{"id":98409,"date":"2023-08-11T12:22:58","date_gmt":"2023-08-11T10:22:58","guid":{"rendered":"https:\/\/www.megasoft.de\/?page_id=98409"},"modified":"2024-02-26T17:31:34","modified_gmt":"2024-02-26T16:31:34","slug":"lexikon","status":"publish","type":"page","link":"https:\/\/www.megasoft.de\/en\/lexikon\/","title":{"rendered":"Lexicon"},"content":{"rendered":"<p>Das megasoft IT\u00ae-Lexikon. Eine umfangreiche Sammlung von Begriffen aus der IT und Software-Branche einfach und verst\u00e4ndlich erkl\u00e4rt. Klicken Sie einfach auf den jeweiligen Begriff  und erhalten Sie eine ausf\u00fchrliche Begriffserkl\u00e4rung.<\/p>\n\n\n\n<p>Nicht gefunden, wonach Sie gesucht haben? Rufen Sie uns an, wir helfen Ihnen gerne weiter: <\/p>\n\n\n\n<p>+49 2173 265 06 0<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">A<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/abonnement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subscription<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/adware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Adware<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/add-ins\/\" target=\"_blank\" rel=\"noreferrer noopener\">Add-ins<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/add-ons\/\" target=\"_blank\" rel=\"noreferrer noopener\">Add-ons<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ads\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ads<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/advanced-persistent-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Persistent Threats<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/annual-lizenzen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Annual-Lizenzen<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/api\/\" target=\"_blank\" rel=\"noreferrer noopener\">API<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/autorenewal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Autorenewal<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/augmented-reality\/\" target=\"_blank\" rel=\"noreferrer noopener\">Augmented Reality<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/2-faktor-authentifizierung-2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\">2-Faktor-Authentifizierung (2FA)<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">B<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/backend\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backend<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backdoor<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/backsourcing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backsourcing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/backlisting\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backlisting<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/backup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backup<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bandlaufwerk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bandlaufwerk<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bankingtrojaner\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bankingtrojaner<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bildrechte\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bildrechte<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bim\/\">BIM<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bios\/\" target=\"_blank\" rel=\"noreferrer noopener\">BIOS<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bitrate\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitrate<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/blended-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Blended Attack<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bloatware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bloadware<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/blockchain\/\" target=\"_blank\" rel=\"noreferrer noopener\">Blockchain<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/bootsektoren\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bootsektoren<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/botnets-in-der-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Botnet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/brute-force\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brute Force<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/business-e-mail-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business E-Mail Compromise<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/business-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Intelligence<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/byod\/\" target=\"_blank\" rel=\"noreferrer noopener\">BYOD<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">C<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cache\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cache<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/call-to-action-cta\/\" target=\"_blank\" rel=\"noreferrer noopener\">Call-to-Action (CTA)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cal-client-access-licenses\/\" target=\"_blank\" rel=\"noreferrer noopener\">CALs Client Access Licenses<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/captcha\/\" target=\"_blank\" rel=\"noreferrer noopener\">Captcha<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/chatbot\/\" target=\"_blank\" rel=\"noreferrer noopener\">Chatbot<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/client-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Client-Management<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cloud-telefonie\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud-Telefonie<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cookies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cookies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Compliance<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/computerwuermer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Computerw\u00fcrmer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/cross-origin-resource-sharing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cross-Origin Resource Sharing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cryptojacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cryprojacking<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/cybercrime-versicherung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybercrime-Versicherung<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">D<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/datenaggregation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Datenaggregation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/datenschutz-folgenabschaetzung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Datenschutzfolgenabsch\u00e4tzung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/dashboard\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dashboard<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ddos-angriffe\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS Angriffe<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/deutschland-sicher-im-netz\/\" target=\"_blank\" rel=\"noreferrer noopener\">Deutschland sicher im Netz<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/devops\/\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/desktop-as-a-service-daas\/\" target=\"_blank\" rel=\"noreferrer noopener\">Desktop-as-a-Service (DaaS)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/dezentralisierung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dezentralisierung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/de-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">DE-Mail<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/digital-index\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Index<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/disaster-recovery\/\" target=\"_blank\" rel=\"noreferrer noopener\">Disaster Recovery<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/dokumentenmanagementsysteme-dms\/\" target=\"_blank\" rel=\"noreferrer noopener\">DMS Dokumentenmanagementsystem<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/dns\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNS<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/document-capture\/\" target=\"_blank\" rel=\"noreferrer noopener\">Document Capture<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/doxing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Doxing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/drive-by-exploit\/\" target=\"_blank\" rel=\"noreferrer noopener\">Drive-by Exploit<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/dsgvo\/\" target=\"_blank\" rel=\"noreferrer noopener\">DSGVO<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">E<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/e-mail-archivierung\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-Mail Archivierung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/e-mail-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-Mail Spoofing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/e-mail-verschluesselung\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-Mail Verschl\u00fcsselung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/endgeraet\/\" target=\"_blank\" rel=\"noreferrer noopener\">Endger\u00e4t<\/a><\/li>\n\n\n\n<li><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">Environments<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/erp-systeme\/\" target=\"_blank\" rel=\"noreferrer noopener\">ERP System<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/etfs\/\" target=\"_blank\" rel=\"noreferrer noopener\">ETFs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/extended-detection-and-response-xdr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Extended Detection and Response (XDR)<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">F<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/filesharing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Filesharing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">Firewall<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/firmware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Firmware<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/floating-license\/\" target=\"_blank\" rel=\"noreferrer noopener\">Floating License<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/freeware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Freeware<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ftp\/\" target=\"_blank\" rel=\"noreferrer noopener\">FTP<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/frontend\/\" target=\"_blank\" rel=\"noreferrer noopener\">Frontend<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">G<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/general-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">General AI<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/grace-period\/\" target=\"_blank\" rel=\"noreferrer noopener\">Grace Period<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">H<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hacker\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hacker<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hardware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hardware<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hardware-monitoring\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hardware-Monitoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hashfunktion\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hashfunktion<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hinweisgeberschutzgesetz-hinschg\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hinweisgeberschutzgesetz<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/honeypot\/\" target=\"_blank\" rel=\"noreferrer noopener\">Honeypot<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/honeytoken\/\" target=\"_blank\" rel=\"noreferrer noopener\">Honeytoken<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/http\/\" target=\"_blank\" rel=\"noreferrer noopener\">HTTP<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hybrid-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hybrid Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/hyperlink\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hyperlink<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">I<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/iaas\/\" target=\"_blank\" rel=\"noreferrer noopener\">IaaS<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/identity-governance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Governance<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/innovationsmanagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Innovationsmanagement<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/informations-und-kommunikationstechnologie-ikt\/\" target=\"_blank\" rel=\"noreferrer noopener\">Informations- und Kommunikationstechnoligie (IKT)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/instant-messenger\/\" target=\"_blank\" rel=\"noreferrer noopener\">Instant Messenger<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/iot\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ipv4\/\" target=\"_blank\" rel=\"noreferrer noopener\">IPv4<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/it-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT-Compliance<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">K<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/kernal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kernal<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/keylogger\/\" target=\"_blank\" rel=\"noreferrer noopener\">Keylogger<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ki-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">KI-Tools<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/kuenstliche-intelligenz\/\" target=\"_blank\" rel=\"noreferrer noopener\">K\u00fcnstliche Intelligenz<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/kritis\/\" target=\"_blank\" rel=\"noreferrer noopener\">KRITIS<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/kryptowaehrung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kryptow\u00e4hrung<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">L<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/lan\/\" target=\"_blank\" rel=\"noreferrer noopener\">LAN<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/linux\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/lizenzmodelle\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lizenzmodelle<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/abonnement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subscription<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/perpetual-lizenzen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Perpetual-Lizenzen<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/annual-lizenzen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Annual-Lizenzen<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/subscription-plans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subscription-Plans<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/lizenznehmer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lizenznehmer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/lizenzverlaengerung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lizenzverl\u00e4ngerung<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/low-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">Low Code<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/lte\/\" target=\"_blank\" rel=\"noreferrer noopener\">LTE<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">M<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/mashups\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mashups<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/mindmapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">MindMapping<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">N<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/named-user\/\" target=\"_blank\" rel=\"noreferrer noopener\">Named User<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/narrow-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Narrow AI<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/nfts\/\" target=\"_blank\" rel=\"noreferrer noopener\">NFTs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/nodes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nodes (Knoten)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/einmalige-nutzungsgebuehr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nutzungsgeb\u00fchr &#8211; einmalig<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/5g-netzwerk\/\" target=\"_blank\" rel=\"noreferrer noopener\">5G-Netzwerk<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">O<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/on-premises\/\" target=\"_blank\" rel=\"noreferrer noopener\">On-Premises<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">P<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/peer-to-peer-netzwerke\/\" target=\"_blank\" rel=\"noreferrer noopener\">Peer-to-Peer Netzwerk<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/perpetual-lizenzen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Perpetual-Lizenzen<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/poolfaehig\/\" target=\"_blank\" rel=\"noreferrer noopener\">Poolf\u00e4hig<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/preflight-ueberpruefungen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Preflight-\u00dcberpr\u00fcfungen<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">R<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/ras-remote-application-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">RAS (Remote Application Service)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/startseite\/risikomanagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risikomanagement<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">S<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/smart-home\/\" target=\"_blank\" rel=\"noreferrer noopener\">Smart Home<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/spamfilter\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spamfilter<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/streaming\/\" target=\"_blank\" rel=\"noreferrer noopener\">Streaming<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/subscription-plans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subscription-Plans<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/support\/\" target=\"_blank\" rel=\"noreferrer noopener\">Support<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">T<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/t-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">T-Com<\/a><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/it-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">pliance<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/tenant\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tenant<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">V<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/virtual-reality\/\" target=\"_blank\" rel=\"noreferrer noopener\">Virtual Reality<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">W<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/wartung\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wartung<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Z<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/magazin\/zero-trust-die-schluesselkomponenten-fuer-eine-robuste-cyberabwehr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">5<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.megasoft.de\/en\/lexikon\/5g-netzwerk\/\" target=\"_blank\" rel=\"noreferrer noopener\">5G-Netzwerk<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Das megasoft IT\u00ae-Lexikon. Eine umfangreiche Sammlung von Begriffen aus der IT und Software-Branche einfach und verst\u00e4ndlich erkl\u00e4rt. Klicken Sie einfach auf den jeweiligen Begriff und erhalten Sie eine ausf\u00fchrliche Begriffserkl\u00e4rung. Nicht gefunden, wonach Sie gesucht haben? Rufen Sie uns an, wir helfen Ihnen gerne weiter: +49 2173 265 06 0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-fullwidth.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-98409","page","type-page","status-publish","hentry","wpautop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lexikon - megasoft IT GmbH &amp; Co. KG<\/title>\n<meta name=\"description\" content=\"IT-Lexikon -&gt; Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -&gt; megasoft IT\u00ae Your IT Procurement Partner\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.megasoft.de\/en\/lexikon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lexikon - megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"og:description\" content=\"IT-Lexikon -&gt; Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -&gt; megasoft IT\u00ae Your IT Procurement Partner\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.megasoft.de\/en\/lexikon\/\" \/>\n<meta property=\"og:site_name\" content=\"megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-26T16:31:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/\",\"name\":\"Lexikon - megasoft IT GmbH &amp; Co. KG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\"},\"datePublished\":\"2023-08-11T10:22:58+00:00\",\"dateModified\":\"2024-02-26T16:31:34+00:00\",\"description\":\"IT-Lexikon -> Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -> megasoft IT\u00ae Your IT Procurement Partner\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/lexikon\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.megasoft.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lexikon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"description\":\"Your IT Procurement Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.megasoft.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"width\":1400,\"height\":350,\"caption\":\"megasoft IT GmbH &amp; Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lexikon - megasoft IT GmbH &amp; Co. KG","description":"IT-Lexikon -> Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -> megasoft IT\u00ae Your IT Procurement Partner","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.megasoft.de\/en\/lexikon\/","og_locale":"en_US","og_type":"article","og_title":"Lexikon - megasoft IT GmbH &amp; Co. KG","og_description":"IT-Lexikon -> Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -> megasoft IT\u00ae Your IT Procurement Partner","og_url":"https:\/\/www.megasoft.de\/en\/lexikon\/","og_site_name":"megasoft IT GmbH &amp; Co. KG","article_modified_time":"2024-02-26T16:31:34+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.megasoft.de\/lexikon\/","url":"https:\/\/www.megasoft.de\/lexikon\/","name":"Lexikon - megasoft IT GmbH &amp; Co. KG","isPartOf":{"@id":"https:\/\/www.megasoft.de\/#website"},"datePublished":"2023-08-11T10:22:58+00:00","dateModified":"2024-02-26T16:31:34+00:00","description":"IT-Lexikon -> Alle Begriffe aus der IT und rund um Software einfach und verst\u00e4ndlich erkl\u00e4rt -> megasoft IT\u00ae Your IT Procurement Partner","breadcrumb":{"@id":"https:\/\/www.megasoft.de\/lexikon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.megasoft.de\/lexikon\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.megasoft.de\/lexikon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.megasoft.de\/"},{"@type":"ListItem","position":2,"name":"Lexikon"}]},{"@type":"WebSite","@id":"https:\/\/www.megasoft.de\/#website","url":"https:\/\/www.megasoft.de\/","name":"megasoft IT GmbH &amp; Co. KG","description":"Your IT Procurement Partner","publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.megasoft.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.megasoft.de\/#organization","name":"megasoft IT GmbH &amp; Co. KG","url":"https:\/\/www.megasoft.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","width":1400,"height":350,"caption":"megasoft IT GmbH &amp; Co. KG"},"image":{"@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-06 23:11:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/pages\/98409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/comments?post=98409"}],"version-history":[{"count":53,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/pages\/98409\/revisions"}],"predecessor-version":[{"id":102897,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/pages\/98409\/revisions\/102897"}],"wp:attachment":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media?parent=98409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}