1 | AAC | Advanced Audio Coding |
2 | ACID特性 | Atomicity / Consistency / Isolation / Durability |
3 | ADSL | Asymmetric Digital Subscriber Line |
4 | AML・CFT | Anti–Money Laundering・Countering the Financing of Terrorism |
5 | API | Application Programming Interface |
6 | AR | Augmented Reality |
7 | ASP | Application Service Provider |
8 | AVI | Audio Video Interleave |
9 | BCM | Business Continuity Management |
10 | BCP | Business Continuity Plan |
11 | BEC | Business Email Compromise |
12 | BIOS | Basic Input Output System |
13 | BLE | Bluetooth Low Energy |
14 | BPO | Business Process Outsourcing |
15 | BSC | Balanced Scorecard |
16 | BTO | Build To Order |
17 | BYOD | Bring Your Own Device |
18 | CA | Certificate Authority |
19 | CAD | Computer Aided Design |
20 | CAL | Client Access License |
21 | CAM | Computer Aided Manufacturing |
22 | CASE | Computer Aided Software Engineering |
23 | CDN | Content Delivery Network |
24 | CDP | Career Development Program |
25 | CEO | Chief Executive Officer |
26 | CFO | Chief Financial Officer |
27 | CHO | Chief Human resource Officer |
28 | CIM | Computer Integrated Manufacturing |
29 | CIO | Chief Information Officer |
30 | CMMI | Capability Maturity Model Integration |
31 | CMY | Cyan / Magenta / Yellow |
32 | CPRM | Content Protection for Recordable Media |
33 | CPS | Cyber-Physical System |
34 | CPU | Central Processing Unit |
35 | CRL | Certificate Revocation List |
36 | CRM | Customer Relationship Management |
37 | CSF | Critical Success Factors |
38 | CSIRT | Computer Security Incident Response Team |
39 | CSR | Corporate Social Responsibility |
40 | CSS | Cascading Style Sheets |
41 | CSV | Comma-Separated Values |
42 | CTI | Computer Telephony Integration |
43 | CVC | Corporate Venture Capital |
44 | DBMS | DataBase Management System |
45 | DFD | Data Flow Diagram |
46 | DHCP | Dynamic Host Configuration Protocol |
47 | DIMM | Dual Inline Memory Module |
48 | DLP | Data Loss Prevention |
49 | DMZ | DeMilitarized Zone |
50 | DNS | Domain Name System |
51 | DoS攻撃 | Denial of Service |
52 | DRAM | Dynamic Random Access Memory |
53 | DRM | Digital Rights Management |
54 | DTP | DeskTop Publishing |
55 | DVI | Digital Visual Interface |
56 | E-R図 | Entity – Relationship |
57 | EDI | Electronic Data Interchange |
58 | EFT | Electronic File Transfer |
59 | eKYC | electronic Know Your Customer |
60 | EPS | Encapsulated PostScript |
61 | ERP | Enterprise Resource Planning |
62 | ESG投資 | Environment / Social / Governance |
63 | ESSID | Extended Service Set Identifier |
64 | ETC | Electronic Toll Collection |
65 | FIFO | First In First Out |
66 | FMS | Flexible Manufacturing System |
67 | FTP | File Transfer Protocol |
68 | FTTH | Fiber To The Home |
69 | GDPR | General Data Protection Regulation |
70 | GIS | Geographic Information System |
71 | GPS | Global Positioning System |
72 | GPU | Graphics Processing Unit |
73 | GUI | Graphical User Interface |
74 | HDD | Hard Disk Drive |
75 | HDMI | High-Definition Multimedia Interface |
76 | HEMS | Home Energy Management System |
77 | HRM | Human Resource Management |
78 | HTML | Hyper Text Markup Language |
79 | HTTP | Hyper Text Transfer Protocol |
80 | IaaS | Infrastructure as a Service |
81 | IDS | Intrusion Detection System |
82 | IEC | International Electrotechnical Commission |
83 | IEEE | Institute of Electrical and Electronic Engineers |
84 | IMAP4 | Internet Message Access Protocol |
85 | IoT | Internet of Things |
86 | IPアドレス | Internet Protocol Address |
87 | IPS | Intrusion Prevention System |
88 | IrDA | Infrared Data Association |
89 | ISMS | Information Security Management System |
90 | ISO | International Organization for Standardization |
91 | ISP | Internet Service Provider |
92 | ITIL | Information Technology Infrastructure Library |
93 | J-CRAT | Cyber Rescue and Advice Team against targeted attack of Japan |
94 | J-CSIP | Initiative for Cyber Security Information sharing Partnership of Japan |
95 | JIS | Japan Industrial Standards |
96 | KGI | Key Goal Indicator |
97 | KPI | Key Performance Indicator |
98 | KVS | Key-Value Store |
99 | LAN | Local Area Network |
100 | LIFO | Last In First Out |
101 | LPWA | Low Power Wide Area |
102 | LSI | Large Scale Integration |
103 | MaaS | Mobility as a Service |
104 | MBO | Management by Objectives / Management Buyout |
105 | MDM | Mobile Device Management |
106 | MIME | Multipurpose Internet Mail Extension |
107 | MOT | Management Of Technology |
108 | MRP | Material Requirements Planning |
109 | MTBF | Mean Time Between Failure |
110 | MTTR | Mean Time To Repair |
111 | MVNO | Mobile Virtual Network Operator |
112 | NAS | Network Attached Storage |
113 | NAT | Network Address Translation |
114 | NDA | Non-Disclosure Agreement |
115 | NFC | Near Field Communication |
116 | NIC | Network Interface Card |
117 | NTP | Network Time Protocol |
118 | OEM | Original Equipment Manufacturer |
119 | OJT | On the Job Training |
120 | OODAループ | Observe / Orient / Decide / Act |
121 | OR | Operations Research |
122 | OS | Operating System |
123 | OSS | Open Source Software |
124 | PaaS | Platform as a Service |
125 | PAN | Personal Area Network |
126 | PCI DSS | Payment Card Industry Data Security Standard |
127 | PCMCIA | Personal Computer Memory Card International Association |
128 | PDA | Personal Digital Assistant |
129 | PDCA | Plan / Do / Check / Act |
130 | PDS | Personal Data Store |
131 | PKI | Public Key Infrastructure |
132 | PMBOK | Project Management Body of Knowledge |
133 | PMO | Project Management Office |
134 | PoC | Proof of Concept |
135 | PoE | Power over Ethernet |
136 | POP | Post Office Protocol |
137 | PPM | Product Portfolio Management |
138 | RAID | Redundant Arrays of Inexpensive Disks |
139 | RAM | Random Access Memory |
140 | RAT | Remote Administration Tool |
141 | RCM | Risk Control Matrix |
142 | RFID | Radio Frequency Identification |
143 | RFM分析 | Recency / Frequency / Monetary |
144 | RFP | Request For Proposal |
145 | RGB | Red Green Blue |
146 | ROA | Return On Assets |
147 | ROE | Return On Equity |
148 | ROI | Return On Investment |
149 | ROM | Read Only Memory |
150 | RPA | Robotics Process Automation |
151 | RSS | Rich Site Summary |
152 | SaaS | Software as a Service |
153 | SCM | Supply Chain Management |
154 | SDGs | Sustainable Development Goals |
155 | SDN | Software-Defined Networking |
156 | SEO | Search Engine Optimization |
157 | SFA | Sales Force Automation |
158 | SGML | Standard Generalized Markup Language |
159 | SIEM | Security Information and Event Management |
160 | SLA | Service Level Agreement |
161 | SLCP | Software Life Cycle Process |
162 | SLM | Service Level Management |
163 | SMTP | Simple Mail Transfer Protocol |
164 | SNS | Social Networking Service |
165 | SOA | Service-Oriented Architecture |
166 | SOC | Security Operation Center |
167 | SoE | Systems of Engagement |
168 | SoR | System of Record |
169 | SRAM | Static Random Access Memory |
170 | SRI | Socially Responsible Investment |
171 | SSD | Solid State Drive |
172 | SSL | Secure Sockets Layer |
173 | SSL/TLS | Secure Sockets Layer / Transport Layer Security |
174 | SWOT分析 | Strengths / Weaknesses / Opportunities / Threats |
175 | TCO | Total Cost of Ownership |
176 | TIFF | Tagged Image File Format |
177 | TOB | Take Over Bid |
178 | TOC | Theory Of Constraints |
179 | TPM | Trusted Platform Module |
180 | TQC | Total Quality Control |
181 | TQM | Total Quality Management |
182 | UML | Unified Modeling Language |
183 | UPS | Uninterruptible Power Supply |
184 | UX | User eXperience |
185 | VDI | Virtual Desktop Infrastructure |
186 | VM | Virtual Machine |
187 | VoIP | Voice over Internet Protocol |
188 | VPN | Virtual Private Network |
189 | VR | Virtual Reality |
190 | VUI | Voice User Interface |
191 | W3C | World Wide Web Consortium |
192 | WAF | Web Application Firewall |
193 | WAN | Wide Area Network |
194 | WAV | Waveform Audio File Format |
195 | WBS | Work Breakdown Structure |
196 | WPS | Wi-Fi Protected Setup |
197 | XML | Extensible Markup Language |
198 | 4C理論 | Customer value / Customer cost / Convenience / Communication |
199 | 4P理論 | Product / Price / Place / Promotion |
コメント