Spanish | English |
Agente de réplicas de Hyper-V | Hyper-V Replica Broker (An entity that represents a clustered server to Hyper-V Replica. Because a clustered server comprises more than one physical server, each with a different name, and because Replica requires a physical server name in order to configure replication, the Hyper-V Replica Broker provides a single name that Hyper-V Replica can use to make reference to the Replica server - without having to keep track of which physical server is actually running, even after a (clustering) failover. The Hyper-V Replica Broker is configured using Failover Cluster Manager prior to setting up Hyper-V Replica) |
certificado X.509 v3 | X.509 v3 certificate (Version 3 of the International Telecommunication Union - Telecommunication [Standardization Sector] (ITU-T) recommendation X.509 for certificate syntax and format. This is the standard certificate format used by Windows certificate-based processes. An X.509 certificate includes the public key and information about the person or entity to whom the certificate is issued, information about the certificate, plus optional information about the certification authority (CA) issuing the certificate) |
conversión V2V | V2V conversion (" The process by which a functioning virtual machine created in VMware is "converted" to an identical, or nearly identical, virtual machine in Virtual Machine Manager.") |
Microsoft JDBC Driver v4.0 para SQL Server | Microsoft JDBC Driver v4.0 for SQL Server (A Java Database Connectivity (JDBC) 4.0 compliant driver that provides robust data access to Microsoft SQL Server databases) |
protocolo de autenticación Kerberos V5 | Kerberos V5 authentication protocol (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication) |
Protocolo de oficina de correos v.3 | Post Office Protocol version 3 (An Internet standard protocol that allows a user to download e-mail from his or her inbox on a server to the client computer where messages are managed. This protocol works well for computers that are unable to maintain a continuous connection to a server) |