Software-Defined Networking | SDN | OpenFlow
SMB 2.2 | Server Message Block 2.2
Transparent Interconnection of Lots of Links | TRILL
Shortest Path Bridging | SPB | 802.1aq | Multipath Routing
Immer mehr
Dynamische LUN-Migration | Dynamische RAID-Migration
Multi Tenancy | Mandantenfähigkeit | Virtual Domains
Thunderbolt | Donnerkeil | externe PCI-Express-Schnittstelle | Copper Peak
VNX | EMC VNX
Symmetrix | EMC Symmetrix
Clariion | EMC Clariion
Centera | EMC Centera
Unisphere | EMC Unisphere
Celerra | EMC Celerra
SAP HANA | SAP High-Performance Analytic Appliance
ZFS | Zeta File System
OLTP | Online Transaction Processing
Forklift Upgrade
FlexOffload
SecureFlex
VMflex
ConvergeFlex
Dispersion | Zerstreuung
Ethernet-Standards | Ethernet-Spezifikationen
Cloud | Wolke
MBR | Master Boot Record
UEFI | EFI | Universal Extensible Firmware Interface | Extensible Firmware Interface | Erweiterbare Firmware-Schnittstelle
Converged Infrastructure | konvergierte Infrastruktur | CI
Split Path | SPAID | Split-path Acceleration of Independent Data Streams
Scale out | Scale-out
Scale in | Scale-in
Extended Remote Copy | XRC
Inter Switch Link | ISL
Infrastructure Operating Environment | IOE
Business Copy | BC | Dreifachspiegel
Bladesystem Matrix
Vblock | vBlock
Data Federation
Change Data Capture | CDC
Extract, Transform and Load | ETL
Complex Event Processing | CEP
Mashup
Datenintegration | Real-Time Data Integration | Echtzeitintegration
Unternehmensanwendungsintegration | Enterprise Application Integration | EAI
Sub Volume Tiering | Subvolume | Chunklets | automatic tiering | easy tiering | fluid data | dynamic tiering
PI | Protection Information
TRIM | Trim-Befehl | Trim Command
Chipkill | Extended ECC | SDDC | Chipspare
CDMI | Cloud Data Management Interface
Desktopvirtualisierung | Desktop-Virtualisierung | Virtual Desktop | Infrastructure VDI
PC over IP | PCoIP
Notouch Ramp Load Technik
RAFF | Rotary Accelaration Feed Forward
Intelliseek | IntelliSeek
Stable Track | Stabletrac
TLER | Time-limited Error Recovery
CNA | Converged Network Adapter
CEE | Converged Enhanced Ethernet
Lossless Ethernet
SAN Copy
Mirrorview
Snapview
Dynamic Provisioning | dynamische Bereitstellung
SRDF | Symmetrix Remote Data Facility
Timefinder
Masking| Maskierung
VSAN | virtuelles SAN
SMC | Symmetrix Management Console
ECC
Consolidation | Konsolidierung
Appliance
NDMP | Network Data Management Protocol
Farad | elektrische Kapazität
Switching Cost
Opportunity Costs
Utilization | Auslastung
ROA | Return on Assets | Gesamtkapitalrendite
OPEX | Operational Expense
CAPEX | Capital Expenditures
Agilität | Änderungsgeschwindigkeit
Graphic Processing Unit | GPU | Grafikprozessor
EMEA
DACH-Region | D-A-CH
Original Equipment Manufacturer | OEM
Host | Hosting
Client
Central Processing Unit | CPU | Hauptprozessor | Prozessor
Web 2.0
eProcurement
eBusiness | eCommerce
SMB | KMU | Small and Medium Businesses | Kleine und Mittlere Unternehmen| SoHo
ITK | ITC | IKT
Enterprise 2.0
Systemhaus
DSL | Digital Subscriber Line | Digitaler Teilnehmeranschluss
Fixkosten | fixe Kosten
Return on Investment (ROI)
IT-Governance | (Governance)
Gewinn | Betriebsergebnis
Umsatz | Erlös
Abmahnung
Gläubigerschutz | Chapter 11
CTO
RAID-X | RAID X
RAID-Z | RAID Z
ROW | Redirect on Write | Redirect-on-write | Umleiten beim Schreiben
COW | Copy on Write | Copy-on-write | Kopieren beim Schreiben
StaaS | Storage-as-a-Service | Cloud Storage | Online-Backup
Evaluation Assurance Level | EAL | EAL4 | EAL4+ | EAL5 | EAL5+ | EAL6 | EAL6+
vSphere
NAS | Network Attached Storage | Netzwerkspeicher | Dateiserver | Filer
Byte | KByte | MByte | GByte | TByte | PByte | EByte | ZByte | YByte | Kilobyte | Megabyte | Gigabyte | Terabyte | Petabyte | Exabyte | Zettabyte | Yottabyte
Zoning | SAN-Zonen
WORM | Write Once, Read Many | einmal beschreibbare Medien
WSS | Windows Sharepoint Services | Sharepoint | MOSS | Microsoft Office Sharepoint Server
WinFS | Windows File System | Windows Dateisystem
WebEM | WBEM |Web-Based Enterprise Management
WAFS | Wide Area File Services | Wide-Area File-Services | Weitverkehrsdateidienste
VTL | Virtual Tape Library | virtuelle Bandbibliothek
VSAM | Virtual Storage Access Method
Storage-Virtualization | Storage-Virtualisierung | Block-Virtualisierung | File Virtualization | Datei-Virtualisierung | VTL | Virtual Tape Library | Block Virtualization
USB | Universal Serial Bus
Uptime | Downtime | Betriebszeit | Ausfallzeit
UNC | Universal Naming Convention | Universal-Naming-Convention
Unified Storage | Unified-Storage
Tier | Stufe
Thin Provisioning | TP | Speicherkreditierung | Überbuchung
Tape Library | Tape Roboter | Tape Silo | Bandbibliothek | Bandroboter
Tape | Cartridge | Cassette | Bandmedien | Kassette | Einspulenband | Zweispulenband
Storage Security | Storage-Security
SRM | Storage Resource Management | Storage-Resource-Management
SSD | Solid State Drive | Solid State Disk | Halbleiter-Festplatte
SMI-S | Storage Management Initiative Specification
SIMM | Single Inline Memory Modul
SAS | Serial attached SCSI | Serial-attached SCSI
SATA | S-ATA | Serial ATA | PATA | Parallel ATA | P-ATA
Scandisk | chkdsk | check disk
Samba
SAN Routing | SAN-Routing
SAN Island | SAN-Insel
SAN FS | SAN File System | SAN Datei-System
ROI | Return on Invest | TCO | Total Cost of Ownership
Rollback | Zurückfahren
Restore | Wiederherstellung | Datenrücksicherung
RTO | Recovery Time Objective | Wiederanlauf-Dauer
RPO | Recovery Point Objective | Zeitspanne des Datenverlustes
Raw data | Rohdaten
RAID-6 | RAID 6 | RAID Level 6 | DP | Double Parity | Doppelte Parität
RAID | Redundant Array of Independent Disk | RAID-Level | Festplattenverbund
RAM | Random Access Memory | Hauptspeicher
Provisioning | Provisionierung | Bereitstellung
Primary Storage | Primärspeicher | Online Storage | Online Speicher
PCI-X | PCI-X-Bus | Peripheral Component Interconnect Extended
PCIe | PCI-E | PCI Express | PCI-Express
Pathing | Path Control | Pfadkontrolle
Parity | even Parity | odd Parity | Parität | gerade Parität | ungerade Parität
Outsourcing | Auslagerung von IT-Diensten
Optical Fiber | Optische Faser | Glasfaser
on the fly | On-the-fly
Online Backup | Online-Datensicherung | Remote-Backup
Offline Backup | Offline-Datensicherung
n-Tier | n-Stufen | mehrstufige Architektur
NVRAM | NVS | Nonvolatile Storage | Nicht-flüchtiger Speicher
Node | Knoten
NFS | Network File System | Netzwerkprotokoll
NIC | Network Interface Card | Netzwerkkarte
NL-Storage | Nearline-Storage | Sekundärspeicher
TOE | TCP Offload Engine | TNIC | NAS Accelerator
NAND Flash Memory | NAND-Flash-Speicher | USB-Stick
Mount | Mounten | Mount Point
Meta
MAID | Massive Array of Idle Disks
MO | MO-Drive | Magneto-Optical Drive | Magneto-optisches Laufwerk
Mac OS
LUN | Logical Unit Number | logisches Laufwerk | logische Festplatte
Logical Unit | Logische Einheit
LTO | Linear Tape-Open | offenes Bandformat
Latency | Latenz | Signallaufzeit
JBOD | Just a bunch of Disks | Spanning | Festplattenstapel
iSCSI | Internet SCSI | Internet Small Computer Systems Interface
IP Storage
Interface | Schnittstelle:
ILM | Information Lifecycle Management
IB | Infiniband
Image | Abbild
HVD | Holographic Versatile Disk
Cold/Warm/Hot Server
HDTV | High Definition Television
HPC | High Performance Computing | High-Performance-Computing
HA | High Availability | Hochverfügbarkeit
HSM | Hierarchical Storage Management | Hierarchisches Speicher-Management | Tiered Storage | automatische Datenmigration | ILM | Information Lifecycle Management
HBA | Host Bus Adapter | Host-Bus-Adapter
Grid Storage | Grid-Speicher
GRC | Governance, Risk Management and Compliance | Betriebsführung, Risikomanagement und Compliance
GBIC | Gigabit Interface Converter
Gateway | NAS-Gateway
FDE | Full-Disk Encryption | Festplattenverschlüsselung
Fragmentation | Fragmentierung | Defragmentierung
FPGA | Field-Programmable Gate Array
Form Factor | Formfaktor | Footprint
Format | Formatierung | formatieren
Flash Memory | Flash-Speicher| Flash-RAM
Five 9s | 99,999 Prozent | 99,999 %
Fixed Data | Permanente Daten | Unveränderliche Daten | Referenzdaten| Archivdaten
File Virtualization | Dateivirtualisierung
File System | Dateisystem
File Sharing | Netzwerk-Freigaben
FICON | Escon | Fibre Connectivity | Kanalprotokoll | Enterprise System Connection
FCoE | Fibre Channel over Ethernet | FC über Ethernet
FCP | Fibre Channel Protocol | Fibre Channel | Fiber-Channel-Protokoll
Failover | Ausfallsicherung | Notbetrieb
External Storage | Externer Speicher | Sekundärer Speicher | Hilfsspeicher
ECM | Enterprise Content Management
E-Mail Archiving | E-Mail-Archivierung
E-Mail | eMail | Email | elektronische Post | electronic mail
e-Discovery | eDiscovery | Electronic Discovery
DFS | Distributed File System | Verteiltes Dateisystem | Global Name Space | Globales Dateisystem
D2D2T | Disk-to-Disk-to-Tape | Staging
DIMM | Dual Inline Memory Module
DDR SDRAM | DDR-SDRAM | Double Data Rate SDRAM
DAT/DDS | Digital Data Storage
Storage Replication Service | Speicher-Replikationsservice | Replikation | Datenreplikation | Datenreplizierung | Replizierung
Data Deduplication | Data-Deduplication | Datendeduplizierung | Deduplizierung | SIS | Single Instance Storage
Data at Rest | Ruhende Daten
Storage Snapshot | Schnappschuss | Speicherabbild | Point in Time Copy
Compression | Kompression | Komprimierung | Datenreduktion
Cluster Computing | Cluster | HPC| High Performance Cluster | Hot/Cold stand by Cluster | aktiv-/aktiv Cluster | aktiv-passiv Cluster | Mehrknotenrechner | hochverfügbare Rechnergruppe
Cloud Computing | On-Demand-Computing | Web-Services
CIFS | Common Internet File System | CIFS-Netzwerkprotokoll
CAS | Content-Addressed Storage | Inhaltsadressierter Speicher
Cache | schneller Zwischenspeicher | SLC | Second Level Cache
Business Continuity and Disaster Recovery (BCDR)
Bandwith | Bandbreite
Backup | Datensicherung | Datenkopie
Archive | Archiv
Application-aware storage
API | Application Program Interface | Programmierschnittstelle
logical partition | Logische Partition
i5/OS
GNU Linux
fault-tolerant ¦Fehlertolerant
Framework
Job-Scheduler
Java 2 Plattform, Enterprise Edition | J2EE
EmbeddedJava
embedded system | Embedded System
Debian
Cluster-Computing
Frontside-Bus
Complementary Metal-Oxide Semiconductor | CMOS
extreme ultraviolet lithography | Extreme Ultraviolet Lithography | EUV-Lithografie
Fulleren
Hyper-Threading
floating point unit | Fließkommaeinheit ¦FPU
Coprozessor | Co-Prozessor
multi-core processor | Multicore-Prozessor
Cell-Prozessor
Basic Input/Output System | BIOS
clock speed | Taktfrequenz
AIX
Unix
Workstation
Pentium
PowerPC
Complex Instruction Set Computer | CISC
reduced instruction set | RISC
ARM Prozessor
AMD
Accelerated Hub Architecture | AHA
3-D-Chip
64-bit processor | 64-Bit-Prozessor
zinc whiskers | Zink-Whisker
Umgebungstemperatur
Mainframe
skinless server | hüllenlose Server | Micro Server
water cooling | Wasserkühlung
uninterruptible power supply | Ununterbrochene Stromversorgung | USV
Zinn-Whisker
Standard Temperatur und Druck | Standardtemperatur und -Druck
Softcooling
Restriction of Hazardous Substances Directive | Richtlinie zur Beschränkung der Verwendung bestimmter gefährlicher Stoffe in Elektro- und Elektronikgeräten | RoHS
Reduce, reuse, recycle |Reduzierung, Wiederverwendung und Aufbereitung | R3
private cloud | Private Cloud
Platform as a Service | PaaS
Seebeck-Effekt
Rauschen
Heatsink | Wärmableitblech
Thermoelektrische Kühlung
Peltier effect | Peltier-Effekt
Multiprocessing
massively parallel processing | Massiv Parallele Verarbeitung | MPP
Non-Uniform Memory Access | NUMA
Cluster
SMP
parallel processing | Parallelverarbeitung
Supercomputer
Petaflop
phase-change cooling | Verdampfungskühlung
high-performance computing | High-Performance-Computing
PHase-change Liquid EXchange | ECOphlex
cap and trade system | Emissionshandel
Corporate Average Data center Efficiency | CADE
carbon neutral | CO2-neutral
carbon offset | CO2-Ausgleich
Negawatt
uptime / downtime | Betriebszeit und Ausfallzeit
intelligent power management | Intelligent Power Management | IPM
problem management |Problemmanagement
IT Servicemanagement | ITSM
incident management | Incident Management | IcM
hot/cold aisle | Warm/Kaltgang
Heizung, Lüftung, Air-Conditioning | HVAC
American Society of Heating, Refrigerating, and Air-Conditioning Engineers | ASHRAE
Heartbeat
green data center | Green Datacenter | Grünes Rechenzentrum
Economizer | Economiser
Data Center Markup Language | DCML
data center chiller | Rechenzentrums-Kältekompressoren
computer room air conditioning unit | Computerraum Air-Conditioning-Einheit
Checkpoint
Calibrated Vectored Cooling | Kalibrierte Vektor-Kühlung | CVC
Hyper-V Terminology | Hyper-V-Terminologie
systems management | Systemmanagement
Patch-Management
business process management | Business Process Management | BPM
business intelligence | Business Intelligence
application service provider | Application Service Provider
Amazon Elastic Compute Cloud
Ajax
Workload | Last
Web Services
Structured Query Language | SQL
SOA repository | SOA Repository
PostgreSQL
Middleware
IMS (Information Management System) | IMS (Information Management System)
DB2
database management system |Datenbankmanagementsystem | DBMS
data warehouse | Data Warehouse
Windows Azure | Windows Azure
virtual appliance | Virtual Appliance
Xen | Xen
VMware VMFS | VMware VMFS
Virtualization | Virtualisation | Virtualisierung
virtual server | Virtueller Server
virtual provisioning | Virtuelles Provisioning
virtual machine | Virtuelle Maschine
virtual desktop infrastructure (VDI) | Virtuelle Desktop-Infrastruktur (VDI)
virtual to physical | Virtual-to-Physical
storage virtualization | Speichervirtualisierung
server virtualization | Servervirtualisierung
physical to virtual | Physical-to-Virtual
Paravirtualization | Paravirtualisierung
Microsoft Virtual Server
Microsoft Hyper-V
live migration | Live Migration
Hypervisor | Hypervisor
host operating system | Host-Betriebssystem
hardware virtualization | Hardwarevirtualisierung
guest OS | Gastbetriebssystem
file virtualization | Dateivirtualisierung
embedded hypervisor | Embedded Hypervisor
connection broker | Verbindungsbroker
Zombie
Worm | Wurm
WEP | Wired Equivalent Privacy
WPA | WPA2 | Wi-Fi Protected Access
Web Filter | Webfilter
Vulnerability Scanner | Schwachstellenscanner
Virus
UTM | Unified Threat Management
Twofish
Trusted Platform Module | TPM
Trojan horse | Trojanisches Pferd | Trojan | Trojaner
Transport Layer Security | TLS
Token
Threat Modeling | Bedrohungsmodellierung
TKIP | Temporal Key Integrity Protocol
SYN Flooding
Strong password | Starkes Passwort | Weak Password | Schwaches Passwort
Storage Security | Storage-Sicherheit | Speichersicherheit
Steganography | Steganografie
Stateful Inspection
Spyware | Spybot
SPIT | Spam Over Internet Telephony
Spam
Social Engineering
Snort
Snooping
Sniffer
Smart Card | Smartcard
Single Sign-On | SSO
Shared Key Authentication | SKA
Session Key
Session-ID
Session Hijacking | Session-Hijacking
Security-Token | Sicherheits-Token
Security Policy | Sicherheitsrichtlinie
Security-Audit | Sicherheits-Audit
Security Assertion Markup Language | SAML
Security Accounts Manager | SAM
Secure Sockets Layer | SSL
Secure Shell | SSH
Secret Key Algorithm | Secret-Key-Algorithmus | Symmetric lgorithm | Symmetrischer Algorithmus
Script kiddy | Script-Kiddy
Sarbanes-Oxley Act | Sarbanes-Oxley Gesetz | SOX
Safe Harbor
RADIUS | Remote Authentication Dial-In User Service
PKI | Public Key Infrastructure | Public-Key-Infrastruktur
Public key | Public-Key | Öffentlicher Schlüssel
Private key | Private-Key | Privater Schlüssel | Secret Key
Pretty Good Privacy | PGP
Port scan | Portscan | Portscanner
Pop-up blocker | Pop-up-Blocker
Phishing
Pharming
Personal Firewall | Desktop Firewall
Penetration Testing | Penetration-Testing | Penetrationstest
PCI DSS | Payment Card Industry Data Security Standard
Password Cracker | Passwort-Cracker
Password | Passwort
Passphrase
OpenID
One-Time Pad | One-Time-Pad | OTP
Nonrepudiation | Nichtwiderlegbarkeit
Network Analyzer | Netzwerk-Analysesystem | Packet Analyzer | Paket-Analysesystem
Network Access Control | Netzwerk-Zugriffssteuerung | NAC
Mutual Authentication | Two-Way Authentication | Gegenseitige Authentifizierung | Zwei-Wege-Authentifizierung
MD5 | MD4 | MD2
Managed Security Services | Managed Services für Sicherheit | MSS
Man-in-the-Middle-Attack | Man-in-the-Middle-Angriff
Malware
Keylogger
Key | Schlüssel
Kerberos
JavaScript
ISO 17799 | BS 7799
Iptables
IPsec | Internet Protocol Security
IP Spoofing | IP-Spoofing
Intrusion Prevention | Angriffsvermeidung
Intrusion Detection | ID | Angriffserkennung
ISA-Server | Internet Security and Acceleration Server | ISA
Internet Key Exchange | IKE
IDEA | International Data Encryption Algorithm
Integrity | Integrität
Insider Threat | Insider Bedrohung
Initialization vector | Initialisierungsvektor | IV
Incident Response | Incident
IFrame
HTTPS
Host Intrusion Detection System | HIDS | Network Intrusion Detection System | NDIS
Honey Pot | Honeypot
Honeynet
Hoax | Virus Hoax | Virus-Hoax
Hijacking
Heuristic | Heuristik
Hash | Hashing
Hard Drive Shredder | Festplatten-Schredder
Hacker
Group Policy Object | Gruppenrichtlinienobjekt | GPO
Google Hacking
Full-Disk-Encryption | FDE
Firewall
Federated Identity Management | Föderiertes Identitätsmanagement | FIM
False rejection | Falsche Abweisung | False Rejection Rate | Falsche-Abweisung-Rate | FRR
False Acceptance | Falsche Akzeptanz | False Acceptance Rate | Falsche-Akzeptanz-Rate | FAR
Exploit
Evil twin | Doppelgänger
Ethical hacker | Ethischer Hacker
Endpoint security | Endpunkt-Sicherheit
Encryption | Verschlüsselung
Encrypting File System | Verschlüsselndes Dateisystem | EFS
E-Mail-Spoofing
Dynamic packet filter | Dynamischer Paketfilter
Drive-by-Pharming
Drive-by-Download
Disaster Recovery | Disaster Recovery Plan | Business Continuity Plan | Business Process Contingency Plan | DRP | BCP
Directory Harvest Attack | Directory-Harvest-Angriff | DHA
Digital Signature | Digitale Signatur | eSignature | Elektronische Signatur | E-Signatur
Digital Rights Management | DRM
Digital Millennium Copyright Act | DMCA
Digital Certificate | Digitales Zertifikat
Diffie-Hellman Key Exchange | Diffie-Hellman-Schlüsselaustausch | Exponential-Schlüsselaustausch
Dictionary attack | Wörterbuchangriff | Wortlistenangriff
Demilitarized Zone | DMZ |Entmilitarisierte Zone
Deep Packet Inspection | DPI
DDoS attack | DDoS-Angriff | Distributed Denial-of-Service Attack | Distributed-Denial-of-Service-Angriff
DES | Data Encryption Standard
Cryptology | Kryptologie
Cryptography | Kryptografie
Cryptanalysis | Kryptoanalyse
Cross-Site Scripting | XSS
Cracker
Cookie
CDP | Continuous Data Protection | Continuous Backup
Computer Forensics | Computerforensik | Cyberforensik
Compliance
COBIT
CCSP | Cisco Certified Security Professional
CISS | Cisco Information Security Specialist
CSO | Chief Security Officer
CISSP | Certified Information Systems Security Professional
Certificate Authority | Zertifizierungsstelle
Cache Poisoning | Cache Poisoning | DNS-Cache Poisoning
Business Continuity
Buffer Overflow | Pufferüberlauf
Brute Force | Brute-Force
Botnet | Botnetz
Block Cipher | Blockchiffre
BitLocker
Biometrics | Biometrik | Biometrie
Bayesian Filter | Bayesscher Filter
Authorization | Autorisierung
Authentication, Authorization, and Accounting | Authentifizierung, Autorisierung und Accounting | AAA
Authentication Server | Authentifizierungsserver
Authentication | Authentifizierung
Asymmetric Cryptography | Asymmetrische Kryptografie
Application Security | Anwendungssicherheit
Application Firewall | Anwendungsfirewall
Antivirus Software | Antivirus-Software | Antivirensoftware
Anonymous Web Surfing | Anonymes Websurfen
Adware
Advanced Encryption Standard | AES | Rjindael
Xmodem | X-Modem
Wireless Router | Wireless Local Area Network Routers | Wireless-Router | WLAN Router | WLAN-Router
Wireless LAN | WLAN | Wireless Local Area Network | Drahtlos-Netzwerk | Funknetzwerk | Funknetz
Wireless | drahtlos
WiMAX | Wi-Max | Worldwide Interoperability for Microwave Access
Wi-Fi Multimedia | WMM | WiFi Multimedia
Wireless Mesh Network | Wireless Mesh Networking | drahtloses Mesh-Netzwerk
WiFi | Wi-Fi | Wireless Fidelity
Wide-Area File Services | Wide Area File Services | WAFS
Web Conferencing | Web-Konferenz
Voice over WLAN | VoWLAN | VoWLAN cellular | wireless VoIP | VoWi-Fi | Wi-Fi VoIP
Voice over Internet Protocol | Voice over IP | VoIP
Virtual Routing and Forwarding | Virtual Routing | VRF
Virtual Private Network | VPN | Virtual Private LAN
Virtual Networking
UMTS | Universal Mobile Telecommunications Service
TCP | Transmission Control Protocol
UDP | User Datagram Protocol
Configuration Management | CM | Konfigurationsmanagement
UC | UCC | Unified Communications | Unified Communications & Collaboration | Unified Messaging
Twisted Pair | Twisted-Pair | verdrilltes Leitungspaar
Tunnel | Tunneling
Triple-Play Network | Triple Play | Triple-Play-Netzwerk
Terminal Server | Terminalserver
Telepresence Room | Telepresence | Telepräsenz | Videokonferenzraum
telepresence room / telepresence
Teleconference | Telekonferenz | Videokonferenz
TCP/IP | Transmission Control Protocol/Internet Protocol
Synchronous Digital Hierarchy | SDH
Subnet Mask | Fixed-Length Subnet Mask | Subnetz-Maske | Subnetzmaske
Dynamic Packet Filter | Dynamische Paketfilterung
SPI | Stateful Packet Inspection | Stateful Inspection | SI
Spanning Tree Protocol | STP | Spanning Tree | Spanning-Tree-Protokoll
SOA | Service Oriented Architecture | SOA Networking | Service-orientierte Architektur | serviceorientierte Architektur
SIP Trunking | SIP-Trunking
SIP | Session Initiation Protocol
Simple Network Management Protocol | SNMP
Simple Mail Transfer Protocol | SMTP
SaaS | Software as a Service
Routing Table | Routing-Tabelle
Switch | Routing Switch
Router | Routing | Layer-3-Switch
Route Aggregation | Route Summarization | Routenaggregation
Remote Desktop Protocol | RDP
Remote Access | Fernzugriff
Real-Time Transport Protocol | RTP | RTCP | Real-Time Transport Control Protocol
Protocol | Protokoll
Presence Technology | Präsenz | Präsenzanzeige | Präsenzermittlung
POTS | Plain Old Telephone Service | analoger Fernsprechdienst
Port
POP 3 | Post Office Protocol 3
PPPoE | Point-to-Point Protocol over Ethernet
Point-to-Point Protocol | PPP
Point-to-Point Tunneling Protocol | PPTP | Point-to-Point-Tunneling-Protokoll
PoE | Power over Ethernet
PBX | Private Branch Exchange | Telefonanlage | Nebenstellenanlage
Patch Panel | Patch-Panel | Patchfeld | Patch-Feld
Patch Cable | Patch Cord | Patchkabel | Patch-Kabel
Passive Optical Network | PON | passives optisches Netzwerk
Circuit-Switched | leitungsvermittelt
Packet-Switched | paketvermittelt
Packet Filter | Packet Filtering | Paketfilter | Paketfilterung
Network Address Translation | NAT
OpenVPN | Open Source Virtual Private Network
Networking | Vernetzung
Network Virtualization | Netzwerkvirtualisierung | Netzwerk-Virtualisierung
Network Topology | Topolgy | Netzwerktopologie | Topologie
Near Field Communication | NFC | Nahfeldkommunikation
NAP | Network Access Point
Multicast Router | Mrouter | Multicast-Router
MPLS | Multiprotocol Label Switching
Mobile-to-Mobile Convergence | MMC
Mobile VPN | Mobile Virtual Private Network
Mobile IP | Mobile IPv6 | Mobile IPv4
MIMO | Multiple Input, Multiple Output
Network Convergence | Netzwerk-Konvergenz | Konvergenz | Convergence | All-IP
Metro Ethernet
MAN | Metropolitan Area Network
LCL Layer | Logical Link Control Layer | Logical-Link-Control-Schicht | LCL-Schicht
MAC Layer | Media Access Control Layer | Media-Access-Control-Schicht | MAC-Schicht
MAC Address | Media Access Control Address | MAC-Adresse
Long Term Evolution | LTE | 4G
Logical Router | Logischer Router
Load Balancing | Lastenausgleich
PSTN | Public Switched Telephone Network | Öffentliches Telefonnetz | Fernsprechnetz
LDAP | Lightweight Directory Access Protocol
Layer Two Tunneling Protocol | L2TP | Layer-Two-Tunneling-Protokoll
Last-Mile Technology | Last Mile | Last-Mile-Technologie
LAN | Local Area Network
KVM Switch | KVM | Keyboard Video Mouse Switch | Keyboard-Video-Mouse-Switch
Jitter
ITIL | Information Technology Infrastructure Library
ISO/OSI | OSI | Open Systems Interconnection | Schichtenmodell | Network Layer | Layer 1 | Layer 2 | Layer 3 | Layer 4 | Layer 5 | Layer 6 | Layer 7
IP Telephony | Internet Protocol Telephony | IP-Telefonie | Internet-Telefonie | Internet-Protokoll-Telefonie
IP PBX | IP/PBX | IPPBX | IP-PBX | IP Private Branch Exchange | IP-Telefonanlage | IP-Nebenstellenanlage
IP Multimedia Subsystem | IMS
IP Address | IP Addressing | IP-Adresse | IP-Adressierung
Internetwork Packet Exchange | IPX
Internet Protocol | IP | IPv4 | IPv6 | Internet-Protokoll
Integrated Services Digital Network | ISDN
Infrastructure | Infrastruktur
In-Band Signaling | Out-of-Band Signaling | In-Band-Signalisierung | Out-of-Band-Signalisierung
HiperLAN
Hub
HTTP | Hypertext Transfer Protocol
HSDPA | High-Speed Downlink Packet Access
Hot Spot | Hotspot
High-Speed Circuit-Switched Data | HSCSD
H.323
Global System for Mobile Communication | GSM
Proxy-Server | Proxy Server
Gateway
Duplex
Half Duplex | Half-Duplex | Halbduplex
Full Duplex | Full-Duplex | Vollduplex
Drahtlose Festinstallation | Fixed Wireless
Konvergenz zwischen Festnetz und Mobilfunk | Fixed Mobile Convergence | FMC
File Transfer Protocol / FTP
File Server | Fileserver | File-Server
Fiber to the Home | FTTH | Fiber to the Premises | FTTP
Fiber to the Curb | FTTC
Femtocell
FDDI | Fiber Distributed Data Interface
FCoE | Fibre Channel over Ethernet | Fibre Channel over IP | Fibre Channel over TCP/IP
Ethernet
Enterprise Service Bus | ESB
Edge-Router
Dynamic Source Routing | DSR | Quality Source Routing | LQSR | Mesh Connectivity Layer | MCL
Domain Controller | Primary Domain Controller | PDC | Backup Domain Controller | BDC | Domänencontroller | Primärer Domänencontroller | Sicherungs-Domänencontroller
Static IP Address | Static IP Address/Dynamic IP Address | Dynamic IP Address | statische IP-Adresse | statische/dynamische IP-Adresse | dynamische IP-Adresse | statische IP-Adressierung | dynamische IP-Adressierung
DNS | Domain Name System
Digital Subscriber Line Access Multiplexer | DSLAM
DHCP | Dynamic Host Configuration Protocol
Deep Packet Inspection | DPI
Data-Link Layer | Data Link Layer | Sicherungsschicht
CTI | Computer-Telephony Integration | Computer Telephony Integration | Computer Telephony
Core Router | Core-Router
Communications over Internet Protocol | CoIP
CMDB | Configuration Management Database
Kategorien von Verkabelungssystemen auf Twisted-Pair-Basis | CAT 1 | CAT 2 | CAT 3 | CAT 4 | CAT 5 | CAT 6 | CAT 7
Carrier Ethernet
Brouter
Bridge
Backhaul | Rücktransport
Back-end | Backend | back-end | Front-end | Frontend | front-end
Backbone
ATM | Asynchronous Transfer Mode
ad-hoc Netzwerk | ad-hoc Network | Ad-hoc-Netzwerk
Active Directory | AD
Access Point | AP
802.3
802.11n
802.11m
802.11k
802.11j
802.11h
802.11g
802.11e
802.11d
802.11b
802.11a
802.11 | 802.11x
10BASE-T | 10Base-T | 10BaseT
100BASE-T | 100Base-T | 100BaseT | Fast Ethernet
1000BASE-T | 1000Base-T | 1000BaseT | Gigabit Ethernet