TBLEN10000: A list of abbreviations and acronyms used in the IT


IT abbreviations

Abbreviations
CPU Central Processing Unit
API Application Programming Interface
IP Internet Protokoll (also IPv4 or IPv6)
LAN Local Area Network
VPN Virtual Private Network
JSON JavaScript Object Notation
SNMP Simple Network Management Protocol
TLS Transport Layer Security
OS Operating System (e.g. Linux, Windows, MacOS)
TCP Transmission Control Protocol
GUI Graphical User Interface
MAC Media Access Control
ISP Internet Service Provider
BGP Border Gateway Protocol
AI Artivicial Intelligence
SLA Service Level Agreement
UDP User Datagram Protocol
BITS Tackground Intelligent Transfer Service
MDM Mobile Device Management
UEM Unified Endpoint Management
EMM Enterprise Mobility Management
DSGVO Datenschutzt-rundverordnung
BSI Bundesamt für Sicherheit in der Informationstechnik
OMA DM Open Mobile Alliance Device Management Protocol
DLL Dynamic Link Library
BYOD Bring/Buy your own device
IT Information Technology
OTA Over The Air
MSI Microsoft Installer
NUC Next Unit of Computing
SAML Security Assertion Markup Language
ACL Access control list
AD Active Directory
AEAD Authenticated Encryption with Associated Data
AFS Andrew File System
BIOS Basic input output system
BSD Berkeley Software Distribution
CA Certificate Authority
CIFS Common Internet File System
CLI Command Line Interface
CSR Certificate Signing Request
CVE Common Vulnerabilities and Exposures
DHCP Dynamic Host Configuration Protocol
DMA Direct Memory Access
DNS Domain Name System
EICAR European Institute for Computer Antivirus Research
FAI Fully Automatec Installation
XML Extensible Markup Language
XDG X Desktop Group
WLAN Wireless Local Area Network
WIFI Wireless Fidelity
VPN Virtual Private Network
VM Virtual Machine
VLAN Virtual Local Area Network
VDI Virtual Desktop Infrastructure
USB Universal Serial Bus
UI User Interface
GUI Graphical User Interface
UHD User Helpdesk
UEFI Unified Extensible Firmware Interface
TPM Trusted Platform Module
TLS Transport Layer Security
TCO Total Cost of Ownership
SSL Secure Sockets Layer
SSH Secure Shell
SSD Solid State Drive
SOAP Simple Object Access Protocol
SOA Service Oriented Architecture
SMTP Simple Mail Transfer Protocol
SMB Server Message Block
SID Security Identifier
SFTP Secure File Transfer Protocol
SCCM Software Center Configuration Manager
SAAS Software as a Service
RPM Red Hat Package Manager
RDP Remote Desktop Protocol
RAID Redundant Array of Independent Disks (sometimes also: Redundant Array of inexpensive disks)
PKI Public Key Infrastructure
PIN Personal Identification Number
PDP Postscript Printer Description
PDF Portable Document Format
MS Microsoft
NFS Network File System
NSS Name Service System
ODF Open Document Format
OSD On Screen Display (sometimes also: Operating System Deployment)
OSS Open Source Software
OU Organisational Unit
PAM Pluggable Authentication Modules
PBA Pre Boot Authentication
LVM Logical Volume Manager
LTS Long Term Support
LPD Line Printer Daemon
LDAP Lightweight Directory Access Protocol
ITSM IT Service Management
ISO International Organization for Standardization
IRC Internet Relay Chat
IPP Internet Printing Protocol
IoT Internet of Things
GTK Gnome Tool Kit
GPO Group Policy Object
GPL General Public License
FHS Filesystem Hierarchy Standard
REST Representational State Transfer
DFCI Device Firmware Configuration Interface
SyncML Synchronization Markup Language
SCEP Simple Certificate Enrollment Protocol
LOB Apps Line Of Business Apps (critical applications vital to running an enterprise)
BSP Board Support Package. (a low level SDK providing access to the hardware to support bare metal applications by exposing the hardware)
HEIF High Efficiency Image File Format
HMAC Hash-based Message Authentication Code
SDLC Software Development LifeCycle
XSS Cross Site Scripting
FFI Foreign Function Interface
DEP Device Enrollment Program (Apple renamed it to ADE)
ADE Automated Device Enrollment. (Apple)
VPP Volume Purchase Program (Apple)
APNS Apple Push Notification Service
GPT Generative Pre-Trained Transformer
DANE DNS-Based Authentication of Named Entities

 

Disclaimer:

The information provided in this document is intended for your information only. Lubby makes no claims to the validity of this information. Use of this information is at own risk!

About the Author

Author: Wim Peeters - Keskon GmbH & Co. KG

Wim Peeters is electronics engineer with an additional master in IT and over 30 years of experience, including time spent in support, development, consulting, training and database administration. Wim has worked with SQL Server since version 6.5. He has developed in C/C++, Java and C# on Windows and Linux. He writes knowledge base articles to solve IT problems and publishes them on the Lubby Knowledge Platform.

Latest update: 03.07.2022 | Comment: