-
-
- data breach
- A data breach is an incident in which sensitive, protec...
- data center bridging
- Data center bridging (DCB) describes ...
- data center bridging (DCB)
- Data center bridging (DCB...
- Data Center Quizzes
- We've gathered a collection of our quiz...
- data center services
- Data center services is a collective ...
- data protection management
- Data protection managemen...
- data protection management (DPM)
- Data protecti...
- data reduction
- Data reduction is the process of minimizing the a...
- database activity monitoring
- Database activity mon...
- database activity monitoring (DAM)
- Database ...
- DCB
- Data center bridging (DCB) describes the four technology enhancements t...
- delay-tolerant network
- A delay-tolerant network is a net...
- desktop management
- Desktop management is a comprehensive app...
- desktop virtualization
- Desktop virtualization is the con...
- DirectAccess
- DirectAccess is a feature introduced in Windows Serve...
- Directory Services Restore Mode (DSRM)
- discrete event simulation (DES)
- Discrete event ...
- disk cloning
- Disk cloning is the act of copying the contents of a ...
- disk image
- A disk image is a copy of the entire contents of a storag...
- Disk Partition Utility
- Diskpart is a command-line utilit...
- Diskpart
- Diskpart is a command-line utility used to manipulate disk pa...
- Diskpart (Disk Partition Utility)
- Diskpart is...
- disruption tolerant network
- A disruption-tolerant n...
- disruption-tolerant network
- A disruption-tolerant n...
- disruption-tolerant network (DTN)
- A disruptio...
- distributed antenna system
- A distributed antenna sys...
- distributed antenna system (DAS)
- A distributed...
- distributed virtual switch
- A distributed virtual swi...
- DNS rebinding attack
- DNS rebinding is an exploit in which ...
- DNS redirection
- DNS redirection is the controversial practice o...
- DNS Security Extensions
- DNS Security Extensions (DNSSEC...
- DNS Security Extensions (DNSSEC)
- DNS Security ...
- DNSSEC
- DNS Security Extensions (DNSSEC) are a set of Internet Engineerin...
- dot-green
- Dot-green is a shorthand way of describing the green comput...
- DOVE (IBM DOVE)
- IBM Dove (Distributed Overlay Virtual Ethernet)...
- DPM
- Data protection management (DPM) is the administration of backup proces...
- drive-by pharming
- Drive-by pharming is a vulnerability exploi...
- DTN
- A disruption-tolerant network (DTN) is a network designed so that tempo...
- eavesdropping
- Eavesdropping is the unauthorized real-time interce...
- economizer
- An economizer is a mechanical device used to reduce energ...
- ECOphlex
- ECOphlex (PHase-change Liquid EXchange) is an efficient and e...
- ECOphlex (PHase-change Liquid EXchange)
- EDA
- An event-driven architecture (EDA) is a framework that orchestrates beh...
- ELMS
- Event log management software (ELMS) is an application used to monito...
- end user policy
- An end user policy is a set of directives that ...
- endpoint fingerprinting
- Endpoint fingerprinting is a fe...
- endpoint security management
- Endpoint security man...
- Energy Star
- Energy Star is a government-backed labeling program tha...
- enterprise service bus
- An enterprise service bus (ESB) i...
- enterprise service bus (ESB)
- An enterprise service...
- ESB
- An enterprise service bus (ESB) is a software architecture for middlewa...
- ESP
- Event stream processing (ESP) is a software capacity designed to suppor...
- event
- An event, in a computing context, is any identifiable occurrence th...
- event driven architecture
- An event-driven architectur...
- event forwarding
- Event forwarding is the transmission of infor...
- event handler
- An event handler is a callback routine that operate...
- event handling
- Event handling is the receipt of an event at some...
- Event log management software
- Event log managemen...
- Event log management software (ELMS)
- Event...
- event stream processing
- Event stream processing (ESP) i...
- event stream processing (ESP)
- Event stream proces...
- event-driven architecture
- An event-driven architectur...
- event-driven architecture (EDA)
- An event-driven...
- Fast Guide to measuring efficiency and producti...
- fault management
- Fault management is the component of network ...
- fault-management configuration accounting perfo...
- fault-management platform
- Fault management is the com...
- FCAPS
- FCAPS (fault-management, configuration, accounting, performance, an...
- FCAPS (fault-management, configuration, account...
- FDE
- What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryp...
- femtocell
- A femtocell is a wireless router that acts as an Internet a...
- Firesheep
- Firesheep is a Firefox plug-in that automates session hijac...
- fixed length subnet mask
- A fixed-length subnet mask (F...
- fixed-length subnet mask
- A fixed-length subnet mask (F...
- fixed-length subnet mask (FLSM)
- A fixed-length ...
- Flexible Mandatory Access Control
- Flexible Ma...
- Flexible Mandatory Access Control (FMAC)
- FLSM
- A fixed-length subnet mask (FLSM) is a sequence of numbers of unchang...
- FMAC
- Flexible Mandatory Access Control (FMAC) is an ongoing project intend...
- forensic
- Forensic, in a general sense, means "related to or used in co...
- four-way server
- A four-way server is a server that incorporates...
- free/busy data
- Free/busy data is information about the availabil...
- full disk encryption
- What is full-disk encryption (FDE)?Fu...
- full-disk encryption
- What is full-disk encryption (FDE)?Fu...
- full-disk encryption (FDE)
- What is full-disk encrypt...
- GDMO
- GDMO (Guidelines for Definition of Managed Objects) is a standard for...
- GDMO (Guidelines for Definition of Managed Obje...
- geoclustering
- WAN clustering, also called geoclustering, high-ava...
- geolocation
- Geolocation is the detection of the physical location o...
- global catalog (Active Directory)
- A global ca...
- golden image
- A golden image is a template for a virtual machine (V...
- gpresult
- Gpresult is a command-line tool that shows the RSoP (Resultan...
- graceful degradation
- Graceful degradation is the ability o...
- green networking
- Green networking is the practice of selecting...
- Group Policy
- Group Policy is a hierarchical infrastructure that al...
- Group Policy Preferences
- Group Policy Preferences are ...
- guest virtual machine
- A guest virtual machine (guest VM) ...
- guest virtual machine (guest VM)
- A guest virtu...
- guest VM
- A guest virtual machine (guest VM) is the software component ...
- hard reset (factory reset; master reset)