Redaktion ComputerWeekly.de TechTarget ComputerWeekly.de Network File System (NFS) 27 Juni 2014 ComputerWeekly.de Opex (Operational Expenditure) 27 Juni 2014 ComputerWeekly.de Kernel Panic 22 Juni 2014 ComputerWeekly.de Tier 1 Storage 11 Juni 2014 ComputerWeekly.de Zero-Day-Exploit 08 Juni 2014 ComputerWeekly.de Virtual Extensible LAN (VXLAN) 07 Juni 2014 ComputerWeekly.de Data Lifecycle Management (DLM) 06 Juni 2014 ComputerWeekly.de Software-defined Storage (SDS) 18 Mai 2014 ComputerWeekly.de Internet Message Access Protocol (IMAP) 18 Mai 2014 ComputerWeekly.de Post Office Protocol 3 (POP3) 17 Mai 2014 ComputerWeekly.de Unified Threat Management (UTM) 17 Mai 2014 ComputerWeekly.de Microsoft Outlook 10 Mai 2014 ComputerWeekly.de Intrusion Detection (ID): Erkennen von Einbrüchen 04 Mai 2014 ComputerWeekly.de NoSQL 01 Mai 2014 ComputerWeekly.de HTTP (Hypertext Transfer Protocol) 01 Mai 2014 ComputerWeekly.de Data Mining 27 Apr. 2014 ComputerWeekly.de Network Operating System (NOS) 27 Apr. 2014 ComputerWeekly.de „Split Brain“-Problem 19 Apr. 2014 ComputerWeekly.de Document Object Model (DOM) 13 Apr. 2014 ComputerWeekly.de Classless Inter-Domain Routing (CIDR) 13 Apr. 2014 ComputerWeekly.de Transport Layer Security (TLS) 06 Apr. 2014 ComputerWeekly.de Data as a Service (DaaS) 06 Apr. 2014 ComputerWeekly.de Internet Control Message Protocol (ICMP) 05 Apr. 2014 ComputerWeekly.de Simple Mail Transfer Protocol (SMTP) 30 März 2014 ComputerWeekly.de E-Mail Spoofing 23 März 2014 ComputerWeekly.de Cinder (OpenStack Block Storage) 02 März 2014 ComputerWeekly.de Skalierbarkeit 02 März 2014 ComputerWeekly.de OpenStack Swift 01 März 2014 ComputerWeekly.de SAP NetWeaver Business Intelligence 09 Febr. 2014 ComputerWeekly.de SAP NetWeaver 08 Febr. 2014 ComputerWeekly.de SAP Jam 02 Febr. 2014 ComputerWeekly.de In-Memory-Datenbank 25 Jan. 2014 ComputerWeekly.de Application Delivery Controller (ADC) 19 Jan. 2014 ComputerWeekly.de Logical Unit Number (LUN) 18 Jan. 2014 ComputerWeekly.de Data Center Infrastructure Management (DCIM) 04 Jan. 2014 ComputerWeekly.de SAP HANA 01 Jan. 2014 ComputerWeekly.de Chief Information Security Officer (CISO) 14 Dez. 2013 ComputerWeekly.de Crystal Reports (Crystal Reports for Enterprise) 30 Nov. 2013 ComputerWeekly.de Northbound-Interface / Southbound-Interface 30 Nov. 2013 ComputerWeekly.de Memory Paging (Speicherauslagerung) 24 Nov. 2013 ComputerWeekly.de SDN-Controller (Software-defined Networking Controller) 23 Nov. 2013 ComputerWeekly.de KVM-Hypervisor (Kernel-based Virtual Machine Hypervisor) 28 Sept. 2013 ComputerWeekly.de Mobile Device Management (MDM) 29 Aug. 2013 ComputerWeekly.de Data Loss Prevention (DLP) 22 Aug. 2013 ComputerWeekly.de OpenFlow 20 Aug. 2013 ComputerWeekly.de Denial of Service (DoS) 18 Aug. 2013 ComputerWeekly.de Man-in-the-middle-Angriff (MITM-Angriff) 13 Aug. 2013 ComputerWeekly.de Google BigTable 08 Aug. 2013 ComputerWeekly.de VMware Horizon View 24 Juli 2013 ComputerWeekly.de Object ID (OID) 03 Juni 2013 ComputerWeekly.de DNA-Storage 19 Apr. 2013 ComputerWeekly.de Domain Controller Promoter (DCPromo) 07 Apr. 2013 ComputerWeekly.de Datenhygiene 01 Apr. 2013 ComputerWeekly.de Microsoft FIM (Forefront Identity Manager) 01 Apr. 2013 ComputerWeekly.de Managed Hosting 01 Apr. 2013 ComputerWeekly.de Gehostete Dienste (Hosted Services) 01 Apr. 2013 ComputerWeekly.de Digitale Signatur (elektronische Signatur) 18 Dez. 2012 ComputerWeekly.de Cloud Controls Matrix 28 Apr. 2012 ComputerWeekly.de SOC 3 (Service Organization Control 3) 25 Apr. 2012 ComputerWeekly.de SOC 2 (Service Organization Control 2) 25 Apr. 2012 ComputerWeekly.de SSAE 16 13 Apr. 2012 ComputerWeekly.de Community-Cloud 01 Febr. 2012 ComputerWeekly.de SSD-Formfaktor 23 Jan. 2012 ComputerWeekly.de Flash-basierte Solid State Drives (SSD) 23 Jan. 2012 ComputerWeekly.de Zentralisierte Backups 06 Dez. 2011 ComputerWeekly.de Gateway für Cloud-Storage (Cloud Storage Gateway) 26 Mai 2011 ComputerWeekly.de API für Cloud-Storage (Cloud Storage API) 24 Mai 2011 ComputerWeekly.de Dual In-line Memory Module (DIMM) 18 März 2011 ComputerWeekly.de Asynchrone Replikation 14 Jan. 2011 ComputerWeekly.de Image-basiertes Backup 13 Jan. 2011 ComputerWeekly.de Stammdatenmanagement (Master Data Management, MDM) 22 Nov. 2010 ComputerWeekly.de „Türme von Hanoi“-Backups 02 Nov. 2009 ComputerWeekly.de AMD-V (AMD Virtualization) 26 Okt. 2009 ComputerWeekly.de Schlüssel in Datenbank-Management-Systemen (DBMS) 01 Okt. 2009 ComputerWeekly.de Multiprocessing 07 Apr. 2009 ComputerWeekly.de SSL VPN (Secure Sockets Layer Virtual Private Network) 01 Jan. 2009 ComputerWeekly.de Microsoft Office SharePoint Server (MOSS) 27 Okt. 2008 ComputerWeekly.de VMware Virtualcenter (vCenter) 20 März 2008 ComputerWeekly.de System-Administrator 01 Juli 2007 ComputerWeekly.de IP-Spoofing (Fälschen von IP-Adressen / Hijacking von Host-Dateien) 01 Juni 2007 ComputerWeekly.de Ethische Hacker 01 Juni 2007 ComputerWeekly.de Internetwork Packet Exchange (IPX) 30 Apr. 2007 ComputerWeekly.de Point-to-Point Protocol (PPP) 30 Apr. 2007 ComputerWeekly.de Virtual Area Network (VAN) 29 Apr. 2007 ComputerWeekly.de Asynchronous Transfer Mode (ATM) 29 Apr. 2007 ComputerWeekly.de FireWire 07 Apr. 2007 ComputerWeekly.de Token-Ring 02 Apr. 2007 ComputerWeekly.de NetBIOS (Network Basic Input/Output System) 02 Apr. 2007 ComputerWeekly.de Secure Sockets Layer (SSL) 01 März 2007 ComputerWeekly.de PKI (Public-Key-Infrastruktur) 02 Okt. 2006 ComputerWeekly.de PowerPC 20 Sept. 2006 ComputerWeekly.de Byte 01 Sept. 2006 ComputerWeekly.de Verschlüsselung 03 Juli 2006 ComputerWeekly.de Data Warehouse (Information Warehouse) 01 Juli 2006 ComputerWeekly.de Multicast 25 Febr. 2006 ComputerWeekly.de Resource Access Control Facility (RACF) 03 Nov. 2005 ComputerWeekly.de CICS (Customer Information Control System) 01 Nov. 2005 ComputerWeekly.de AIX (Advanced Interactive eXecutive) 20 Okt. 2005 ComputerWeekly.de Repeater 30 Sept. 2005 ComputerWeekly.de CD-RW (Compact Disc, Rewriteable) 21 Sept. 2005 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18