-
-
- SIP trunking
- Session Initiation Protocol (SIP) trunking is the use...
- SIP trunking (Session Initiation Protocol trunk...
- SKA
- Shared Key Authentication (SKA) is a process by which a computer can ga...
- SMS gateway
- An SMS gateway is a Web site that allow users to send S...
- SMSC
- A short message service center (SMSC) is the portion of a wireless ne...
- Software as a Service
- Software as a Service (SaaS) is a s...
- Software as a Service (SaaS)
- Software as a Service...
- software package
- A software package is an assemblage of files ...
- software-defined networking monitoring applicat...
- source deduplication
- Source deduplication is the removal o...
- Squid proxy server
- Squid is a Unix-based proxy server that c...
- stack overflow
- A stack overflow is an undesirable condition in w...
- state wide area network
- In India, SWAN is a government-...
- STONITH (Shoot The Other Node In The Head)
- SWAN
- In India, SWAN is a government-subsidized project to create a state w...
- SWAN (state wide area network)
- In India, SWAN is...
- Systems Network Architecture
- SNA is a proprietary ...
- Systems Network Architecture (SNA)
- SNA is a ...
- TaaS
- Testing as a Service (TaaS) is an outsourcing model in which testing ...
- target deduplication
- Target deduplication is the removal o...
- Technical Office Protocol
- Technical Office Protocol (...
- Technical Office Protocol (TOP)
- Technical Offic...
- Testing as a Service
- Testing as a Service (TaaS) is an out...
- Testing as a Service (TaaS)
- Testing as a Service (T...
- TOP
- Technical Office Protocol (TOP), also called Technical and Office Proto...
- Top searches of 2008
- What were people searching the WhatIs...
- transparent addressing
- On a wide area network (WAN), tra...
- Tsunami UDP
- Tsunami UDP is an open source file transfer protocol th...
- UCS
- A unified computing system (UCS) is a data center architecture that int...
- UIA
- User installed applications (UIA) are programs that are installed on a ...
- unified computing system
- A unified computing system (U...
- unified computing system (UCS)
- A unified computi...
- unified network management
- Unified network managemen...
- United Kingdom Climate Change Act
- The United ...
- Uptime data center tier standards
- The Uptime ...
- Uptime Institute, Inc.
- The Uptime Institute, Inc. is a c...
- user account provisioning
- User account provisioning i...
- user installed application
- User installed applicatio...
- user installed application (UIA)
- User installe...
- vapor cooling
- Phase-change cooling, also called vapor cooling, is...
- variable length subnet mask
- A variable-length subne...
- variable-length subnet mask
- A variable-length subne...
- variable-length subnet mask (VLSM)
- A variabl...
- VBR
- Vouch By Reference (VBR) is a protocol for adding third-party certifica...
- virtual address
- A virtual address is a binary number in virtual...
- virtual desktop
- A virtual desktop is an individual user's inter...
- virtual LUN or thin LUN
- A virtual LUN (virtual logical ...
- virtual machine lifecycle management (VMLM)
- virtual networking
- Virtual networking is a technology that f...
- virtual SAN appliance
- A virtual SAN appliance (VSA) is a ...
- virtual SAN appliance (VSA)
- A virtual SAN appliance...
- virtual switch
- A virtual switch is a software program that allow...
- virtual systems management
- Virtual systems managemen...
- virtual systems management (VSM)
- Virtual syste...
- virtualization sprawl - virtual server sprawl
- virtualization stack
- A virtualization stack is the collect...
- Virtualization Technology
- Intel VT (Virtualization Te...
- VLSM
- A variable-length subnet mask (VLSM) is a sequence of numbers of vari...
- VMware backup
- VMware backup is the copying of data on a virtual m...
- VMware Horizon Application Manager
- VMware Ho...
- Voice over IP Security Alliance
- VOIPSA (Voice o...
- VoIP security threats
- As VoIP becomes increasingly preval...
- VOIPSA
- VOIPSA (Voice over IP Security Alliance) is a cross-industry coal...
- VOIPSA (Voice over IP Security Alliance)
- Vouch by Reference
- Vouch By Reference (VBR) is a protocol fo...
- Vouch by Reference (VBR)
- Vouch By Reference (VBR) is a...
- VSA
- A virtual SAN appliance (VSA) is a software bundle that allows a storag...
- VSM
- Virtual systems management (VSM), also known as virtual system manageme...
- VXLAN (Virtual Extensible LAN)
- Virtual Extensibl...
- VxWorks
- VxWorks is a real-time operating system (RTOS) that can be used...
- WAE
- Wide Area Ethernet (WAE) or Ethernet WAN (also sometimes referred to as...
- Wake on LAN
- Wake on LAN is a technology that allows a network profe...
- WAN clustering
- WAN clustering, also called geoclustering, high-a...
- WAN clustering (geoclustering, high-availabilit...
- WDS
- A wireless distribution system (WDS) is a method of interconnecting acc...
- WebOps (Web operations)
- WebOps, short for Web operation...
- Wide Area Ethernet
- Wide Area Ethernet (WAE) or Ethernet WAN ...
- Wide Area Ethernet (WAE)
- Wide Area Ethernet (WAE) or E...
- wildcard certificate
- A wildcard certificate is a digital c...
- Windows Azure
- Windows Azure is an integrated operating system for...
- Windows Server Update Services
- Windows Server Up...
- Windows Server Update Services (WSUS)
- Win...
- Windows To Go
- Windows To Go is a feature of the Windows 8 Enterpr...
- wireless distribution system
- A wireless distributi...
- wireless distribution system (WDS)
- A wireles...
- wireless WAN
- A wireless WAN is a wide area network in which separa...
- wireless WAN (Wireless Wide Area Network)
- Wireless Wide Area Network
- A wireless WAN is a wide ...
- Wireshark
- Wireshark is an open source tool for analyzing packets and ...
- wiretap Trojan
- A wiretap Trojan is a program that surreptitiousl...
- wsname
- WSName, or Workstation Name Changer, is a freeware utility that a...
- Yellowdog Updater Modified
- Yellowdog Update, Modifie...
- Yellowdog Updater, Modified (YUM)
- Yellowdog U...
- YUM
- Yellowdog Update, Modified (YUM) is a program that manages installation...
- Zabbix
- Zabbix is an open-source tool designed to monitor networks, serve...
- Zero Administration
- Zero Administration for Windows is Micr...
- zero client
- Zero client, also known as ultrathin client, is a serve...