD) Services 

Cloud Archive

Cloud Backup (online backup)

Cloud Communications Service Provider 

Cloud Computing 

Cloud Disaster Recovery (cloud DR)

Cloud Drive

Cloud Email 

Cloud Encryption Gateways 

Cloud Engineering 

Cloud File Sharing 

Cloud Management Platforms 

Cloud Printing Services (CPS) 

Cloud Security Gateways 

Cloud Service Elasticity 

Cloud Services Brokerage (CSB) 

Cloud Sourcing Deals Anatomy 

Cloud Storage API

Cloud Storage Infrastructure

Cloud-Based Grid Computing 

Cloudbursting 

Cluster Controller 

Clustered System 

Clustering 

CM (configuration management) 

CMNS (Connection Mode Network Service) 

CMOL (CMIP over LLC) 

CMOT (CMIP over TCP/IP) 

CNP (Certified Network Professional) 

CNS (converged network services) 

Coaxial Cable

Codec (coder/decoder)

Cognitive Radio

COL (Component Object Library)

COLD (computer output to laserdisc)

Cold Backup (offline backup)

Colocation (colo)

Column-Store Database Management System (DBMS)

COM (communications port) 

COM (Component Object Model) 

COM (computer output to microfilm or microfiche) 

Comanagement Processes 

Commerce Platform Servers 

Committed Access Rate (CAR) 

Commodity Computer

Common Access Card (CAC) 

Common Gateway Interface (CGI) 

Communications as a Service (CaaS) 

Community Cloud 

Compact Disc-ReWritable (CD-RW) 

Compandor

Competency Center

Compliance

Compliance (commercial)

Compliance (organizational)

Compliance (regulatory) 

Component 

Component-Based Development (CBD) 

Computational-Fluid-Dynamic (CFD) Analysis 

Computer Emergency Response Team (CERT) 

Computer-Aided Design and Drafting (CADD) 

Computer-Aided Engineering (CAE) 

Computer-Aided Manufacturing (CAM) 

Computer-Aided Software Engineering (CASE) 

Computer-Based Physician Order Entry (CPOE) 

Computer-Brain Interface 

Computing Appliance 

Computing Platform Products 

Concentrator 

Concurrent Backup 

Concurrent Database Restore 

Concurrent Use 

Conditioning

Conductor

Conficker

Configuration Auditing

Connect Time 

Connected Devices 

Connected Game Handhelds 

Connected Imaging Devices 

Connected Portable Media Players 

Connected Portable Media Players (PMPs) 

Connected Portable Navigation Devices (PNDs) 

Connection 

Connection Admission Control (CAC) 

Connection-Oriented Service 

Connectionless 

Connectionless Service 

Console 

Constant Bit Rate (CBR) 

Consumer Broadband Connections 

Consumer Broadband Services

Consumer Internet Services

Consumer Telematics

Consumer Telepresence

Consumer Voice Access Lines

Consumer Voice Services

Consumer Web Mashups

Consumer-Generated Media (CGM)

Consumerization

Contact Center

Contact Center Infrastructure

Contact Center System

Contact Center Workforce Optimization

Contact Database

Contactless Card

Contactless Payments

Content

Content Aggregation

Content Analytics

Content and Applications Service Provider 

Content Delivery Networks (CDNs) 

Content Management (CM) 

Content Optimization 

Content Provider 

Content, Communications and Collaboration 

Content-Aware Data Loss Prevention (DLP)

Contention

Continuous Controls Monitoring (CCM)

Continuous Data Protection (CDP)

Contract Life Cycle Management (CLM)

Control Character

Control Code

Control Objectives for Information and Related Technology (COBIT)

Converged Infrastructure

Convergent Charging

Conversational Media

Cookie

Cooling Management Systems

Cooperative Processing

Core Banking System 

Core Storage Management 

COS (class of service) 

Country Code 

CPA (comprehensive production architecture) 

CPC (collaborative product commerce) 

CPC (cost per click) 

CPE (customer premises equipment) 

CPE business DSL router with embedded DSL modem

CPE external stand-alone modem

CPE internal modem

CPI (continuous process improvement)

CPM (corporate performance management)

CPR (computer-based patient record)

CPR system

CPU (central processing unit)

CQI (continuous quality improvement)

Cracker

CRC (cyclic redundancy check)

Crisis/Incident Management (C/IM) Software

CRM printing

CRM publishing

Cross-Certification

Cross-Compiler

Cross-Modulation

Crowdsourcing

CRUD Cycle

CSD (circuit-switched data)

CSD (consolidated service desk)

CSP (communications service provider)

CSS (customer service and support)

CSU (channel service unit)

CSV (Cluster Shared Volumes)

CTI (computer-telephony integration)

CTO (chief technology officer)

CTR (click-through rate)

CTX (clear to send)

CU (compliance unit)

CUG (closed user group)

Current Loop

Custom Key Set

Customer Analytics

Customer Communications Management (CCM)

Customer Engagement Center (CEC)

Customer Information File (CIF)

Customer Relationship Management (CRM)

Customer Relationship Management (CRM) Analytics

Customer Self-Service and Support

Customized Network Management

Cyber Library

Cycle Time

D

D2D2C (disk-to-disk-to-cloud)

D2D2T (disk-to-disk-to-tape)

DAB (digital audio broadcasting) 

DAB+ (digital audio broadcasting plus) 

Daemon 

Daisy-Chaining 

DAP (Directory Access Protocol) 

DAP (Distributed Application Platform) 

Dark Backup

Dark Data 

Dark Data Center

Dark Fiber 

DAS (distributed antenna system) 

DAS (dual-attached station) 

DASD (direct-access storage device) 

DASH7 

Dashboards 

DAT (digital audiotape) 

DAT (dynamic address translation) 

Data Breach

Data Center 

Data Center Bridging (DCB) 

Data Center Chiller

Data Center Evaporative Cooling (swamp cooling)

Data Center Infrastructure Management (DCIM) 

Data Center Outsourcing (DCO) 

Data Center Storage Encryption 

Data Deduplication

Data Dependency Mapping 

Data Integration 

Data Loss Protection 

Data Mining 

Data Profiling 

Data Protection Management (DPM)

Data Quality Software as a Service (SaaS) 

Data Quality Tools 

Data Recovery

Data Replication 

Data Scientist 

Data Streaming

Data Synchronization 

Data Warehouse 

Data Wiping 

Data-Driven Marketing (DDM) 

Database Activity Monitoring (DAM) 

Database Appliances 

Database Audit and Protection (DAP) 

Database Design 

Database Encryption 

Database Mirroring

DBMS (database management system) 

DBMS Management 

DDBMS (distributed database management system) 

DDL (data definition language) 

DDoS  

Deal Sweet Spot Analysis 

Decoupled Architecture

Dedicated Server

Delegate  

Delegation

Demand Forecasting 

Demand Signal Repository (DSR)

Deployment 

Desktop Management

Desktop Outsourcing 

Desktop Virtualization 

Development and Integration Services 

Device Resource Management 

Device-Embedded Biometric Authentication 

DevOps 

Dictionary Attack

DIF (Data Interchange Format) 

Differential Backup

Digital 

Digital Cross-Connect (DXC) 

Digital Divide 

Digital Forensics 

Digital Loopback 

Digital Marketing 

Digital Modem 

Digital Network 

Digital Signature 

Digital Switching 

Digital Thick Wallet Solutions 

Digital Thin Wallet Solutions 

Digital Wallet 

Digital Watermarking 

Digitalization 

Digitize 

Direct Channel 

Direct Chip Cooling 

Directed Speech Recognition 

Directory Services 

Dirty Protocols 

Disaster Recovery (DR) 

Disaster Recovery as a Service (DRaaS)

Disciplined Multisourcing 

Discrete Manufacturing 

Discretionary Security Controls 

Discussion Database 

Disk Cloning

Disk Image

Disk Mirroring (RAID 1)

Distributed Computing 

Distributed Data Management 

Distributed Database 

Distributed Function 

Distributed Tape for Backup and Archiving 

Distributed Version Control System (DVCS) 

DNS 

DNS Client 

DNS Query 

DNS Zone 

DNSSEC 

Document Management (DM) 

Document Management Hardware Services 

DoJa (DoCoMo Java) 

Domain Controller

Domain Name 

DoS 

Downlink 

Download 

Downtime 

DRM (digital rights management) 

DRM (distributed resource management)

DRP (disaster recovery planning) 

DSL (digital subscriber line) 

DSL/residential/small-office gateway/router 

DTH (direct to home) 

Dual Mode

Dual-Band 

Dual-Band Network 

Dual-Layer Magnetic Tape

Dual Persona

Dual-View Displays 

Dumb Terminal 

Dye Sublimation 

Dynamic Application Security Testing (DAST) 

Dynamic Content 

Dynamic Data Masking (DDM) 

Dynamic Routing 

Dynamic Web Application Tools 

E

E-Book Readers (E-Readers) 

E-Discovery Software 

E-Learning 

E-Procurement 

E1 

Earth Station 

Electro Mobility (E-Mobility) 

Electronic Bill Presentment and Payment (EBPP) 

Electronic Coupons (E-Coupons) 

Electronic Customer Relationship Management (E-CRM) 

Electronic Data Capture (EDC) 

Electronic Forms (E-Forms) 

Electronic Health Record (EHR) 

Electronic Paper 

Electronic Prescribing (E-prescribing) 

Electronic Signature (e-Signature) 

Electronic Waste (E-Waste) 

Embedded Analytics 

Embedded Cellular Data 

Embedded Software and Electronics Design 

Emerging Data Protection Schemes 

Encapsulation 

Encoding and Decoding

Encryption 

Endpoint 

Endpoint Protection Platform (EPP) 

Endpoint Security Management

Enhanced Data Rates for Global Evolution (EDGE) 

Enhanced E-Books 

Enhanced Messaging Service (EMS) 

Enhanced Network Delivery 

Ensemble Interactions 

Ensemble Programming 

Enterprise Application Outsourcing (EAO) 

Enterprise Application Software 

Enterprise Applications 

Enterprise Architecture (EA) 

Enterprise Asset Management (EAM) 

Enterprise Content Management (ECM) 

Enterprise Context 

Enterprise Fraud Management (EFM) 

Enterprise Information Architecture (EIA) 

Enterprise Information Management (EIM) 

Enterprise MLC (eMLC)

Enterprise Mobile Communications Gateway (EMCG) 

Enterprise Portal (EP) 

Enterprise Risk Management (ERM) Applications 

Enterprise Security Intelligence (ESI) 

Enterprise Social Software 

Enterprise Solutions 

Enterprise Technology Architecture (ETA) 

Enterprise Unified Communications Infrastructure 

Enterprise-Class 

Enterprise-Grade 

Entitlement Management 

Entry-Level Smartphone 

Erasable Paper Printing Systems 

Ethernet 

Ethernet Services 

Ethical Hacker

Expert System 

Extensible Authentication Protocol (EAP) 

eXtensible Business Reporting Language (XBRL) 

eXtensible Markup Language (XML) 

eXtensible Stylesheet Language (XSL) 

eXtensible Stylesheet Language Transformations (XSLT) 

External Hard Drive

External Services Provider (ESP) 

External Social Software 

External Storage

Extranet 

Extreme Low-Energy Servers 

Eye Tracking 

F

Fabric Computing 

Fabric-Based Computing (FBC) 

Fabric-Based Infrastructure (FBI) 

Facebook Commerce (F-Commerce) 

Failback

Failover 

Fast-Packet Switching 

Fault Detection and Isolation 

Fault-Tolerant

FCC (Federal Communications Commission)

FDD (frequency division duplex) 

FDDI (Fiber Distributed Data Interface) 

Feature Smartphone 

Federated Identity Management 

Federated Search 

Femtocells 

FHMA (frequency-hopping multiple access) 

Fiber Optics 

Fibre Channel Over Ethernet (FCoE) 

Field Service Management Software 

File Server

File Sharing

Firecall 

Firewall 

First Generation (1G or analog) 

Fixed Wireless 

Fixed-Line Carrier

Flash Storage

Flexible Media and Conferencing Switching

Floating Gate

FM (facilities management) 

FM (frequency modulation) 

FMC (fixed-mobile convergence) 

Folksonomies (Social Tagging) 

Forensic Software 

Forward Lookup 

FP (function point) 

FPD (flat panel display) 

Framework 

Framing 

Fraud Detection 

Free Cooling (Economizers) 

Frequency 

Frequency Band 

Frequency Reuse 

FTP (File Transfer Protocol) 

FTTH (fiber to the home) 

FTTP (fiber to the premises) 

Fuel Cell 

Fully Qualified Domain Name 

Functional Programming Languages 

Fuzzy Logic

G

Gain Sharing 

GAN (generic access network) 

Gateway 

Gateway (transcoding) Server 

Geographic Information System (GIS) 

Geo-Replication

Geospatial Mashups 

Geothermal Cooling for Data Centers 

Global Delivery 

Global Positioning System (GPS) 

Glonass

Glyph

Google BigQuery

Google Hangouts

Google Voice

Granularity 

Greynet (or graynet)

Grid Computing

Grid Storage

Gross New Connections 

GSLB 

gTLD 

GUI (graphical user interface)

Gzip (GNU zip)

H

Hacker

Hackerazzi

Handwriting Recognition 

Happy Hour Virus

Hardware and Software Maintenance Services 

Hardware Clustering

Hardware Maintenance and Support Services 

HDML (handheld device markup language) 

Head-Mounted Displays (HMDs) 

Head-Up Displays (HUDs)

Heartbeat

Helium Hard Drive

Help Desk Management 

Heterogeneous Architecture

Heuristic

HI (healthcare infomediary) 

Hierarchical storage management and archive software 

High-Performance Computing (HPC) 

High-Speed Color Inkjet Printing 

HIPAA (Health Insurance Portability and Accountability Act) 

HIS 

Historian Software 

Hit 

HLR (home location register)

Home Health Monitoring

Home Server

Home-Area Network (HAN)

Host-Based Replication

Hosted PC Virtualization Software

Hosted Virtual Desktops (HVD)

Hot Backup (dynamic backup)

Hot Site and Cold Site

Hot Spot

HTML (Hypertext Markup Language)

HTML5

HTTP 2.0

Hub

Hybrid Cloud Computing

Hybrid Cloud Storage

Hybrid MPLS (Internet WAN)

Hybrid Storage Gateway Appliance

Hyperlink

Hyperprotocol

Hyperscale Computing

Hypertext

Hypervisor

I

I/O (input/output)

I/O bound

I/O channel

I/O Fencing (input/output fencing)

IAE (integrated applications environment)

IAM as a Service (IAMaaS)

iChat

IDEN (integrated digital enhanced network)

Identity and Access Intelligence

Identity and Access Management (IAM)

Identity-Aware Networks (IAN)

Identity-Proofing Services

IDL (Interface Definition Language)

IDM (Integrated Document Management)

IDN (Integrated Digital Network)

IDS (Internet Document Security)

IM (Information Management)

IM (Instant Messaging)

Image-Based Backup

Image Map

Image Recognition

IMAP (Internet Message Access Protocol)

IMS (IP multimedia subsystem)

IMSI (international mobile subscriber identity)

IMT-2000 (international mobile telecommunications-2000)

IMT-A (international mobile telecommunications advanced)

In-Rack Cooling

In-Row Cooling

Incident Management (IcM)

Incremental Backup

Industrialized IT Services

Information (knowledge) Assets

Information Architecture

Information Delivery

Information Dispersal Algorithms

Information Life Cycle Management (ILM)

Information Technology Infrastructure Library (ITIL)

Infrastructure as a Service (IaaS)

Infrastructure Software

Instant Messaging (IM or IM-ing or AIM)

Instruction Set Virtualization

Integrated Carrier

Integrated Software

Integration

Integration Appliances

Integration as a Service (IaaS)

Integration Brokerage (IB)

Integration Platform as a Service (iPaaS)

Intellectual Property

Intelligent Video

Internet

Internet Explorer Administration Kit (IEAK)

Internet of Things

Internet Protocol Television (IPTV)

Internet Protocol Version 6 (IPv6)

Internet Radio

Internet Telephony

Internet TV

Interoperability

Interoperable Storage Encryption

Intranet

Introspection

Inverse Mapping

IP (Internet Protocol)

IP address (Internet Protocol Address)

IP Centrex platforms

IP Datacasting

IP Extension Line

IP Multimedia Subsystem (IMS) 

IP Seat License 

IP telephony

IP-enabled PBX

IP-PBX

IP-Service Control Points

IP Storage

iPhone 

IRD (Integrated Receiver Decoder)

irDA (Infrared Data Association)

ISDN (Integrated Services Digital Network)

ISO (Internet Sales Outlet)

ISO 9000

ISP (Internet Service Provider)

ISV (Independent Software Vendor)

IT (Information Technology)

IT Asset Management (ITAM)

IT chargeback

IT Consulting

IT Consulting Services

IT Consumerization

IT Cost Optimization

IT Decision Support

IT Governance (ITG)

IT Industrialization

IT Infrastructure

IT Management

IT Management Services

IT Outsourcing

IT Risk

IT Service Desk (ITSD)

IT Services

IT Services Sourcing

IT Services Strategic Sourcing

IT Strategy

Iterative Query

IVR (Interactive Voice Response)

J

Java

Java Applet

Java ME (Java Platform, Micro Edition)

Java Platform AD Tools

Java Platform, Enterprise Edition (Java EE)

Java Servlet

JavaScript

John the Ripper

Jukebox

K

Ka-Band (Kurtz-above band)

Kernel

Kernel Panic

Keylogger

Key Performance Indicator (KPI)

Keystroke Dynamics

Ku-Band (Kurtz-under band)

L

L-band

LAN (local-area network)

LAN bridging

LAN-Free Backup

Laser

Laser Disk

Latency

LBS (location-based services)

LCD (liquid crystal display)

LDAP (Lightweight Directory Access Protocol)

LED (light-emitting diode)

Library

License

Life Span

Lights-Out Recovery Operations Management

Limited Disclosure Technology

Line

Line Balancing

Line Dot Matrix

Line Driver

Line Hit

Line Impact Dot Matrix

Line Inkjet

Line Load Control

Line Loading

Link Redundancy Level

Linux

Liquid Cooling

Liquid Crystal on Silicon (LCoS)

Liquid Submersion Cooling

LISP

Lithium Battery Backup

Lithium Iron Phosphate (LiFePO4) Batteries

Load Balancing

Load Forecasting

Local Modifications Memory

Local Multipoint Distribution Service

Local Number Portability

Local Positioning System

Location-Aware Applications

Location-Aware Technology

Location-Based Advertising (LBA)

Location-Based Marketing (LBM)

Logistics Network Planning

Loopback

Loosely Coupled Multiprocessing

Low Frequency

Low-Cost IT

LRC (longitudinal redundancy check)

LTE-A

LUN Masking

LUN Zoning

Lurker

M

M-business

M-commerce

Machine-to-Machine (M2M) Communications

Magnetic-Ink Character Recognition

Magneto-Optic

Magnetometer

Mainframe

Mainstream Notebook

Malware (malicious software)

Managed File Transfer (MFT)

Managed Network Services

Managed Object

Managed Print Services (MPS)

Managed Security Service Provider (MSSP)

Managed Service Provider (MSP)

Manufacturer

Manufacturing Execution System

MapReduce

Marketing Automation System

Marketing Service Providers (MSPs)

Mashup

Mashups

Master Data Management (MDM)

Media Access Control

Media Gateways

Media Objects

Media Tablet

Media-Embedded Merchandising (MEM)

Medical Management

Megaportal

Memory Management

Memory Management Unit (MMU)

Memory Overcommit

Memory Paging

Memristor

Mesh Network

Message Authentication

Message Authentication Code

Message Feedback

Message Format

Message Numbering

Message Passing

Message Queuing

Message Switching

Message Warehouse

Messaging

Messaging Application Programming Interface (MAPI)

Messaging Device

Messaging Hypertext Markup Language

Metadata

Metadata and Data Modeling Tools

Metadirectory

Metalanguage

Metrication

Micro Fuel Cells

Micro-marketplace

Microblogging

Microbrowser

Microcode

Microfilm

Microgrid

Microinverters

Microprocessor

Microsoft Certified Professional

Middleware

MiFi

Milliampere Hour (mAh)

Million Instructions per Second (MIPS)

Minimum Cell Rate

Minutes of use (MOUs)

Mobile Advertising

Mobile and Wireless Infrastructure Software Platforms

Mobile Application Manager (MAM)

Mobile Application Stores

Mobile Browsers

Mobile Centrex

Mobile Cloud Synchronization

Mobile Deep Packet Inspection (DPI)

Mobile Device Management (MDM)

Mobile Device Management Services (MDM Services)

Mobile DRM

Mobile Earth Station

Mobile High-Definition Link (MHL)

Mobile IM

Mobile IP

Mobile Middleware

Mobile Network

Mobile Payment

Mobile PC

Mobile PC ODMs

Mobile Portal

Mobile Satellite Service (MSS)

Mobile Social Networks

Mobile Transformers

Mobile TV

Mobile Virtual Network Enabler (MVNE)

Mobile Virtual Network Operator (MVNO)

Mobile Virtualization

Mobile Voice Over Internet Protocol (mVoIP)

Mobile Web Applications

Mobile Widgets

Mobile Wireless Local Loop (WLL)

Mobile-Network Operator

Mobile/Wireless Portal

Mobility Managed Services (MMS)

Modulation

Molecular Transistors

Money Clouds

Mouse

MPEG-4 Advanced Video Coding (AVC)

Multichannel Campaign Management

Multichannel Feedback Management

Multichannel Loyalty

Multichannel Multipoint Distribution Service

Multicore Processor

Multidimensional Database Management System

Multifunction Product

Multimedia

Multimedia Markup Language

Multimedia Messaging Service

Multimode Fiber

Multiple Input/Multiple Output

Multiple Instruction, Multiple Data

Multiplexing

Multipoint

Multipurpose Internet Messaging Extensions

Multitenancy

Multithreading

Multitouch

MX Record

N

N-Channel Metal-Oxide Semiconductor (NMOS)

Nameserver

Nanography

Nanomaterial Supercapacitors

Nanotube

NAP (network access point)

Narrowband Channels

NAS (network-attached storage)

Natural-Language Processing (NLP)

Natural-Language Understanding

NC (network computer)

NCCJ (native code compiler for Java)

NCOP (network code of practice)

NDC (networked data center)

NDF (network dynamic functionality)

Near Field Communication (NFC)

Net New Connections

Netbooks

Network

Network Access Control (NAC)

Network and System Management

Network Appliance

Network Computing

Network Configuration and Change Management (NCCM) Tools

Network Database

Network Fault Monitoring Tools

Network Intelligence (NI)

Network Interface Card

Network Inventory

Network Management

Network Management Center

Network on Chip (NoC)

Network Operating System

Network Outsourcing

Network Performance Monitoring Tools

Network Performance Tuning/Configuring Facilities

Network Redundancy

Network Scanning

Network Security

Network Security Silicon

Network Sharing

Network Topology

Network Virtual Terminal

Network Virtualization

Neural Net or Neural Network

Next-Generation Firewalls (NGFWs)

Next-Generation Network

Next-Generation Telematics Protocol (NGTP)

Nexus of Forces

NMT-F

No-Email Initiatives

Node

Node B

Noisy Data

Noisy Text

Nomadic Wireless

Non-Cable Consumer Fixed Broadband

Notebook

O

OASIS

Object Transaction Monitor

Object-Based Middleware

Object-Based Technologies

Object-Oriented Database Management System

Object-Oriented Programming

Object-Oriented Technology

Occam Process

ODP (on-device portal)

Offshore Programming

Olfactory Interfaces

On-Device Monitoring

OneAPI

Online Backup

Open API

OpenFlow

Open Networking Foundation (ONF)

Online Complex Processing

Online Transaction Processing

Open Compute Project

Open Mobile Alliance

Open Rack

Open Source

Operating System

Operational Data Store

Operational Technology (OT)

Operations Services

Operations Support System

Opportunity Management System

Optical Network (photonic network)

Optical Transport

Option Analysis

Order Management

Organic Light-Emitting Diode (OLED)

Original Equipment Manufacturer

OSI Management

Outage Management System (OMS)

Over the Air

Overlay

P

Packet Switching

Packet-Switched Network

PACS (personal access communication services)

Page

Paging

Paper Size

Parallel Network File System (pNFS)

Parallel Processing Software

Partitioning Code

Partner Customer Support Software

Partner Relationship Management (PRM)

Password

Password Blacklist

Password Cracker

Password Entropy

Password Hardening

Password Strength Meter

Patch (fix)

Patch Management

PBX (private branch exchange)

PC Virtual Software Appliance

PCI DSS

PCU (packet control unit)

PDA (personal digital assistant)

PDC (personal digital cellular)

PDE (partial document encryption)

PDM (product data management)

Penetration Rate (mobile)

Penetration Testing

Personal Cloud

Phase-Change Cooling

Phase Change Memory (PCM)

Phasor Measurement Units (PMUs)

PHS (personal HandyPhone system)

Pico Projector

Picocell

PIM (personal information manager)

Pixel

Plain Old XML (POX)

Platform as a Service (PaaS)

Platform-Independent

PLC (programmable logic controller)

Podcast

Podcasting

Point to Point

Polymer Memory

POP (point of presence)

Portable Flash Media for Content Distribution

Portable Storage Device Control

Portable Wireless

Portal

Portal Fabric

Portal-Enabling Middleware

Porting

POS (point of sale)

Power Adaptive Algorithms

Power Distribution Unit (PDU)

Predictive Technology

Presence

Primary DNS

Print Markets and Management Hardware

Printed Semiconductors

Private Cloud Computing

Private Key

Problem Management

Procurement Applications

Procurement Network

Product Analytics

Product Catalog

Product Configurators

Production Devices

Project Management

Project Management Office (PMO)

Proprietary Software

Protocol

Protocol Conversion

Protocol Stack

Protocol-Transparent

Provisioning

Proxy Agent

Proxy Servers

PTR (peak transaction rate)

PTR Records

PTT PoC (push-to-talk over cellular)

Public Cloud Computing

Push Technology

Pwn

PX (private exchange)

Q

QA (quality assurance)

QAM (quadrature amplitude modulation)

QoS (quality of service)

QPS

Quad-Band

Quality of Storage Service

Quantum Computer

Quantum Dot Displays

Quick Response Codes (QR Codes)

R

R-UIM (removable user identity module)

RAAD (rapid architected application development)

Rack

Rack Density

Rack Mount

Rack Unit (RU)

RAD (rapid application development)

Radio-Frequency Identification (RFID)

RAID (redundant array of independent disks)

RAS (reliability, availability and serviceability)

Raw Data (source data or atomic data)

RDBMS (relational database management system)

RDM (requirements definition and management)

Real Time

Receiver Sensitivity

Reconfigurable Optical Add/Drop Multiplexers (ROADMs)

Records Management (RM)

Recovery

Recovery Point Objective (RPO)

Recovery Time Objective (RTO)

Recursive Query

Recursive Resolver

Redaction

Redaction Tools

Redundancy

Registry

Regulatory Compliance

Remote Backup Appliance

Remote Data Backup

Remote Desktop

Remote Diagnostics

Remote Replication

Removable Media

Removable Modules

Replication

Repository

Response Time

REST (representational state transfer)

Restore

Retail Digital Signage

Retail Execution and Monitoring

Retail Sales

Retirements

Reusable Analog Intellectual Property (IP)

Reuse

Revenue

Revenue Assurance

Reverse lookup

RFID reader

RFID tags

Rich Communication Suite (RCS)

RISC (reduced instruction set computer)

RM (relationship manager)

RNC (radio network controller)

Roaming

ROIT (return on information technology)

Root

Rotary Heat Exchanger (Kyoto Wheel)

Round Robin

RSA (rural service area)

Rsync

RTT (round-trip time)

RTTM

Runtime Application Self-Protection (RASP)

S

S-band

Sales Analytics

SAM (software asset management)

SAN (storage area network)

Satellite Broadcasting Operator

Satellite Communications

Satellite Communications Operator

Satellite Computer

Satellite Dish

Satellite Navigation Solutions

Satellite Navigation Systems

Satellite Phone (satphone)

SAX (Simple API for XML)

Scanner

Scattering

SCM (software configuration management)

SCPC (single channel per carrier)

SCR (sustainable cell rate)

Scrambler

Screen Popping

Screen Sharing

Screening

Scriptless Testing

SDK (software development kit)

SDSL (symmetric digital subscriber line)

Search Engine

Search-Based Data Discovery Tools

Secondary Channel

Secondary DNS

Secondary Station

Secondary Storage

Secret Key

Secret-Key Cryptography

Secure Web Gateway

Security as a Service (SaaS)

Security Information and Event Management (SIEM)

Security Information and Event Management Software

Selective Sourcing

Selector

Self-Describing Messages

Self-Relocating Program

Self-Test and Fault Isolation

Semi-Mobile Wireless

Serial Dot Matrix

Serial Inkjet

Serial Interface

Serial Transmission

Server

Server Appliance

Server Virtualization Infrastructure

Server Virtualization Management

Serverless Backup

Serverless Printing

Service Bureau

Service Catalog

Service Desk

Service Inventory

Service Provider Routers and Switches

Service-Oriented Architecture (SOA)

Serving Area

Servlet

Session Border Controllers

Session Initiation Protocol (SIP)

SFA (sales force automation)

SFDR (software failure detection and recovery)

Shadow/Mirror Databases

Shared Services or Shared Services Center

Shim

Shoeshining

Short Message Service (SMS)

Shrink-Wrapped

SI (system integrator)

Sideband

Signature

Signature Verification

Silicon Anode Batteries

SIM card (subscriber identity module)

SIM toolkit (SIM application toolkit)

SIMD (single instruction, multiple data)

SIMM (single in-line memory module)

Simulation

Single Sign-On (SSO)

Single-Image Mode

Single Level Cell (SLC) Flash

Single-Mode Fiber

Single-Pass Device

Sink

SIO (strategic information office)

Skinless Servers

Skinput (Bioacoustic Sensing)

SKU (stock-keeping unit)

SLA (service-level agreement)

SLED (single large expensive disk)

SLM (service-level management)

SLM (software license management)

SLO (service-level objective)

SMA (service management agreement)

Small and Midsize Business (SMB)

Smart Antenna

Smart Card

Smart Grid

Smart Terminal

Smartphone

SME (small-to-midsize enterprise)

SMFP (smart MFP)

SMP (symmetric multiprocessing)

SMR (specialized mobile radio)

SMS (system-managed storage)

SMTP (Simple Mail Transfer Protocol)

Sniffer

SNMP (Simple Network Management Protocol)

SoA Record

SOAP (Simple Object Access Protocol)

SOC (software oversight committee)

Social Analytics

Social Computing

Social Content

Social CRM

Social Feedback

Social Gaming

Social Media

Social Media Tools

Social Network Analysis (SNA)

Social Networking

Social Networking Sites

Social Profile

Social Profiles

Social Publishing

Social Search

Social Tagging (Folksonomy)

Social Technologies

Social Web

Socialcasting

Sockets

Softswitch Architecture

Softswitches

Software as a Service (SaaS)

Software Development

Software Maintenance

Software Support Services

Software-Defined Networks

Software-Defined Radio (SDR)

SOHO (small office/home office)

Solid-State Appliances

Solution

Solution Architecture

Solution Portfolio

SONET (Synchronous Optical Network)

Source Deduplication

Source Encoding

Source Routing

Source Traffic Descriptor

SP (service pack)

Space Segment

Spaghetti Chart

Spam

Spam Filter

Spamdexing

Spectrum

Spectrum Harmonization

Speech Circuit

Speech Recognition

SPF (Shortest Path First)

Spider

Splay Tree

Spoofing

Spread Spectrum

Spyware

SQL (Structured Query Language)

SSL (Secure Sockets Layer)

SSN (switched service network)

SSP (service switching point)

SSP (storage service provider)

SSPC (structure, scripting, populating and channel outputs)

Standard

Standards

Static Application Security Testing (SAST)

Statistical Multiplexing

Stickiness

STM (synchronous transfer mode)

Storage

Storage Appliance

Storage Management Software

Storage Medium

Storage Resource Management (SRM)

Storage Snapshot

Storage Subsystem Hardware Services

Storage Support Services

Store-and-Forward Voice

Streaming

Strong Password

Subnet

Subnet Mask

Subnet Number

Subscriber

Subversion

Super Wi-Fi

Superserver

Supply Chain Management (SCM)

Supply Chain Segmentation

Surface Computers

SVG interface (Scalable Vector Graphics interface)

SVGA (Super Video Graphics Array)

SWAP (Simple Workflow Access Protocol)

Swap File (swap space or pagefile)

Switch

Switch-Based Storage Virtualization

Switched Line

Switched Network

Switching

Switching Center

Switchover

Symbian

Synchronization

Synchronous

Synchronous Communications

Synchronous Network

Synchronous Replication

Synchronous Transmission

SyncML (Synchronization Markup Language)

Syntax

System Integration

System Management

System Restore

System Tray

T

Table Driven

TACS (total access communications system)

Tag Management

Tape

Tape Drive

TCP (Transmission Control Protocol)

TCP/IP (Transmission Control Protocol/Internet Protocol)

TDMA (time division multiple access)

TDR (time domain reflectometry)

Telco

Telecom Analytics

Telecom Equipment Support Services 

Telecommunications Carrier

Telecommunications Equipment

Telecommunications Services

Teledensity

Telematics

Telephony-Centric UC Approach

Tera-architectures

TERM (technology-enabled relationship management)

Terminal

Terminal Emulation

Test Data Generator

Tethered Remote Access

Tethering

Texel (texture element)

Text Analytics

Text Mining

Text Retrieval

Texture mapping

Thermal Printing

Thermal Transfer

Thin Client

Thin Provisioning

Three-Schema Architecture 

Through-Silicon Vias (TSVs)

Throughput

Time Division Multiplexing (TDM)

Time Out

TLD

TLM (technical license management)

TLP (transmission-level point)

TLS (transport layer security)

TMG (trunk media gateways)

Tokenization

Total Connections

Total Cost of Ownership (TCO)

Total IPTV Subscribers

Touch-Sensitive

Touchpoint

Traffic Management

Transceiver

Transducer

Transfer Rate

Translator

Transparency

Transponder

Tree Structure

Trojan horse

Trouble Ticket

True Color

TTL

Tuning

Tunneling

TXT Records

U

Ultra-High-Speed Broadband Internet

Ultrabook

Ultracapacitors

Unicast

Unified Threat Management (UTM)

Ultracapacitors

Unicast

Unified Threat Management (UTM)

Unstructured Data

Uptime/Downtime

URL (uniform resource locator)

User Authentication Technologies

User Experience Platforms (UXP)

User Provisioning

V

Value-Added Network (VAN)

Value-Added Reseller (VAR)

Value-Added Service (VAS)

Value-Adding

ValueOps

Vapor Cooling

Variable Bit Rate (VBR)

VBScript

Vector Graphics

Vendor

Vendor Management

Vendor Revenue

Vendor Risk Management (VRM)

Vendor-Neutral

Versatile Authentication Server and Service (VAS)

Very High-Speed Digital Subscriber Lines (VDSL)

Very Large-Scale Integration (VLSI)

Very Small Aperture Terminal (VSAT)

Video on Demand (VOD)

Video Telepresence

Videoconferencing

Virtual Assistant (VA)

Virtual Channel (VC)

Virtual Desktop Infrastructure (VDI)

Virtual Floppy Disk

Virtual Hard Disk (VHD)

Virtual Hosting

Virtual LAN (VLAN)

Virtual Machine (VM)

Virtual Matrix Organization

Virtual Memory

Virtual Network Operator (VNO)

Virtual Private Network (VPN)

Virtual Reality (VR)

Virtual Reality Modeling Language (VRML)

Virtual SAN Appliance (VSA)

Virtual Server

Virtual Server Backup

Virtual Server Facility (VSF)

Virtual Switch

Virtual Tape Library (VTL)

Virtualization

Virtualization Software

Virus

Visitor Location Register (VLR)

Visual Basic (VB)

Visual Basic Extension (VBX)

Visual Basic for Applications (VBA)

Visual Studio (VS)

Visualization

VMware Backup

Voice Application Servers

Voice Browser

Voice Encryption

Voice Endpoint

Voice Mail

Voice of the Customer (VoC)

Voice over Internet Protocol (VoIP)

Voice Over Wireless LAN (VoWLAN)

Voice Portal

Voice Response System (VRS)

Voice Response Unit (VRU)

Voice Switching, Control and Applications (VSCA)

Voice-Enabled Residential/Small-Office Gateway/Router with Embedded DSL Modem (xDSL IAD)

VoiceXML

Volumetric Displays

VSS-Based Backup

Vulnerability Management

W

W3C (World Wide Web Consortium)

Wafer

WAG (wireless application gateway)

Walled Garden

WAN (wide-area network)

WAN Clustering

WAN performance monitor

WAN replacement

WAP (Wireless Application Protocol)

WAP browser

WASP (wireless application service provider)

WCDMA (wideband code division multiple access)

WDP (Wireless Datagram Protocol)

Weak or Strong Signal

Wearable Computer

Weave

Web

Web 2.0

Web Access Management (WAM)

Web Analytics

Web ATM

Web Authorization Management (WAM)

Web Books

Web Content Management (WCM)

Web Crawler

Web E-mail

Web Hosting

Web Integration Servers

Web Phone

Web Server

Web Services

Web Services Software

Web TV

Web Widgets

Web-enabled

Web-Oriented Architecture (WOA)

Website

Website Experience Analytics

WECA (Wireless Ethernet Compatibility Alliance)

WEP (wired equivalent privacy)

WfM (Wired for Management)

White Hat

Wi-Fi (wireless fidelity)

Wi-Fi Alliance

Wi-Fi Mesh

Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access 2 (WPA2)

WiBro (wireless broadband)

Wide-Area Network Optimization Controllers (WOCs)

WiGig

WiHD (wireless HD)

Wiki

WIM (WAP identity module)

WiMAX (Worldwide Interoperability for Microwave Access)

WiMedia Alliance

Windowing

Windows CE

Windows Client

Windows Live Messenger

Windows Remote Desktop

Wipe

Wireless Data Communication

Wireless Intrusion Prevention System (WIPS)

Wireless Local-Area Network (WLAN)

Wireless Power

Wiretap Trojan

Work Management

Workflow Management

Workload

Workstations

World Wide Web Consortium (W3C)

Worm

Write Back

Write Through

X

x and y coordinates

X Windows

XML (Extensible Markup Language)

Z

Zero-Latency Enterprise (ZLE)

ZigBee

does viagra work better than viagra The target volume is analyzed with superimposed us beam paths in all three planes ( figure 7 ). elsstl.com/bqo-184397/ Lifescript does not recommend or endorse any specific tests, physicians, third-party products, procedures, opinions, or other information mentioned on the site. Drug treatments gnrh analogues a group of drugs, called gnrh analogues, reduce oestrogen levels in your body and, as a result, cause fibroids to shrink. Disclaimer: all material available on ehealthme. A comparative analysis of pregnancy course with and without myoma involvement z geburtshilfe neonatol. can use viagra recreationally http://ninelives.com.au/epd-182472/ Drug treatments gnrh analogues a group of drugs, called gnrh analogues, reduce oestrogen levels in your body and, as a result, cause fibroids to shrink. , 2001b ahmad et al. prescription viagra for women A comparative analysis of pregnancy course with and without myoma involvement z geburtshilfe neonatol. 100mg viagra how long does it last viagra que es Privacy policy sitemap hours emergency contact this site requires javascript to be enabled for many of it's navigational features. For the most part, fibroids stop growing or shrink after menopause. http://santanselmo.com/carson/swinger.php?gwx=180226 The option i chose for myself after all the research i did (and i now know more about fibroids than my gp) was a uae, a uterine artery embolisation. viagra for daily use online viagra women antidepressants This review summarises the effects of mifepristone treatment on fibroids and the associated adverse effects as described in randomised controlled trials.