-
-
- ODIN (Open Data Center with an Interoperable Ne...
- OGSA
- The Open Grid Services Architecture (OGSA) is a set of standards defi...
- OLA
- An operational level agreement (OLA) is a contract that defines how var...
- Open Blueprint
- Open Blueprint is IBM's strategic view of the net...
- Open Grid Services Architecture
- The Open Grid S...
- Open Grid Services Architecture (OGSA)
- open source virtual private network
- OpenVPN...
- OpenVPN
- OpenVPN is an open source virtual private network (VPN) product...
- OpenVPN (open source virtual private network)
- operational costs
- Definition - In information technology, ope...
- operational level agreement
- An operational level ag...
- operational level agreement (OLA)
- An operatio...
- OTA update (over-the-air update)
- An OTA update...
- overcommitment
- Memory overcommit (or overcommitment) is a hyperv...
- P4P
- P4P (proactive provider participation for P2P) is a protocol designed t...
- P4P (proactive provider participation for P2P)
- PaaS
- Platform as a Service (PaaS) is a way to rent hardware, operating sys...
- package management system
- A package manager, also kno...
- package manager
- A package manager, also known as a package mana...
- package manager or package management system (PMS)
- Packet Order Correction
- Packet Order Correction (POC) i...
- Packet Order Correction (POC)
- Packet Order Correc...
- parent partition
- A parent partition is a logical hard drive di...
- PAT
- Port Address Translation (PAT), is an extension to network address tran...
- Path Computation Element Protocol (PCEP)
- Peltier effect
- The Peltier effect is a temperature difference cr...
- performance testing
- Performance testing is the process of d...
- phase change cooling
- Phase-change cooling, also called vap...
- PHase change Liquid EXchange
- ECOphlex (PHase-chang...
- phase-change cooling
- Phase-change cooling, also called vap...
- phase-change cooling (vapor cooling)
- Phase...
- PHase-change Liquid EXchange
- ECOphlex (PHase-chang...
- PIC
- A port interface card (PIC) is a computer circuit board that provides m...
- Platform as a Service
- Platform as a Service (PaaS) is a w...
- Platform as a Service (PaaS)
- Platform as a Service...
- PMS
- A package manager, also known as a package management system (PMS), is ...
- POC
- Packet Order Correction (POC) is a technique for dealing with out-of-or...
- Podcast: What is a media-aware network?
- Policy and Charging Rules Function (PCRF)
- Port Address Translation
- Port Address Translation (PAT...
- Port Address Translation (PAT)
- Port Address Tran...
- port interface card
- A port interface card (PIC) is a comput...
- port interface card (PIC)
- A port interface card (PIC)...
- power usage effectiveness
- Power usage effectiveness (...
- power usage effectiveness (PUE)
- Power usage eff...
- private cloud
- Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- privilege bracketing
- Privilege bracketing is the practice ...
- proactive provider participation for P2P
- proxy hacking
- Proxy hacking, also known as proxy hijacking, is an...
- PUE
- Power usage effectiveness (PUE) is a metric used to determine the energ...
- RAS
- Reliability, Availability and Serviceability (RAS) is a set of related ...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- RDP
- Remote Desktop Protocol (RDP) is a protocol designed for secure communi...
- real time application
- A real-time application (RTA) is an...
- real time location system
- A real-time location system...
- real-time application
- A real-time application (RTA) is an...
- real-time application (RTA)
- A real-time application...
- real-time location system
- A real-time location system...
- real-time location system (RTLS)
- A real-time l...
- Reliability Availability and Serviceability
- Reliability, Availability and Serviceability (RAS)
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- remote clustering
- WAN clustering, also called geoclustering, ...
- remote data backup
- Remote data backup is the process of back...
- remote desktop
- Remote desktop is a program or an operating syste...
- Remote Desktop Protocol
- Remote Desktop Protocol (RDP) i...
- Remote Desktop Protocol (RDP)
- Remote Desktop Pr...
- remote login
- Rlogin (remote login) is a UNIX command that allows a...
- remote replication
- Remote replication is the process of copy...
- RIA
- A rich Internet application (RIA) is a Web application designed to deli...
- Rich Internet Application
- A rich Internet application...
- Rich Internet Application (RIA)
- A rich Internet...
- rlogin
- Rlogin (remote login) is a UNIX command that allows an authorized...
- rlogin (remote login)
- Rlogin (remote login) is a UNIX com...
- RMON
- RMON (Remote Network Monitoring) provides standard information that a...
- RMON (Remote Network Monitoring)
- RMON (Remote ...
- root partition
- A root partition is the isolated area in a Micros...
- RSAT (Microsoft Remote Server Administration To...
- RTA
- A real-time application (RTA) is an application program that functions ...
- RTLS
- A real-time location system (RTLS) is one of a number of technologies...
- SaaS
- Software as a Service (SaaS) is a software distribution model in whic...
- SaaS
- Security-as-a-service (SaaS) is an outsourcing model for security man...
- SBC
- A session border controller (SBC) is a device or application that gover...
- Security as a Service
- Security-as-a-service (SaaS) is an ...
- Security as a Service (SaaS)
- Security-as-a-service...
- security information management
- Security inform...
- security information management (SIM)
- Sec...
- service desk
- A service desk is a communications center that provid...
- session border controller
- A session border controller...
- session border controller (SBC)
- A session borde...
- Session Initiation Protocol trunking
- Sessi...
- shadow IT (shadow information technology)
- Shared Key Authentication
- Shared Key Authentication (...
- Shared Key Authentication (SKA)
- Shared Key Auth...
- short message service center
- A short message servi...
- short message service center (SMSC)
- A short...
- shrink wrap license
- A shrink wrap license is an end user ag...
- SIM
- Security information management (SIM) is the practice of collecting, mo...