Browse Definitions :
69 results for:

cli

Common Language Infrastructure (CLI)

Definition | searchAppArchitecture

Part of Microsoft's .NET strategy, Common Language Infrastructure (CLI) enables an application program written in any of several commonly-used ...

vSphere CLI (vCLI)

Definition | SearchVMware

VMware's vSphere CLI (vCLI) commands are used in a command line interface (CLI) when managing VMware ESX/ESXi infrastructures.

command line interface (CLI)

Definition | SearchWindowsServer

A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.

VMware vSphere PowerCLI

Definition | SearchVMware

VMware vSphere PowerCLI is a command-line interface (CLI) tool for automating vSphere and vCloud management.

vmkfstools

Definition | SearchVMware

Vmkfstools is an ESXi Shell command line interface (CLI) for building and managing volumes and virtual disks on an ESX/ESXi host.

AWS Command Line Interface

Definition | SearchAWS

The AWS Command Line Interface (AWS CLI) is an Amazon Web Services tool that enables developers to control Amazon public cloud services by typing ...

command prompt

Definition | WhatIs.com

A command prompt is the input field in a text-based user interface screen for an operating system or program. It consists of a brief text string ...

AWS Serverless Application Model (AWS SAM)

Definition | SearchAWS

AWS Serverless Application Model (AWS SAM) is a framework a developer can use to create and deploy serverless applications that run on Amazon's cloud.

OpenConfig

Definition | WhatIs.com

OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.

AWS CodeCommit (Amazon Web Services CodeCommit)

Definition | SearchAWS

AWS CodeCommit is a source code storage and version-control service for Amazon Web Services' public cloud customers.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close