Acronym | Definition |
---|
HRIS | Human Resources Information System |
HTTPS | Hypertext Transfer Protocol Secure |
I/O | Input/Output |
IaaS | Infrastructure as a Service |
IaC | Infrastructure as Code |
IAM | Identity and Access Management |
ICMP | Internet Control Management Protocol |
IDS | Intrusion Detection System |
IFCP | Internet Fibre Channel Protocol |
IGRP | Interior Gateway Routing Protocol |
IOPS | Input/Output Operations Per Second |
IoT | Internet of Things |
IP | Internet Protocol |
IPAM | IP Address Management |
IPC | Instructions Per Cycle |
IPMI | Intelligent Platform Management Interface |
IPS | Intrusion Prevention System |
IPSec | IP Security |
IQN | iSCSI Qualified Name |
iSCSI | Internet Small Computer System Interface |
ISNS | Internet Storage Name Service |
ISP | Internet Service Provider |
JBOD | Just a Bunch Of Disks |
JSON | JavaScript Object Notation |
KVM | Keyboard Video Mouse |
L2TP | Layer 2 Tunneling Protocol |
LAN | Local Area Network |
LDAP | Lightweight Directory Access Protocol |
LTS | Long-Term Support |
LUN | Logical Unit Number |
MAC | Mandatory Access Control |
MBR | Master Boot Record |
MDF | Main Distribution Facility |
MFA | Multi-Factor Authentication |
ML | Machine Learning |
MPIO | MultiPath I/O |
MPLS | Multiprotocol Label Switching |
MSP | Managed Service Provider |
MFTP | Managed File Transfer Protocol |
MTBF | Mean Time Between Failure |
MTTF | Mean Time To Failure |
MTTR | Mean Time To Repair |
MTU | Maximum Transmission Unit |
NAC | Network Access Control |
NAS | Network Attached Storage |
NAT | Network Address Translation |
NFS | Network File System |
NFV | Network Function Virtualization |
NIC | Network Interface Controller |
NIDS | Network Intrusion Detection System |
NIPS | Network-based Intrusion Prevention System |
NIS | Network Information Service |
NOC | Network Operations Center |
NPIV | N_Port ID Virtualization |
NS | Name Server |
NTFS | New Technology File System |
NTP | Network Time Protocol |
NTS | Network Time Security |
NVGRE | Network Virtualization using Generic Routing Encapsulation |
NVMe | Non-Volatile Memory Express |
NVMe-oF | NVMe over Fabrics |
ODBC | Open Database Connectivity |
OLA | Operational Level Agreement |
OS | Operating System |
OSI | Open Systems Interconnection |
OSPF | Open Shortest Path First |
P2P | Physical to Physical |
P2V | Physical to Virtual |
PaaS | Platform as a Service |
PAM | Privileged Access Management |
PAT | Port Address Translation |
PBX | Private (or Public) Branch Exchange |
PCI | Peripheral Component Interconnect |
PCIe | Peripheral Component Interconnect Express |
PII | Personally Identifiable Information |
PIT | Point-in-Time (backup or snapshot) |
PKI | Public Key Infrastructure |
PPTP | Point-to-point Tunneling Protocol |
QA | Quality Assurance |
QoS | Quality of Service |
RAID | Redundant Array of Independent/Inexpensive Disks |
RAM | Random Access Memory |
RBAC | Role-Based Access Control |
RDP | Remote Desktop Protocol |
ReFS | Resilient File System |
REST | Representational State Transfer |
RPO | Recovery Point Objective |
RTO | Recovery Time Objectives |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SAN | Storage Area Network |
SAS | Serial Attached SCSI |
SATA | Serial Advanced Technology Attachment |
SCP | Session Control Protocol |
SCSI | Small Computer System Interface |
SDLC | Software Development Life Cycle |
SDN | Software-Defined Network |
SDS | Software-Defined Storage |
SDWAN | Software-defined Wide-Area Network |
SFTP | Secure FTP |
SHA | Secure Hash Algorithm |
SIEM | Security Information and Event Management |
SIP | Session Initiation Protocol |
SLA | Service Level Agreement |
SMB | Server Message Block |
SMT | Simultaneous Multi-Threading |
SMTP | Simple Mail Transfer Protocol |
SNMP | Simple Network Management Protocol |
SOA | Start of Authority |
SOAP | Simple Object Access Protocol |
SoC | System-on-Chip |
SPF | Sender Protection Framework |
SQL | Structured Query Language |
SRE | Site Reliability Engineer |
SR-IOV | Single-Root Input/ Output Virtualization |
SSD | Solid State Disk |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SSO | Single Sign-On |
STT | Stateless Transport Tunneling |
TCO | Total Cost of Operations |
TCP | Transmission Control Protocol |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TPM | Trusted Platform Module |
TTL | Time to Live |
UAT | User Acceptance Testing |
UDP | Universal Datagram Protocol |
UPS | Universal Power Supply |
URL | Uniform Resource Locator |
V2P | Virtual to Physical |
V2V | Virtual to Virtual |
vADC | Virtual ADC |
VAT | Virtual Allocation Table |
vCPU | Virtual CPU |
VDI | Virtual Desktop Infrastructure |
vGPU | Virtual Graphics Processing Unit |
VHD | Virtual Hard Disk |
VLAN | Virtual LAN |
VM | Virtual Machine |
VMFS | Virtual Machine File System |
VNC | Virtual Network Computing |
vNIC | Virtual NIC |
VoIP | Voice over IP |
VPC | Virtual Private Cloud |
VPN | Virtual Private Network |
vRAM | Virtual RAM |
vSAN | Virtual SAN |
vSwitch | Virtual Switch |
VTL | Virtual Tape Library |
VXLAN | Virtual extensible LAN |
WAF | Web Application Firewall |
WAN | Wide Area Network |
WMI | Windows Management Implementation |
WWNN | World Wide Node Name |
WWPN | World Wide Port Name |
XaaS | anything as a Service |
XSS | Cross-site Scripting |
YAML | Yet Another Markup Language |
ZFS | Z File System |