Rahul Awati Contributing writer WhatIs binary 25 May 2022 WhatIs volt-ampere (VA) 23 May 2022 WhatIs moonshot 20 May 2022 WhatIs Master Boot Record (MBR) 19 May 2022 WhatIs conductor 18 May 2022 WhatIs ampere hour (Ah or amp hour) 17 May 2022 WhatIs EEPROM (electrically erasable programmable read-only memory) 11 May 2022 WhatIs field of view (FOV) 10 May 2022 WhatIs pascal 10 May 2022 WhatIs XML Schema Definition (XSD) 09 May 2022 Search Security parameter tampering 09 May 2022 Search Security security information management (SIM) 21 Apr 2022 Search Security WLAN Authentication and Privacy Infrastructure (WAPI) 20 Apr 2022 SearchWindows Server built-in administrator account 18 Apr 2022 Mobile Computing RPC over HTTP 14 Apr 2022 Search Data Management Data Dredging (data fishing) 14 Apr 2022 SearchWindows Server Client Access Server (CAS) 13 Apr 2022 SearchVMware Open Virtualization Format (OVF) 06 Apr 2022 Search Data Center kernel panic 05 Apr 2022 Search ERP demand signal repository (DSR) 15 Mar 2022 Search ITChannel line card 14 Mar 2022 Mobile Computing Wireless Transport Layer Security (WTLS) 11 Mar 2022 Search Security screened subnet 11 Mar 2022 Search Security metamorphic and polymorphic malware 10 Mar 2022 Search Unified Communications Erlang C 03 Mar 2022 Search Security North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) 02 Mar 2022 Search Software Quality Hypertext Transfer Protocol Secure (HTTPS) 02 Mar 2022 SearchVMware raw device mapping 01 Mar 2022 SearchWindows Server Exchange Management Console (EMC) 01 Mar 2022 SearchWindows Server canonical name (CNAME) 25 Feb 2022 Search Virtual Desktop virtual hard disk (VHD) 22 Feb 2022 SearchVMware VMkernel 22 Feb 2022 Search ITOperations virtual appliance 16 Feb 2022 Search Security Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) 11 Feb 2022 Search ITChannel clean install 10 Feb 2022 Mobile Computing application sandboxing 07 Feb 2022 Search Data Center Categories of twisted-pair cabling systems 07 Feb 2022 xtelligent Health IT and EHR electronic intensive care unit (eICU) 03 Feb 2022 SearchWindows Server Active Directory tree 03 Feb 2022 Search Business Analytics processing in memory (PIM) 02 Feb 2022 Search Storage Network Data Management Protocol (NDMP) 02 Feb 2022 TheServerSide.com AJAX (Asynchronous JavaScript and XML) 25 Jan 2022 Search Software Quality iterative 20 Jan 2022 Search Security Blowfish 19 Jan 2022 Search ITOperations virtual to virtual (V2V) 19 Jan 2022 Search Software Quality Software Process Improvement and Capability Determination (SPICE) 18 Jan 2022 SearchWindows Server batch file 12 Jan 2022 Search Oracle sharding 12 Jan 2022 Search Security Rijndael 11 Jan 2022 Search Security Public-Key Cryptography Standards (PKCS) 11 Jan 2022 Search ITOperations virtual 10 Jan 2022 Search ITOperations Scalable Processor Architecture (SPARC) 10 Jan 2022 Search Security trusted computing base (TCB) 10 Jan 2022 Search Security International Data Encryption Algorithm (IDEA) 29 Dec 2021 Search Security cryptographic checksum 29 Dec 2021 Search Data Center high-performance computing 28 Dec 2021 Search Security Encrypting File System (EFS) 28 Dec 2021 Search Enterprise Desktop cellular automaton (CA) 23 Dec 2021 Search ITOperations virtual to physical (V2P) 17 Dec 2021 Search Security stealth virus 16 Dec 2021 Search Security password salting 13 Dec 2021 Search Security Elk Cloner 08 Dec 2021 Search ITOperations live migration 06 Dec 2021 Search Security Twofish 02 Dec 2021 SearchWindows Server swap file (swap space or page file) 29 Nov 2021 SearchWindows Server Preboot Execution Environment (PXE) 23 Nov 2021 Search Security cookie poisoning 23 Nov 2021 Search Security cache poisoning 05 Nov 2021 Search Networking route summarization (route aggregation) 21 Oct 2021 Search Networking Variable Length Subnet Mask (VLSM) 18 Oct 2021 Search Networking Seebeck effect 18 Oct 2021 Search Networking dynamic multipoint VPN (DMVPN) 15 Oct 2021 WhatIs Uniform Resource Identifier (URI) 15 Oct 2021 Search Networking delay-tolerant network (DTN) 15 Oct 2021 WhatIs MIME (Multipurpose Internet Mail Extensions) 14 Oct 2021 Search Networking fixed-length subnet mask (FLSM) 12 Oct 2021 WhatIs lossless and lossy compression 11 Oct 2021 Search Networking flow routing 08 Oct 2021 WhatIs decompile 07 Oct 2021 Search CIO integration server 06 Oct 2021 Search Networking computer hardware 06 Oct 2021 WhatIs POP3 (Post Office Protocol 3) 04 Oct 2021 Search Networking internet metering 30 Sep 2021 Search Security Secure Electronic Transaction (SET) 30 Sep 2021 WhatIs integrated circuit (IC) 29 Sep 2021 WhatIs IMAP (Internet Message Access Protocol) 28 Sep 2021 Search Networking 100 Gigabit Ethernet (100 GbE) 22 Sep 2021 Search Security key fob 21 Sep 2021 Search Security email virus 21 Sep 2021 Search Security shadow password file 16 Sep 2021 Search Security promiscuous mode 13 Sep 2021 Search Networking deep packet inspection (DPI) 13 Sep 2021 Search CIO e-procurement (supplier exchange) 10 Sep 2021 Search Security macro virus 09 Sep 2021 Search Security certificate authority (CA) 01 Sep 2021 Search Security federated identity management (FIM) 31 Aug 2021 Search Security logic bomb 30 Aug 2021 Search Security Electronic Code Book (ECB) 27 Aug 2021 Search Networking Synchronous Data Link Control (SDLC) 25 Aug 2021 Search Security ILOVEYOU virus 23 Aug 2021 1 2 3 4 5 6