Glossary # - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z # 3G 4G 802.11a 802.11b 802.11g 802.11n A Access Point (AP) ActiveX Adapters Advanced Web Services Affective Computing Algorithm Analytical Hierarchy Process (AHP) Analytics Answer Marketplace API management Applet Appliances Application Architecture (AA) Application Clustering (software clustering) Application Control Application Delivery Controller (ADC) Application Development (AD) Application Infrastructure Application Infrastructure Suite (AIS) Application Integration Application Life Cycle Management Platform as a Service (ALM PaaS) Application Management Application Modernization Services Application Obfuscation Application Platform as a Service (aPaaS) Application Program Application Program Interface (API) Application Release Automation (ARA) Application Sandboxing Application Server Application Service Provider (ASP) Application Sharing Application Software Services Application-Specific Integrated Circuit (ASIC) Application-Specific Standard Product (ASSP) Applications Outsourcing Applications Portfolio Analysis (APA) Architecture Archival Storage Array-Based Replication Artificial Intelligence (AI) Asynchronous Replication Attenuation Audio Mining/Speech Analytics Authentication Service Authentication Technologies Authorization Automated Backup Automated Business Process Discovery (ABPD) Automated System Operations (ASO) Automated Testing Automatic Content Recognition (ACR) Automatic Restart Automatic Storage Tiering (Auto-Tiering) Autonomous System (AS) Autonomous System Number (ASN) Autonomous Vehicles Availability Avatar B B-tree B2B Gateway Software B2B Web Services Back-End Backbone Backbone Network Backbone Router Backhaul Backplane Backup Backup Log Backup/Recovery Software Backup Storage Backward Compatible (backward compatibility) Backward Mapping Band Bandwidth Bandwidth as Currency Bar Code Marketing Baseband Basic Input/Output System (BIOS) Battery Life Baud Bayesian Filter Bayesian Logic Benchmarking Best-in-Class Beta Testing Bid Bidirectional Replication Big Data Big Data Analytics Binary Tree Biochips Bioinformatics Black Hat Blade Servers Block Error Rate Blog Blu-ray Bluetooth Bluetooth 3.0 (BT3.0) Bluetooth 4.0 (BT4.0) Bluetooth Low Energy (LE) Bookmark Bottleneck Brand Extension Brand Service Company Branded Content Management Bring Your Own Device (BYOD) Broadband Broadband Wireless Access (BWA) Brownout Browser Brute Force Cracking Buffer Bug Bug Bounty Program Build-Operate-Transfer Bundling Burn-in Burst Business Activity Monitoring (BAM) Business Analytics Business Continuity Management Planning (BCMP) Business Continuity Planning (BCP) Business Impact Analysis (BIA) Business Intelligence (BI) Business Intelligence (BI) Platforms Business Intelligence (BI) Services Business Pattern Recognition Business Process Business Process Analysis Tools Business Process Automation (BPA) Business Process management (BPM) Business Process Management (BPM) Standards Business Process Management Suites (BPMSs) Business Process Modeling (BPM) Business Process Outsourcing (BPO) Business Process Utilities (BPUs) Business Rule Engines (BRE) Business Service Provider (BSP) BYOA (bring your own apps) BYOD Policy BYON (bring your own network) Byte Code C C (Programming Language) C++ C-band Cable Service Provider Cache Caching Server Call Center Call Detail Recording (CDR) Call Processing Caller ID Campaign Management Capacity Utilization Captive Centers Car Connectivity Consortium (CCC) Carrier Frequency Carrier Network Infrastructure (CNI) Carrier System Cascading Faults cdma2000 Cell Cell Site Cell Splitting Cellular Radio Cellular to Wi-Fi Authentication Centralized Backup Certification Authority (CA) Channel Channel Analytics Channel Bank Channel Capacity Channel Integration Character Charge-Coupled Device (CCD) Checkpoint Checksum CIFS (Common Internet File System) CIM (Common Information Model) CIM (computer-integrated manufacturing) CIO (chief information officer) CIR (committed information rate) Circuit Circuit Board Circuit Grade Circuit Switching Circular Logging CIRP (cyber incident response plan) CIRT (cyber incident response team) CISC (complex instruction set computer) CISSP (Certified Information Systems Security Professional) Citizen Developer CKO (chief knowledge officer) Cladding Clamshell Classless Inter-Domain Routing (CIDR) Clean Electricity CLI (Common Language Infrastructure) Click-Through Clicks and Bricks Clickstream Analysis Client Client Appliance Client computing hardware services Client Management Tools Client/Server Clinical Data Repository (CDR) Cloud Access Security Brokers (CASBs) Cloud Advertising Cloud Application Development (AD) Services Cloud Archive Cloud Backup (online backup) Cloud Communications Service Provider Cloud Computing Cloud Disaster Recovery (cloud DR) Cloud Drive Cloud Email Cloud Encryption Gateways Cloud Engineering Cloud File Sharing Cloud Management Platforms Cloud Printing Services (CPS) Cloud Security Gateways Cloud Service Elasticity Cloud Services Brokerage (CSB) Cloud Sourcing Deals Anatomy Cloud Storage API Cloud Storage Infrastructure Cloud-Based Grid Computing Cloudbursting Cluster Controller Clustered System Clustering CM (configuration management) CMNS (Connection Mode Network Service) CMOL (CMIP over LLC) CMOT (CMIP over TCP/IP) CNP (Certified Network Professional) CNS (converged network services) Coaxial Cable Codec (coder/decoder) Cognitive Radio COL (Component Object Library) COLD (computer output to laserdisc) Cold Backup (offline backup) Colocation (colo) Column-Store Database Management System (DBMS) COM (communications port) COM (Component Object Model) COM (computer output to microfilm or microfiche) Comanagement Processes Commerce Platform Servers Committed Access Rate (CAR) Commodity Computer Common Access Card (CAC) Common Gateway Interface (CGI) Communications as a Service (CaaS) Community Cloud Compact Disc-ReWritable (CD-RW) Compandor Competency Center Compliance Compliance (commercial) Compliance (organizational) Compliance (regulatory) Component Component-Based Development (CBD) Computational-Fluid-Dynamic (CFD) Analysis Computer Emergency Response Team (CERT) Computer-Aided Design and Drafting (CADD) Computer-Aided Engineering (CAE) Computer-Aided Manufacturing (CAM) Computer-Aided Software Engineering (CASE) Computer-Based Physician Order Entry (CPOE) Computer-Brain Interface Computing Appliance Computing Platform Products Concentrator Concurrent Backup Concurrent Database Restore Concurrent Use Conditioning Conductor Conficker Configuration Auditing Connect Time Connected Devices Connected Game Handhelds Connected Imaging Devices Connected Portable Media Players Connected Portable Media Players (PMPs) Connected Portable Navigation Devices (PNDs) Connection Connection Admission Control (CAC) Connection-Oriented Service Connectionless Connectionless Service Console Constant Bit Rate (CBR) Consumer Broadband Connections Consumer Broadband Services Consumer Internet Services Consumer Telematics Consumer Telepresence Consumer Voice Access Lines Consumer Voice Services Consumer Web Mashups Consumer-Generated Media (CGM) Consumerization Contact Center Contact Center Infrastructure Contact Center System Contact Center Workforce Optimization Contact Database Contactless Card Contactless Payments Content Content Aggregation Content Analytics Content and Applications Service Provider Content Delivery Networks (CDNs) Content Management (CM) Content Optimization Content Provider Content, Communications and Collaboration Content-Aware Data Loss Prevention (DLP) Contention Continuous Controls Monitoring (CCM) Continuous Data Protection (CDP) Contract Life Cycle Management (CLM) Control Character Control Code Control Objectives for Information and Related Technology (COBIT) Converged Infrastructure Convergent Charging Conversational Media Cookie Cooling Management Systems Cooperative Processing Core Banking System Core Storage Management COS (class of service) Country Code CPA (comprehensive production architecture) CPC (collaborative product commerce) CPC (cost per click) CPE (customer premises equipment) CPE business DSL router with embedded DSL modem CPE external stand-alone modem CPE internal modem CPI (continuous process improvement) CPM (corporate performance management) CPR (computer-based patient record) CPR system CPU (central processing unit) CQI (continuous quality improvement) Cracker CRC (cyclic redundancy check) Crisis/Incident Management (C/IM) Software CRM printing CRM publishing Cross-Certification Cross-Compiler Cross-Modulation Crowdsourcing CRUD Cycle CSD (circuit-switched data) CSD (consolidated service desk) CSP (communications service provider) CSS (customer service and support) CSU (channel service unit) CSV (Cluster Shared Volumes) CTI (computer-telephony integration) CTO (chief technology officer) CTR (click-through rate) CTX (clear to send) CU (compliance unit) CUG (closed user group) Current Loop Custom Key Set Customer Analytics Customer Communications Management (CCM) Customer Engagement Center (CEC) Customer Information File (CIF) Customer Relationship Management (CRM) Customer Relationship Management (CRM) Analytics Customer Self-Service and Support Customized Network Management Cyber Library Cycle Time D D2D2C (disk-to-disk-to-cloud) D2D2T (disk-to-disk-to-tape) DAB (digital audio broadcasting) DAB+ (digital audio broadcasting plus) Daemon Daisy-Chaining DAP (Directory Access Protocol) DAP (Distributed Application Platform) Dark Backup Dark Data Dark Data Center Dark Fiber DAS (distributed antenna system) DAS (dual-attached station) DASD (direct-access storage device) DASH7 Dashboards DAT (digital audiotape) DAT (dynamic address translation) Data Breach Data Center Data Center Bridging (DCB) Data Center Chiller Data Center Evaporative Cooling (swamp cooling) Data Center Infrastructure Management (DCIM) Data Center Outsourcing (DCO) Data Center Storage Encryption Data Deduplication Data Dependency Mapping Data Integration Data Loss Protection Data Mining Data Profiling Data Protection Management (DPM) Data Quality Software as a Service (SaaS) Data Quality Tools Data Recovery Data Replication Data Scientist Data Streaming Data Synchronization Data Warehouse Data Wiping Data-Driven Marketing (DDM) Database Activity Monitoring (DAM) Database Appliances Database Audit and Protection (DAP) Database Design Database Encryption Database Mirroring DBMS (database management system) DBMS Management DDBMS (distributed database management system) DDL (data definition language) DDoS Deal Sweet Spot Analysis Decoupled Architecture Dedicated Server Delegate Delegation Demand Forecasting Demand Signal Repository (DSR) Deployment Desktop Management Desktop Outsourcing Desktop Virtualization Development and Integration Services Device Resource Management Device-Embedded Biometric Authentication DevOps Dictionary Attack DIF (Data Interchange Format) Differential Backup Digital Digital Cross-Connect (DXC) Digital Divide Digital Forensics Digital Loopback Digital Marketing Digital Modem Digital Network Digital Signature Digital Switching Digital Thick Wallet Solutions Digital Thin Wallet Solutions Digital Wallet Digital Watermarking Digitalization Digitize Direct Channel Direct Chip Cooling Directed Speech Recognition Directory Services Dirty Protocols Disaster Recovery (DR) Disaster Recovery as a Service (DRaaS) Disciplined Multisourcing Discrete Manufacturing Discretionary Security Controls Discussion Database Disk Cloning Disk Image Disk Mirroring (RAID 1) Distributed Computing Distributed Data Management Distributed Database Distributed Function Distributed Tape for Backup and Archiving Distributed Version Control System (DVCS) DNS DNS Client DNS Query DNS Zone DNSSEC Document Management (DM) Document Management Hardware Services DoJa (DoCoMo Java) Domain Controller Domain Name DoS Downlink Download Downtime DRM (digital rights management) DRM (distributed resource management) DRP (disaster recovery planning) DSL (digital subscriber line) DSL/residential/small-office gateway/router DTH (direct to home) Dual Mode Dual-Band Dual-Band Network Dual-Layer Magnetic Tape Dual Persona Dual-View Displays Dumb Terminal Dye Sublimation Dynamic Application Security Testing (DAST) Dynamic Content Dynamic Data Masking (DDM) Dynamic Routing Dynamic Web Application Tools E E-Book Readers (E-Readers) E-Discovery Software E-Learning E-Procurement E1 Earth Station Electro Mobility (E-Mobility) Electronic Bill Presentment and Payment (EBPP) Electronic Coupons (E-Coupons) Electronic Customer Relationship Management (E-CRM) Electronic Data Capture (EDC) Electronic Forms (E-Forms) Electronic Health Record (EHR) Electronic Paper Electronic Prescribing (E-prescribing) Electronic Signature (e-Signature) Electronic Waste (E-Waste) Embedded Analytics Embedded Cellular Data Embedded Software and Electronics Design Emerging Data Protection Schemes Encapsulation Encoding and Decoding Encryption Endpoint Endpoint Protection Platform (EPP) Endpoint Security Management Enhanced Data Rates for Global Evolution (EDGE) Enhanced E-Books Enhanced Messaging Service (EMS) Enhanced Network Delivery Ensemble Interactions Ensemble Programming Enterprise Application Outsourcing (EAO) Enterprise Application Software Enterprise Applications Enterprise Architecture (EA) Enterprise Asset Management (EAM) Enterprise Content Management (ECM) Enterprise Context Enterprise Fraud Management (EFM) Enterprise Information Architecture (EIA) Enterprise Information Management (EIM) Enterprise MLC (eMLC) Enterprise Mobile Communications Gateway (EMCG) Enterprise Portal (EP) Enterprise Risk Management (ERM) Applications Enterprise Security Intelligence (ESI) Enterprise Social Software Enterprise Solutions Enterprise Technology Architecture (ETA) Enterprise Unified Communications Infrastructure Enterprise-Class Enterprise-Grade Entitlement Management Entry-Level Smartphone Erasable Paper Printing Systems Ethernet Ethernet Services Ethical Hacker Expert System Extensible Authentication Protocol (EAP) eXtensible Business Reporting Language (XBRL) eXtensible Markup Language (XML) eXtensible Stylesheet Language (XSL) eXtensible Stylesheet Language Transformations (XSLT) External Hard Drive External Services Provider (ESP) External Social Software External Storage Extranet Extreme Low-Energy Servers Eye Tracking F Fabric Computing Fabric-Based Computing (FBC) Fabric-Based Infrastructure (FBI) Facebook Commerce (F-Commerce) Failback Failover Fast-Packet Switching Fault Detection and Isolation Fault-Tolerant FCC (Federal Communications Commission) FDD (frequency division duplex) FDDI (Fiber Distributed Data Interface) Feature Smartphone Federated Identity Management Federated Search Femtocells FHMA (frequency-hopping multiple access) Fiber Optics Fibre Channel Over Ethernet (FCoE) Field Service Management Software File Server File Sharing Firecall Firewall First Generation (1G or analog) Fixed Wireless Fixed-Line Carrier Flash Storage Flexible Media and Conferencing Switching Floating Gate FM (facilities management) FM (frequency modulation) FMC (fixed-mobile convergence) Folksonomies (Social Tagging) Forensic Software Forward Lookup FP (function point) FPD (flat panel display) Framework Framing Fraud Detection Free Cooling (Economizers) Frequency Frequency Band Frequency Reuse FTP (File Transfer Protocol) FTTH (fiber to the home) FTTP (fiber to the premises) Fuel Cell Fully Qualified Domain Name Functional Programming Languages Fuzzy Logic G Gain Sharing GAN (generic access network) Gateway Gateway (transcoding) Server Geographic Information System (GIS) Geo-Replication Geospatial Mashups Geothermal Cooling for Data Centers Global Delivery Global Positioning System (GPS) Glonass Glyph Google BigQuery Google Hangouts Google Voice Granularity Greynet (or graynet) Grid Computing Grid Storage Gross New Connections GSLB gTLD GUI (graphical user interface) Gzip (GNU zip) H Hacker Hackerazzi Handwriting Recognition Happy Hour Virus Hardware and Software Maintenance Services Hardware Clustering Hardware Maintenance and Support Services HDML (handheld device markup language) Head-Mounted Displays (HMDs) Head-Up Displays (HUDs) Heartbeat Helium Hard Drive Help Desk Management Heterogeneous Architecture Heuristic HI (healthcare infomediary) Hierarchical storage management and archive software High-Performance Computing (HPC) High-Speed Color Inkjet Printing HIPAA (Health Insurance Portability and Accountability Act) HIS Historian Software Hit HLR (home location register) Home Health Monitoring Home Server Home-Area Network (HAN) Host-Based Replication Hosted PC Virtualization Software Hosted Virtual Desktops (HVD) Hot Backup (dynamic backup) Hot Site and Cold Site Hot Spot HTML (Hypertext Markup Language) HTML5 HTTP 2.0 Hub Hybrid Cloud Computing Hybrid Cloud Storage Hybrid MPLS (Internet WAN) Hybrid Storage Gateway Appliance Hyperlink Hyperprotocol Hyperscale Computing Hypertext Hypervisor I I/O (input/output) I/O bound I/O channel I/O Fencing (input/output fencing) IAE (integrated applications environment) IAM as a Service (IAMaaS) iChat IDEN (integrated digital enhanced network) Identity and Access Intelligence Identity and Access Management (IAM) Identity-Aware Networks (IAN) Identity-Proofing Services IDL (Interface Definition Language) IDM (Integrated Document Management) IDN (Integrated Digital Network) IDS (Internet Document Security) IM (Information Management) IM (Instant Messaging) Image-Based Backup Image Map Image Recognition IMAP (Internet Message Access Protocol) IMS (IP multimedia subsystem) IMSI (international mobile subscriber identity) IMT-2000 (international mobile telecommunications-2000) IMT-A (international mobile telecommunications advanced) In-Rack Cooling In-Row Cooling Incident Management (IcM) Incremental Backup Industrialized IT Services Information (knowledge) Assets Information Architecture Information Delivery Information Dispersal Algorithms Information Life Cycle Management (ILM) Information Technology Infrastructure Library (ITIL) Infrastructure as a Service (IaaS) Infrastructure Software Instant Messaging (IM or IM-ing or AIM) Instruction Set Virtualization Integrated Carrier Integrated Software Integration Integration Appliances Integration as a Service (IaaS) Integration Brokerage (IB) Integration Platform as a Service (iPaaS) Intellectual Property Intelligent Video Internet Internet Explorer Administration Kit (IEAK) Internet of Things Internet Protocol Television (IPTV) Internet Protocol Version 6 (IPv6) Internet Radio Internet Telephony Internet TV Interoperability Interoperable Storage Encryption Intranet Introspection Inverse Mapping IP (Internet Protocol) IP address (Internet Protocol Address) IP Centrex platforms IP Datacasting IP Extension Line IP Multimedia Subsystem (IMS) IP Seat License IP telephony IP-enabled PBX IP-PBX IP-Service Control Points IP Storage iPhone IRD (Integrated Receiver Decoder) irDA (Infrared Data Association) ISDN (Integrated Services Digital Network) ISO (Internet Sales Outlet) ISO 9000 ISP (Internet Service Provider) ISV (Independent Software Vendor) IT (Information Technology) IT Asset Management (ITAM) IT chargeback IT Consulting IT Consulting Services IT Consumerization IT Cost Optimization IT Decision Support IT Governance (ITG) IT Industrialization IT Infrastructure IT Management IT Management Services IT Outsourcing IT Risk IT Service Desk (ITSD) IT Services IT Services Sourcing IT Services Strategic Sourcing IT Strategy Iterative Query IVR (Interactive Voice Response) J Java Java Applet Java ME (Java Platform, Micro Edition) Java Platform AD Tools Java Platform, Enterprise Edition (Java EE) Java Servlet JavaScript John the Ripper Jukebox K Ka-Band (Kurtz-above band) Kernel Kernel Panic Keylogger Key Performance Indicator (KPI) Keystroke Dynamics Ku-Band (Kurtz-under band) L L-band LAN (local-area network) LAN bridging LAN-Free Backup Laser Laser Disk Latency LBS (location-based services) LCD (liquid crystal display) LDAP (Lightweight Directory Access Protocol) LED (light-emitting diode) Library License Life Span Lights-Out Recovery Operations Management Limited Disclosure Technology Line Line Balancing Line Dot Matrix Line Driver Line Hit Line Impact Dot Matrix Line Inkjet Line Load Control Line Loading Link Redundancy Level Linux Liquid Cooling Liquid Crystal on Silicon (LCoS) Liquid Submersion Cooling LISP Lithium Battery Backup Lithium Iron Phosphate (LiFePO4) Batteries Load Balancing Load Forecasting Local Modifications Memory Local Multipoint Distribution Service Local Number Portability Local Positioning System Location-Aware Applications Location-Aware Technology Location-Based Advertising (LBA) Location-Based Marketing (LBM) Logistics Network Planning Loopback Loosely Coupled Multiprocessing Low Frequency Low-Cost IT LRC (longitudinal redundancy check) LTE-A LUN Masking LUN Zoning Lurker M M-business M-commerce Machine-to-Machine (M2M) Communications Magnetic-Ink Character Recognition Magneto-Optic Magnetometer Mainframe Mainstream Notebook Malware (malicious software) Managed File Transfer (MFT) Managed Network Services Managed Object Managed Print Services (MPS) Managed Security Service Provider (MSSP) Managed Service Provider (MSP) Manufacturer Manufacturing Execution System MapReduce Marketing Automation System Marketing Service Providers (MSPs) Mashup Mashups Master Data Management (MDM) Media Access Control Media Gateways Media Objects Media Tablet Media-Embedded Merchandising (MEM) Medical Management Megaportal Memory Management Memory Management Unit (MMU) Memory Overcommit Memory Paging Memristor Mesh Network Message Authentication Message Authentication Code Message Feedback Message Format Message Numbering Message Passing Message Queuing Message Switching Message Warehouse Messaging Messaging Application Programming Interface (MAPI) Messaging Device Messaging Hypertext Markup Language Metadata Metadata and Data Modeling Tools Metadirectory Metalanguage Metrication Micro Fuel Cells Micro-marketplace Microblogging Microbrowser Microcode Microfilm Microgrid Microinverters Microprocessor Microsoft Certified Professional Middleware MiFi Milliampere Hour (mAh) Million Instructions per Second (MIPS) Minimum Cell Rate Minutes of use (MOUs) Mobile Advertising Mobile and Wireless Infrastructure Software Platforms Mobile Application Manager (MAM) Mobile Application Stores Mobile Browsers Mobile Centrex Mobile Cloud Synchronization Mobile Deep Packet Inspection (DPI) Mobile Device Management (MDM) Mobile Device Management Services (MDM Services) Mobile DRM Mobile Earth Station Mobile High-Definition Link (MHL) Mobile IM Mobile IP Mobile Middleware Mobile Network Mobile Payment Mobile PC Mobile PC ODMs Mobile Portal Mobile Satellite Service (MSS) Mobile Social Networks Mobile Transformers Mobile TV Mobile Virtual Network Enabler (MVNE) Mobile Virtual Network Operator (MVNO) Mobile Virtualization Mobile Voice Over Internet Protocol (mVoIP) Mobile Web Applications Mobile Widgets Mobile Wireless Local Loop (WLL) Mobile-Network Operator Mobile/Wireless Portal Mobility Managed Services (MMS) Modulation Molecular Transistors Money Clouds Mouse MPEG-4 Advanced Video Coding (AVC) Multichannel Campaign Management Multichannel Feedback Management Multichannel Loyalty Multichannel Multipoint Distribution Service Multicore Processor Multidimensional Database Management System Multifunction Product Multimedia Multimedia Markup Language Multimedia Messaging Service Multimode Fiber Multiple Input/Multiple Output Multiple Instruction, Multiple Data Multiplexing Multipoint Multipurpose Internet Messaging Extensions Multitenancy Multithreading Multitouch MX Record N N-Channel Metal-Oxide Semiconductor (NMOS) Nameserver Nanography Nanomaterial Supercapacitors Nanotube NAP (network access point) Narrowband Channels NAS (network-attached storage) Natural-Language Processing (NLP) Natural-Language Understanding NC (network computer) NCCJ (native code compiler for Java) NCOP (network code of practice) NDC (networked data center) NDF (network dynamic functionality) Near Field Communication (NFC) Net New Connections Netbooks Network Network Access Control (NAC) Network and System Management Network Appliance Network Computing Network Configuration and Change Management (NCCM) Tools Network Database Network Fault Monitoring Tools Network Intelligence (NI) Network Interface Card Network Inventory Network Management Network Management Center Network on Chip (NoC) Network Operating System Network Outsourcing Network Performance Monitoring Tools Network Performance Tuning/Configuring Facilities Network Redundancy Network Scanning Network Security Network Security Silicon Network Sharing Network Topology Network Virtual Terminal Network Virtualization Neural Net or Neural Network Next-Generation Firewalls (NGFWs) Next-Generation Network Next-Generation Telematics Protocol (NGTP) Nexus of Forces NMT-F No-Email Initiatives Node Node B Noisy Data Noisy Text Nomadic Wireless Non-Cable Consumer Fixed Broadband Notebook O OASIS Object Transaction Monitor Object-Based Middleware Object-Based Technologies Object-Oriented Database Management System Object-Oriented Programming Object-Oriented Technology Occam Process ODP (on-device portal) Offshore Programming Olfactory Interfaces On-Device Monitoring OneAPI Online Backup Open API OpenFlow Open Networking Foundation (ONF) Online Complex Processing Online Transaction Processing Open Compute Project Open Mobile Alliance Open Rack Open Source Operating System Operational Data Store Operational Technology (OT) Operations Services Operations Support System Opportunity Management System Optical Network (photonic network) Optical Transport Option Analysis Order Management Organic Light-Emitting Diode (OLED) Original Equipment Manufacturer OSI Management Outage Management System (OMS) Over the Air Overlay P Packet Switching Packet-Switched Network PACS (personal access communication services) Page Paging Paper Size Parallel Network File System (pNFS) Parallel Processing Software Partitioning Code Partner Customer Support Software Partner Relationship Management (PRM) Password Password Blacklist Password Cracker Password Entropy Password Hardening Password Strength Meter Patch (fix) Patch Management PBX (private branch exchange) PC Virtual Software Appliance PCI DSS PCU (packet control unit) PDA (personal digital assistant) PDC (personal digital cellular) PDE (partial document encryption) PDM (product data management) Penetration Rate (mobile) Penetration Testing Personal Cloud Phase-Change Cooling Phase Change Memory (PCM) Phasor Measurement Units (PMUs) PHS (personal HandyPhone system) Pico Projector Picocell PIM (personal information manager) Pixel Plain Old XML (POX) Platform as a Service (PaaS) Platform-Independent PLC (programmable logic controller) Podcast Podcasting Point to Point Polymer Memory POP (point of presence) Portable Flash Media for Content Distribution Portable Storage Device Control Portable Wireless Portal Portal Fabric Portal-Enabling Middleware Porting POS (point of sale) Power Adaptive Algorithms Power Distribution Unit (PDU) Predictive Technology Presence Primary DNS Print Markets and Management Hardware Printed Semiconductors Private Cloud Computing Private Key Problem Management Procurement Applications Procurement Network Product Analytics Product Catalog Product Configurators Production Devices Project Management Project Management Office (PMO) Proprietary Software Protocol Protocol Conversion Protocol Stack Protocol-Transparent Provisioning Proxy Agent Proxy Servers PTR (peak transaction rate) PTR Records PTT PoC (push-to-talk over cellular) Public Cloud Computing Push Technology Pwn PX (private exchange) Q QA (quality assurance) QAM (quadrature amplitude modulation) QoS (quality of service) QPS Quad-Band Quality of Storage Service Quantum Computer Quantum Dot Displays Quick Response Codes (QR Codes) R R-UIM (removable user identity module) RAAD (rapid architected application development) Rack Rack Density Rack Mount Rack Unit (RU) RAD (rapid application development) Radio-Frequency Identification (RFID) RAID (redundant array of independent disks) RAS (reliability, availability and serviceability) Raw Data (source data or atomic data) RDBMS (relational database management system) RDM (requirements definition and management) Real Time Receiver Sensitivity Reconfigurable Optical Add/Drop Multiplexers (ROADMs) Records Management (RM) Recovery Recovery Point Objective (RPO) Recovery Time Objective (RTO) Recursive Query Recursive Resolver Redaction Redaction Tools Redundancy Registry Regulatory Compliance Remote Backup Appliance Remote Data Backup Remote Desktop Remote Diagnostics Remote Replication Removable Media Removable Modules Replication Repository Response Time REST (representational state transfer) Restore Retail Digital Signage Retail Execution and Monitoring Retail Sales Retirements Reusable Analog Intellectual Property (IP) Reuse Revenue Revenue Assurance Reverse lookup RFID reader RFID tags Rich Communication Suite (RCS) RISC (reduced instruction set computer) RM (relationship manager) RNC (radio network controller) Roaming ROIT (return on information technology) Root Rotary Heat Exchanger (Kyoto Wheel) Round Robin RSA (rural service area) Rsync RTT (round-trip time) RTTM Runtime Application Self-Protection (RASP) S S-band Sales Analytics SAM (software asset management) SAN (storage area network) Satellite Broadcasting Operator Satellite Communications Satellite Communications Operator Satellite Computer Satellite Dish Satellite Navigation Solutions Satellite Navigation Systems Satellite Phone (satphone) SAX (Simple API for XML) Scanner Scattering SCM (software configuration management) SCPC (single channel per carrier) SCR (sustainable cell rate) Scrambler Screen Popping Screen Sharing Screening Scriptless Testing SDK (software development kit) SDSL (symmetric digital subscriber line) Search Engine Search-Based Data Discovery Tools Secondary Channel Secondary DNS Secondary Station Secondary Storage Secret Key Secret-Key Cryptography Secure Web Gateway Security as a Service (SaaS) Security Information and Event Management (SIEM) Security Information and Event Management Software Selective Sourcing Selector Self-Describing Messages Self-Relocating Program Self-Test and Fault Isolation Semi-Mobile Wireless Serial Dot Matrix Serial Inkjet Serial Interface Serial Transmission Server Server Appliance Server Virtualization Infrastructure Server Virtualization Management Serverless Backup Serverless Printing Service Bureau Service Catalog Service Desk Service Inventory Service Provider Routers and Switches Service-Oriented Architecture (SOA) Serving Area Servlet Session Border Controllers Session Initiation Protocol (SIP) SFA (sales force automation) SFDR (software failure detection and recovery) Shadow/Mirror Databases Shared Services or Shared Services Center Shim Shoeshining Short Message Service (SMS) Shrink-Wrapped SI (system integrator) Sideband Signature Signature Verification Silicon Anode Batteries SIM card (subscriber identity module) SIM toolkit (SIM application toolkit) SIMD (single instruction, multiple data) SIMM (single in-line memory module) Simulation Single Sign-On (SSO) Single-Image Mode Single Level Cell (SLC) Flash Single-Mode Fiber Single-Pass Device Sink SIO (strategic information office) Skinless Servers Skinput (Bioacoustic Sensing) SKU (stock-keeping unit) SLA (service-level agreement) SLED (single large expensive disk) SLM (service-level management) SLM (software license management) SLO (service-level objective) SMA (service management agreement) Small and Midsize Business (SMB) Smart Antenna Smart Card Smart Grid Smart Terminal Smartphone SME (small-to-midsize enterprise) SMFP (smart MFP) SMP (symmetric multiprocessing) SMR (specialized mobile radio) SMS (system-managed storage) SMTP (Simple Mail Transfer Protocol) Sniffer SNMP (Simple Network Management Protocol) SoA Record SOAP (Simple Object Access Protocol) SOC (software oversight committee) Social Analytics Social Computing Social Content Social CRM Social Feedback Social Gaming Social Media Social Media Tools Social Network Analysis (SNA) Social Networking Social Networking Sites Social Profile Social Profiles Social Publishing Social Search Social Tagging (Folksonomy) Social Technologies Social Web Socialcasting Sockets Softswitch Architecture Softswitches Software as a Service (SaaS) Software Development Software Maintenance Software Support Services Software-Defined Networks Software-Defined Radio (SDR) SOHO (small office/home office) Solid-State Appliances Solution Solution Architecture Solution Portfolio SONET (Synchronous Optical Network) Source Deduplication Source Encoding Source Routing Source Traffic Descriptor SP (service pack) Space Segment Spaghetti Chart Spam Spam Filter Spamdexing Spectrum Spectrum Harmonization Speech Circuit Speech Recognition SPF (Shortest Path First) Spider Splay Tree Spoofing Spread Spectrum Spyware SQL (Structured Query Language) SSL (Secure Sockets Layer) SSN (switched service network) SSP (service switching point) SSP (storage service provider) SSPC (structure, scripting, populating and channel outputs) Standard Standards Static Application Security Testing (SAST) Statistical Multiplexing Stickiness STM (synchronous transfer mode) Storage Storage Appliance Storage Management Software Storage Medium Storage Resource Management (SRM) Storage Snapshot Storage Subsystem Hardware Services Storage Support Services Store-and-Forward Voice Streaming Strong Password Subnet Subnet Mask Subnet Number Subscriber Subversion Super Wi-Fi Superserver Supply Chain Management (SCM) Supply Chain Segmentation Surface Computers SVG interface (Scalable Vector Graphics interface) SVGA (Super Video Graphics Array) SWAP (Simple Workflow Access Protocol) Swap File (swap space or pagefile) Switch Switch-Based Storage Virtualization Switched Line Switched Network Switching Switching Center Switchover Symbian Synchronization Synchronous Synchronous Communications Synchronous Network Synchronous Replication Synchronous Transmission SyncML (Synchronization Markup Language) Syntax System Integration System Management System Restore System Tray T Table Driven TACS (total access communications system) Tag Management Tape Tape Drive TCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) TDMA (time division multiple access) TDR (time domain reflectometry) Telco Telecom Analytics Telecom Equipment Support Services Telecommunications Carrier Telecommunications Equipment Telecommunications Services Teledensity Telematics Telephony-Centric UC Approach Tera-architectures TERM (technology-enabled relationship management) Terminal Terminal Emulation Test Data Generator Tethered Remote Access Tethering Texel (texture element) Text Analytics Text Mining Text Retrieval Texture mapping Thermal Printing Thermal Transfer Thin Client Thin Provisioning Three-Schema Architecture Through-Silicon Vias (TSVs) Throughput Time Division Multiplexing (TDM) Time Out TLD TLM (technical license management) TLP (transmission-level point) TLS (transport layer security) TMG (trunk media gateways) Tokenization Total Connections Total Cost of Ownership (TCO) Total IPTV Subscribers Touch-Sensitive Touchpoint Traffic Management Transceiver Transducer Transfer Rate Translator Transparency Transponder Tree Structure Trojan horse Trouble Ticket True Color TTL Tuning Tunneling TXT Records U Ultra-High-Speed Broadband Internet Ultrabook Ultracapacitors Unicast Unified Threat Management (UTM) Ultracapacitors Unicast Unified Threat Management (UTM) Unstructured Data Uptime/Downtime URL (uniform resource locator) User Authentication Technologies User Experience Platforms (UXP) User Provisioning V Value-Added Network (VAN) Value-Added Reseller (VAR) Value-Added Service (VAS) Value-Adding ValueOps Vapor Cooling Variable Bit Rate (VBR) VBScript Vector Graphics Vendor Vendor Management Vendor Revenue Vendor Risk Management (VRM) Vendor-Neutral Versatile Authentication Server and Service (VAS) Very High-Speed Digital Subscriber Lines (VDSL) Very Large-Scale Integration (VLSI) Very Small Aperture Terminal (VSAT) Video on Demand (VOD) Video Telepresence Videoconferencing Virtual Assistant (VA) Virtual Channel (VC) Virtual Desktop Infrastructure (VDI) Virtual Floppy Disk Virtual Hard Disk (VHD) Virtual Hosting Virtual LAN (VLAN) Virtual Machine (VM) Virtual Matrix Organization Virtual Memory Virtual Network Operator (VNO) Virtual Private Network (VPN) Virtual Reality (VR) Virtual Reality Modeling Language (VRML) Virtual SAN Appliance (VSA) Virtual Server Virtual Server Backup Virtual Server Facility (VSF) Virtual Switch Virtual Tape Library (VTL) Virtualization Virtualization Software Virus Visitor Location Register (VLR) Visual Basic (VB) Visual Basic Extension (VBX) Visual Basic for Applications (VBA) Visual Studio (VS) Visualization VMware Backup Voice Application Servers Voice Browser Voice Encryption Voice Endpoint Voice Mail Voice of the Customer (VoC) Voice over Internet Protocol (VoIP) Voice Over Wireless LAN (VoWLAN) Voice Portal Voice Response System (VRS) Voice Response Unit (VRU) Voice Switching, Control and Applications (VSCA) Voice-Enabled Residential/Small-Office Gateway/Router with Embedded DSL Modem (xDSL IAD) VoiceXML Volumetric Displays VSS-Based Backup Vulnerability Management W W3C (World Wide Web Consortium) Wafer WAG (wireless application gateway) Walled Garden WAN (wide-area network) WAN Clustering WAN performance monitor WAN replacement WAP (Wireless Application Protocol) WAP browser WASP (wireless application service provider) WCDMA (wideband code division multiple access) WDP (Wireless Datagram Protocol) Weak or Strong Signal Wearable Computer Weave Web Web 2.0 Web Access Management (WAM) Web Analytics Web ATM Web Authorization Management (WAM) Web Books Web Content Management (WCM) Web Crawler Web E-mail Web Hosting Web Integration Servers Web Phone Web Server Web Services Web Services Software Web TV Web Widgets Web-enabled Web-Oriented Architecture (WOA) Website Website Experience Analytics WECA (Wireless Ethernet Compatibility Alliance) WEP (wired equivalent privacy) WfM (Wired for Management) White Hat Wi-Fi (wireless fidelity) Wi-Fi Alliance Wi-Fi Mesh Wi-Fi Protected Access (WPA) Wi-Fi Protected Access 2 (WPA2) WiBro (wireless broadband) Wide-Area Network Optimization Controllers (WOCs) WiGig WiHD (wireless HD) Wiki WIM (WAP identity module) WiMAX (Worldwide Interoperability for Microwave Access) WiMedia Alliance Windowing Windows CE Windows Client Windows Live Messenger Windows Remote Desktop Wipe Wireless Data Communication Wireless Intrusion Prevention System (WIPS) Wireless Local-Area Network (WLAN) Wireless Power Wiretap Trojan Work Management Workflow Management Workload Workstations World Wide Web Consortium (W3C) Worm Write Back Write Through X x and y coordinates X Windows XML (Extensible Markup Language) Z Zero-Latency Enterprise (ZLE) ZigBee