Redaktion ComputerWeekly.de TechTarget ComputerWeekly.de Loopback-Test 30 Sept. 2016 ComputerWeekly.de Windows Server Failover Clustering (WSFC) 29 Sept. 2016 ComputerWeekly.de Frame Relay 27 Sept. 2016 ComputerWeekly.de Halbduplex (Half-Duplex) 26 Sept. 2016 ComputerWeekly.de Vollduplex (Full-Duplex) 25 Sept. 2016 ComputerWeekly.de Open Database Connectivity (ODBC) 25 Sept. 2016 ComputerWeekly.de FDM (Frequency-Division Multiplexing) 24 Sept. 2016 ComputerWeekly.de Citrix Workspace Suite 23 Sept. 2016 ComputerWeekly.de CDMA (Code-Division Multiple Access) 22 Sept. 2016 ComputerWeekly.de IP PBX (IP Private Branch Exchange) 21 Sept. 2016 ComputerWeekly.de Crossover-Kabel 19 Sept. 2016 ComputerWeekly.de NFC (Near Field Communication) 18 Sept. 2016 ComputerWeekly.de Wireless Router, WLAN-Router 17 Sept. 2016 ComputerWeekly.de Verschachtelte VM (Nested VM) 16 Sept. 2016 ComputerWeekly.de Kilobit pro Sekunde (kbps) 16 Sept. 2016 ComputerWeekly.de PAN (Personal Area Network) 15 Sept. 2016 ComputerWeekly.de WPAN (Wireless Personal Area Network) 14 Sept. 2016 ComputerWeekly.de Pervasive Computing 12 Sept. 2016 ComputerWeekly.de GAAP (generally accepted accounting principles) 12 Sept. 2016 ComputerWeekly.de Cognos 11 Sept. 2016 ComputerWeekly.de PSTN (Public Switched Telephone Network) 10 Sept. 2016 ComputerWeekly.de Peripheral Component Interconnect (PCI) 06 Sept. 2016 ComputerWeekly.de Microsoft Power BI 04 Sept. 2016 ComputerWeekly.de CALMS 28 Aug. 2016 ComputerWeekly.de Microsoft Azure Resource Manager (ARM) 26 Aug. 2016 ComputerWeekly.de Metamorphe und polymorphe Malware 26 Aug. 2016 ComputerWeekly.de Microsoft Azure RemoteApp 20 Aug. 2016 ComputerWeekly.de Shared Key Authentication (SKA) 20 Aug. 2016 ComputerWeekly.de VMware Platform Services Controller (PSC) 18 Aug. 2016 ComputerWeekly.de Microsoft Office Graph 14 Aug. 2016 ComputerWeekly.de Ruby 13 Aug. 2016 ComputerWeekly.de VMware vSphere Integrated Containers (VIC) 12 Aug. 2016 ComputerWeekly.de Intel Xeon 09 Aug. 2016 ComputerWeekly.de Intel Bay Trail 09 Aug. 2016 ComputerWeekly.de Cyber-Terrorismus 07 Aug. 2016 ComputerWeekly.de MHz (Megahertz) 07 Aug. 2016 ComputerWeekly.de Microsoft Delve 07 Aug. 2016 ComputerWeekly.de Intel 8086 06 Aug. 2016 ComputerWeekly.de Electronic Code Book (ECB) 06 Aug. 2016 ComputerWeekly.de kHz (Kilohertz) 06 Aug. 2016 ComputerWeekly.de Hairpinning - NAT Loopback 05 Aug. 2016 ComputerWeekly.de VRRP (Virtual Router Redundancy Protocol) 04 Aug. 2016 ComputerWeekly.de Bit Stuffing (Bitstopfen) 03 Aug. 2016 ComputerWeekly.de X-Server 02 Aug. 2016 ComputerWeekly.de VM-BIOS (Virtual Machine Basic Input/Output System) 01 Aug. 2016 ComputerWeekly.de Node (Knoten) 31 Juli 2016 ComputerWeekly.de CD-R (Compact Disc, Recordable) 31 Juli 2016 ComputerWeekly.de ECC (Error Checking and Correcting oder Error Correction Code) 30 Juli 2016 ComputerWeekly.de DCE (Distributed Computing Environment) 30 Juli 2016 ComputerWeekly.de Video Compact Disc (VCD) 30 Juli 2016 ComputerWeekly.de Peripheral Component Interconnect Express (PCIe) 29 Juli 2016 ComputerWeekly.de Dial-up (Wählleitung, Einwahl) 29 Juli 2016 ComputerWeekly.de Terminal 27 Juli 2016 ComputerWeekly.de Distributed Virtual Switch (verteilter virtueller Switch) 25 Juli 2016 ComputerWeekly.de Grey Hat 24 Juli 2016 ComputerWeekly.de DVD-Audio (DVD-A) 24 Juli 2016 ComputerWeekly.de Vendor Lock-in 23 Juli 2016 ComputerWeekly.de DVB (Digital Video Broadcasting) 23 Juli 2016 ComputerWeekly.de Jaz-Laufwerk (Jaz-Drive) 23 Juli 2016 ComputerWeekly.de Tempest 22 Juli 2016 ComputerWeekly.de XMPP (Extensible Messaging and Presence Protocol) 19 Juli 2016 ComputerWeekly.de Xen 17 Juli 2016 ComputerWeekly.de HDLC (High-Level Data Link Control) 17 Juli 2016 ComputerWeekly.de Apache (HTTP Server) 17 Juli 2016 ComputerWeekly.de VMware VADP (VMware vStorage API for Data Protection) 15 Juli 2016 ComputerWeekly.de Cyberkrieg 15 Juli 2016 ComputerWeekly.de UTP (Unshielded Twisted Pair) 14 Juli 2016 ComputerWeekly.de Ping of Death 12 Juli 2016 ComputerWeekly.de EIGRP (Enhanced Interior Gateway Routing Protocol) 12 Juli 2016 ComputerWeekly.de Cyber-Stalking 11 Juli 2016 ComputerWeekly.de Samba 10 Juli 2016 ComputerWeekly.de SMP (Symmetric Multiprocessing) 09 Juli 2016 ComputerWeekly.de MRAM (Magnetoresistive Random Access Memory) 09 Juli 2016 ComputerWeekly.de Compliance-Risiken 09 Juli 2016 ComputerWeekly.de Data Access Objects (DAO) 09 Juli 2016 ComputerWeekly.de SFTP (Secure File Transfer Protocol, SSH File Transfer Protocol) 06 Juli 2016 ComputerWeekly.de Infrarotübertragung 05 Juli 2016 ComputerWeekly.de Patch Panel (Rangierfeld, Patchfeld) 03 Juli 2016 ComputerWeekly.de Transaktionales Marketing 03 Juli 2016 ComputerWeekly.de Sitzungsschlüssel (Session Key) 02 Juli 2016 ComputerWeekly.de PLMN (Public Land Mobile Network) 02 Juli 2016 ComputerWeekly.de Content-Filter (Informationsfilter) 01 Juli 2016 ComputerWeekly.de Flash-Dateisystem (Flash File System) 01 Juli 2016 ComputerWeekly.de Datendiebstahl (Data Breach) 28 Juni 2016 ComputerWeekly.de Speicher-Provisionierung (Storage Provisioning) 27 Juni 2016 ComputerWeekly.de CrashPlan 26 Juni 2016 ComputerWeekly.de Call-Center-Auslastung (Occupancy Rate) 26 Juni 2016 ComputerWeekly.de Netzwerkverschlüsselung - Verschlüsselung auf Netzwerkebene 25 Juni 2016 ComputerWeekly.de Software-Token 24 Juni 2016 ComputerWeekly.de Datenstruktur 18 Juni 2016 ComputerWeekly.de HELLO-Paket 17 Juni 2016 ComputerWeekly.de Screened Subnet (sicherheitsüberwachtes Subnetz; Triple-homed Firewall) 12 Juni 2016 ComputerWeekly.de Microsoft Hyper-V Shielded VM 11 Juni 2016 ComputerWeekly.de Kryptologie 11 Juni 2016 ComputerWeekly.de Microsoft Windows Server Manager 10 Juni 2016 ComputerWeekly.de Fingerprint-Scanning 10 Juni 2016 ComputerWeekly.de XFS-Dateisystem 08 Juni 2016 ComputerWeekly.de Bytes: Ein Mengenvergleich 07 Juni 2016 ComputerWeekly.de Nslookup 07 Juni 2016 ComputerWeekly.de Cache-Algorithmus 06 Juni 2016 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18