Outlook Live Management Agent(The Microsoft Identity Lifecycle Manager (ILM) 2007 management agent provided by Microsoft to connect to Outlook Live. It is an ILM component that consists of properties, rules, and rules extensions that determine how an object is processed)
Active Directory Management Agent(The Identity Lifecycle Manager management agent provided by Microsoft to connect to Active Directory Domain Services (AD DS) or Active Directory directory service)
user management administrator(A Microsoft Online Services administrator who manages user accounts, groups, and password resets, manages support tickets, and monitors services health)
active control(In an environment capable of displaying multiple on-screen controls, the control that will be affected by current cursor movements, commands, and text entry)
directory control block(An internal NT file system (NTFS) structure in which the file system maintains the state for an open instance of a directory file)
command control block(A specifically formatted information set used in the IBM Token Ring environment that is transmitted from the application program to the adapter support software to request an operation)
CCB(A specifically formatted information set used in the IBM Token Ring environment that is transmitted from the application program to the adapter support software to request an operation)
MCB(A structure that file systems use to map the virtual block numbers (VBNs) for a file to the corresponding logical block numbers (LBNs) on the disk)
map control block(A structure that file systems use to map the virtual block numbers (VBNs) for a file to the corresponding logical block numbers (LBNs) on the disk)
volume map control block(An opaque structure that stores virtual block number (VBN) to logical block number (LBN) mappings for an a volume file of a file system)
FCB(A small block of memory temporarily assigned by a computer's operating system to hold information about an opened file. A file control block typically contains such information as the file's identification, its location on a disk, and a pointer that marks the user?s current (or last) position in the file)
Human Resources Information System Implementation(A template that outlines the steps, from an HR perspective and at a very high level, needed to implement a Human Resources Information System (HRIS))
calculated control(A control used on a form, report, or data access page to display the result of an expression. The result is recalculated each time there is a change in any of the values that the expression is based on)
control group(A set of controls that are conceptually or logically related. Controls that are conceptually related are usually viewed together but do not necessarily affect each other. Controls that are logically related affect each other)
BizTalk Management Pack diagnostics(A feature that administrators can use to see the cause and troubleshooting information for a given problem. For example, if the health of a send port appears as red, the State Change Event tab in the Operations Manager console displays the reason why it went from green to red)
dynamic control(A Web Parts control that is persisted in a personalization store; it does not appear in the declarative markup of an .aspx page. After it has been added to a page, the WebPartManager control automatically creates an instance of the control from the personaization store on future requests)
Antigen Enterprise Manager(A software product that can be used to perform centralized installation, reporting, and administration of Antigen on all servers in an environment)
control flow guard(A security feature that makes it more difficult to corrupt memory by implementing restrictions on where an application can execute code from)
RM Lockbox(The software module responsible for authenticating the valid use of protected content and protecting trusted software processing from modification and observation)
per-user control(A dynamic Web Parts control that can be personalized and permanently deleted from a page for an individual user only. A per-user control appears on the page only when the page is in user scope. Note that a per-user control can have properties that are both user-scope and shared-scope for personalization purposes)
out of band management(A feature in Configuration Manager that allows computers to be managed outside standard management channels by connecting to a supported management controller. This management channel is independent from the Configuration Manager client and the operating system)
Control Gallery(A library of controls that support user interface development. Some of these controls function as containers for other controls or content, such as images and media)
DRM component(The component of a player that handles all functions of digital rights management, such as decrypting packaged files or initiating license acquisition)
digital rights management component(The component of a player that handles all functions of digital rights management, such as decrypting packaged files or initiating license acquisition)
Microsoft Management Console(A Microsoft management display framework that provides a unified view for administering multiple integrated network applications; MMC)
Exchange Management Console(The Exchange 2007 graphical user interface (GUI) from which administrators can perform tasks to configure and manage Exchange servers. The Exchange Management Console is based on Windows Microsoft Management Console (MMC) 3.0)
root management server(The first management server installed for a management group that performs unique functions in the management group. Specifically, it hosts the SDK and Config services and is the target server that all consoles attach to)
Update Management Configuration Wizard(A wizard that guides the user through configuring the update management feature and then downloading information about current updates from Microsoft Update so the user can start deploying updates to managed computers)
version control label(A word, symbol, or other group of characters used to identify a snapshot of a set of files at a specific point in time. It is often applied by an automated build process. It can be used to view, build, or even roll back a large set of files to the state they were in when the label was applied)
Web Parts control set(The integrated set of ASP.NET software components that provide personalization, structural components such as zones and the WebPartManager control, Web Parts UI controls, and other components for building Web Parts controls and applications. Rori)
Rule Management area(The area of the Policy Filter page where administrators add and manage rules (such as Reject, Redirect, Deliver with Bcc) that define actions to take when conducting spam and virus filtering)
Source Control Explorer(A window that is used to view and manage Team Foundation source control items which can include team projects folders and files)
shared control(A Web Parts control that can appear on a Web page and be personalized when the page is in either shared or user-level personalization scope. Note that a shared control can have properties that are both user-scope and shared-scope for personalization purposes)
control device object(A device object that represents the filter driver to the system and to user-mode application and which allows applications to communicate with the filter driver directly, even before the filter is attached to a file system or volume device object)
BizTalk Management Pack alert(A notification that administrators can subscribe to in the BizTalk Server 2010 Management Pack. After subscribing to a given alert, administrators receive a notification whenever certain conditions are met. For instance, if a certain number of host instances are throttling, an alert could be raised)
Failover Cluster Management snap-in(A Microsoft Management Console (MMC) snap-in that is used to validate failover cluster configurations, create and manage failover clusters, and migrate certain settings to a cluster running the Windows Server 2008 operating system)
dominant control(ориентир для команд Align (Выровнять) и Make Same Size (Сделать одного размера) в меню Format (Формат). При выравнивании элементов управления выбранные элементы выравниваются относительно основного. При изменении размеров элементов управления выбранным элементам присваиваются размеры основного. Основной элемент управления обозначается белыми маркерами. Остальные элементы обозначаются черными маркерами. См. Microsoft glossary (VBA) ssn)
disabled control(A control that appears dimmed on a form or data access page. A disabled control cannot get the focus and will not respond to mouse clicks)
Evaluating Offshoring Strategy for HR Functions(A template that addresses, from a Human Resources perspective, the general activities that define an evaluation of an off-shoring strategy for Human Resource functions)
BizTalk Server 2010 Management Pack(A BizTalk enhancement that helps ensure full monitoring capabilities of BizTalk applications and infrastructure. It includes features like diagnostics and alerts to help monitor the health of a BizTalk deployment)
DPM Management Pack(A licensed set of processing rules, filters, and alerts, which can be imported onto a MOM Management Server to enable an administrator to centrally monitor data protection, state, health, and performance of multiple DPM servers in Microsoft System Center)
override management pack(A set of files for use with System Center Operations Manager to store overrides and change the default behavior of a rule, monitor, or discovery for a specific target, group, or object. Rori)
Control Panel(A Windows program that collects and displays for users the system-level features of the computer, including hardware and software setup and configuration. From Control Panel, users can click individual items to configure system-level features and perform related tasks)
Microsoft Lync Server Control Panel(A web-based server management user interface that administrators can use to manage their Lync Server systems from anywhere on the corporate network, without requiring specialized management software installed on their computers)
Custom Spam Filter Management option(An area on the Spam Filter page that gives IT administrators the ability to select various content attributes of a message that either increase the potential for the message to be quarantined as spam (the "spam score") or absolutely quarantine messages that contain specific attributes. Rori)
Audio Controls(An item on the View menu that displays the toolbar of controls for audio calls. Audio Controls include a Call menu for the currently selected person, microphone and speaker controls, Mute, Hang Up, and Transfer buttons)
risk management plan(A document defining how risk will be managed throughout the project. It can include identified risks, probabilities, contingency plans and methods for implementing them, and a strategy for allocating resources if a risk event occurs)
control tip(A brief phrase that describes a control, a page, or a tab. The control tip appears when the user briefly holds the mouse pointer over a control)
control tip(короткая фраза, описывающая элемент управления, объект Page или Tab. Подсказка появляется, если пользователь некоторое время удерживает указатель мыши на элементе, не нажимая кнопки. Подсказки элементов управления подобны объектам ToolTip. Приложение Microsoft Forms предоставляет объекты ToolTip разработчикам во время создания приложения, а разработчики предоставляют подсказки элементов управления конечным пользователям во время работы приложения. См. Microsoft glossary (VBA) ssn)
mobile user control(An ASP.NET mobile control derived from the System.Web.UI.MobileControls.MobileUserControl class. User controls provide containers for custom controls built from other ASP.NET mobile controls)
FMP(A Web site used by customer service representatives and support personnel to perform administrative functions such as updating information for computers that are already in the system or creating batch updates)
FlexGo Management Portal(A Web site used by customer service representatives and support personnel to perform administrative functions such as updating information for computers that are already in the system or creating batch updates)
Management Portal for Windows Azure SQL Database(A web-based, lightweight database management tool for SQL Azure databases that supports database development tasks, schema modification, Transact-SQL, and extract/deploy operations with data-tier applications)
MPR(A rule in ILM that defines a condition and the subsequent action to take when that condition is met. Management policy rules are used to model the business processing rules for incoming requests to ILM)
Management Policy Rule(A rule in ILM that defines a condition and the subsequent action to take when that condition is met. Management policy rules are used to model the business processing rules for incoming requests to ILM)
system management interrupt(An interrupt generated by the host-controller-emulation hardware when a universal serial bus (USB) keyboard or mouse data is received and steered by the host controller hardware to a System Management Interrupt (SMI) or the standard host controller interrupt)
SMI(An interrupt generated by the host-controller-emulation hardware when a universal serial bus (USB) keyboard or mouse data is received and steered by the host controller hardware to a System Management Interrupt (SMI) or the standard host controller interrupt)
validation server control(A server control, included with ASP.NET, that verifies user input. The input is checked as it comes from HTML server controls and Web server controls (for example, a Web page form) against programmer-defined requirements. Validation controls perform input checking in server code. If the user is working with a browser that supports DHTML, the validation controls can also perform validation using client script)
validator(A server control, included with ASP.NET, that verifies user input. The input is checked as it comes from HTML server controls and Web server controls (for example, a Web page form) against programmer-defined requirements. Validation controls perform input checking in server code. If the user is working with a browser that supports DHTML, the validation controls can also perform validation using client script)
remote control software(Software designed to provide access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected)
proxy management point(A secondary SMS/Configuration Manager site management point that services the Advanced Clients that are within its boundaries. Advanced Clients can use the proxy management point to request policy, upload inventory data, request package source location, and upload status messages)
hosted management agent(An Identity Lifecycle Management (ILM) component that consists of properties, rules, and rule extensions that determine how an object is processed and that provides services to client computers or organizations that connect from remote locations)
Distributed Scan Management(A feature that offers a collection of Web services, applications, and Windows services that work together to create an end-to-end experience that allows users to walk up to a copy room MFD and scan a document to a destination)
Advanced Group Policy Management(An extension to the Group Policy Management Console (GPMC) that provides change control and enhanced management for Group Policy objects (GPOs))
SMM(A mode used by some systems, typically portable computers, to perform specialized keystroke or other processing in BIOS firmware. While in SMM, the processor does not field interrupts that add to interrupt service routine (ISR) latencies)
enterprise project management(The generic field of organizational development that supports organizations in managing in an integrated fashion and adapting to changes)
role-based access control role(The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs)
cluster management role(A cluster management function that can be performed by lead hosts or a database server. The cluster management role is responsible for managing the cache hosts and, ultimately, the cache cluster)
Audit and Control Management Server(A Microsoft Office product that provides non-intrusive auditing of changes made to Excel spreadsheets and Access databases, and supports alerts, notifications and automatic workflows based on user activities such as macro or formula changes. Rori)
MOM Management Server(A computer that is responsible for monitoring and managing other computers. The MOM Management Server consists of the DAS, and the MOM Server and MOM Agent components. The MOM Management Server is an essential part of a management group)
Access Control Server(A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices)
Microsoft Exchange Key Management Server(The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
HTML server control(" An ASP.NET server control that belongs to the System.Web.UI.HtmlControls namespace. An HTML server control maps directly to an HTML element and is declared on an ASP.NET page as an HTML element marked by a runat="server" attribute, for example . In contrast to Web server controls, HTML server controls do not have an asp tag prefix. ")
ASP.NET server control(" A server-side component that encapsulates user-interface and related functionality. An ASP.NET server control derives directly or indirectly from the System.Web.UI.Control class. The superset of ASP.NET server controls includes Web server controls, HTML server controls, and ASP.NET mobile controls. The page syntax for an ASP.NET server control includes a runat="server" attribute on the control's tag.")
management certificate(An X.509 v3 certificate used to authenticate an agent (such as, the Windows Azure Tools for Visual Studio) acting on behalf of the subscription owner to manage subscription resources (such as hosted services))
Work Management Task Sync(A component of the Work Management Service that synchronizes tasks with systems outside of SharePoint, such as an Exchange mailbox, to enable task management in Outlook. Rori)
Deployment Image Servicing and Management(A framework that provides a single point for IT professionals and OEMs to service and maintain Windows images offline through a scriptable command line utility and an easily extensible infrastructure. Rori)
source control(A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why)
SACL(An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators)
System Center Management Health service(The Windows-based service responsible for executing management packs as part of the Operations Manager agent and server components)
AGPM Service(A Windows service that enables Advanced Group Policy Management (AGPM) clients to manage deployed and archived Group Policy objects (GPOs) and enforces delegation in AGPM)
ACS management service(A Representational State Transfer (REST) Web service that enables programmatic management of an ACS namespace, using the Open Data (OData) protocol)
Key Management Service(An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
AD RMS(A Microsoft technology designed to help enterprise customers control and protect critical digital information by offering easy-to-use, flexible, and persistent policy expression and enforcement)
Active Directory Rights Management Services(A Microsoft technology designed to help enterprise customers control and protect critical digital information by offering easy-to-use, flexible, and persistent policy expression and enforcement)
Work Management Service(A SharePoint shared service that aggregates tasks that systems such as SharePoint, Project Server, and Exchange assign to users. Rori)
Workflow Management service(A Windows service that manages the execution of instance control commands, the recovery of workflow service hosts, and the resumption of instances in the event of expired timers)
WMS(A Windows service that manages the execution of instance control commands, the recovery of workflow service hosts, and the resumption of instances in the event of expired timers)
Emergency Management Services(Services that enable the administrator to interact with a system that might not be available through the usual network mechanisms)
Information Rights Management Services(An information protection technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use)
control state(A field in an ASP.NET Web page that stores the current property settings for server controls on the page. Control state is used to recreate the page and reestablish previous settings on each postback)
Release key(The key combination (Ctrl+Alt+Left arrow key by default) that must be pressed to move keyboard and mouse focus from a guest operating system back to the physical computer)
access control list(In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
discretionary access control list(An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object)
Volume Activation Management Tool(An MMC snap-in that enables IT professionals to automate and centrally manage the Windows and Microsoft Office volume and retail activation process. VAMT can manage volume activation by using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS))
static control(" A Web Parts control that is part of the declarative "page persistence" markup in an .aspx page; it exists only as part of the .aspx page, not in a personalization store like a dynamic Web Parts control. Unlike a dynamic control, a static control is added to an .aspx page on every request. A static Web Parts control is always a shared control, which means that although users can both personalize and "close" the control when the page is in either shared or user scope, the control can never be permanently deleted.")
default control style(The default property setting of a control type. You customize a control type before you create two or more similar controls to avoid customizing each control individually)
non-peak power plan(A Configuration Manager power plan that you can configure with power settings that are applied outside peak hours or business hours)
peak power plan(A Configuration Manager power plan that you can configure with power settings that are applied during the peak hours or business hours that you specify)
device management point(A Configuration Manager site system that communicates with mobile device clients and that must be hosted on a Configuration Manager management point)
utility control point(A network node that provides the central reasoning point for the SQL Server Utility. It uses Utility Explorer in SQL Server Management Studio (SSMS) to organize and monitor SQL Server resource health)
UCP(A network node that provides the central reasoning point for the SQL Server Utility. It uses Utility Explorer in SQL Server Management Studio (SSMS) to organize and monitor SQL Server resource health)
Enter remote call control URI(An option in the Manually Configure Phone Integration dialog box where the user enters his phone number in the required format. To access this dialog box, click the Configure button in the Options dialog box, on the Accounts tab)
remote management(For an administrator, the process of managing Windows SteadyState Windows Disk Protection from a remote computer through Active Directory Group Policy)
remote call control(The ability to send and receive calls on a desktop phone by using a computer-supported telecommunications application, such as Lync or Communicator)
enhanced presenter controls(A collection of Lync Meeting host and presenter controls that optimizes for the type of meeting, size of audience, content, and/or video sources available to participants)
Manage Database(An option, located on the Business Contact Manager menu, in the Database Tools selection, that enables a user to manage their databases)
version control(The process of maintaining a database of all the source code and related files in a software development project to keep track of changes made during the project)
Outside Voice Control(The application that connects a mobile device to the enterprise network. Outside Voice Control enables mobile devices that are running the mobile application of Lync Server or Office Communicator Mobile to send and receive calls that come through the enterprise network, in addition to calls that come through the mobile carrier network)
Time Management(The Duet end-user application that enables users to view, create, and maintain their data for time recording activities in Microsoft Office Outlook. Users can add time-reporting data in Outlook in the form of Calendar items, which are integrated with time-reporting-compliance guidelines defined in SAP systems)
Group Policy Management(An administrative tool designed to manage Group Policy across an enterprise. This includes day-to-day tasks, such as creating, deleting, linking, and copying Group Policy objects (GPOs), as well as setting security on GPOs. The Group Policy Management snap-in also provides reporting of GPO policy settings, as well as extended lifecycle functions such as backup and restore of GPOs)
access control(A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object)
code access security(A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
UM Management(The role group that gives users the permissions to manage Unified Messaging (UM) server configurations, UM properties on mailboxes, UM prompts, and UM auto attendant configuration. Rori)
Process Lifetime Management(An operating system process that closes apps that are not foreground apps to conserve system resources, enhance battery life, and remove the burden of app management, task management, or both, from the user. When the user switches back or re-launches the app, the app starts right where it left off)
Demand Management(A feature that captures and manages work proposals in a single location. Proposals move through a customizable, multi-stage governance process that may include review, selection of proposals for approval, and tracking the execution of approved proposals through to completion)
change management(The practice of administering changes with the help of tested methods and techniques in order to avoid new errors and minimize the impact of changes)
change control(Principles and processes that facilitate the management of change without compromising the quality or integrity of an IT project or solution, through structured procedures for submitting, approving, implementing, and reviewing change requests)
source code control(A set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why)
Internet-based client management(A feature in Configuration Manager that allows you to manage computers that have the Configuration Manager client agent but do not connect into the network through a VPN or dial-up connection)
configuration management(The process of identifying and defining configuration items in a system, recording and reporting the status of configuration items and requests for change, and verifying the completeness and correctness of configuration items)
software asset management(A best practice incorporating a set of proven processes and procedures for managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. SAM practice helps to manage risk from counterfeit as well as improperly licensed software)
SAM(A best practice incorporating a set of proven processes and procedures for managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. SAM practice helps to manage risk from counterfeit as well as improperly licensed software)
supply chain management(The management of a network of interconnected businesses involved in the ultimate provision of product and service packages required by end customers)
Multilanguage(MUI) Resource Management (A centralized mechanism for managing language resources, helping developers create contextually tailored and consistent experiences by reducing code complexity and fragility; MUI)
policy-based management(A set of built-in functions that return server state information about values, objects, and settings in SQL Server. Policy Based Management allows a database administrator to declare the desired state of the system and checks the system for compliance with that state)
PBM(A set of built-in functions that return server state information about values, objects, and settings in SQL Server. Policy Based Management allows a database administrator to declare the desired state of the system and checks the system for compliance with that state)
update management(A feature that enables administrators to view, download, and deploy software updates required by operating systems and other software on managed computers)
View-Only Organization Management(The administrator role group that gives users permissions to view, but not modify, all mailboxes, public groups, and external contacts in the organization. Members can also view settings for role assignment policies, transport rules, and supervision policies)
master data management(The technology, tools, and processes required to create and maintain consistent and accurate lists of master data of an organization)
CRM(The process of building profitable customer relationships through the delivery of highly targeted interactions at all customer touch points by aligning marketing, sales and service functions and systems)
customer relations management(The business area related to managing a company's interactions with its customers, including sales, service, and delivery of product. Software solutions are designed and implemented specifically to manage this business area)
active-state power management(A power-saving mode which reserves power by ensuring efficient execution of computing tasks and by reducing the number of components running unnecessarily when not actually in use)
Active State Power Management(A power-saving mode which reserves power by ensuring efficient execution of computing tasks and by reducing the number of components running unnecessarily when not actually in use)
RemoteApp and Desktop Connection Management(A Windows Server role service for Remote Desktop Services (i.e. a RD subrole) that houses the assignment, connection handling, and execution designation policy, thus defining the contents and availability of a remote workspace)
Recipient Management(The role group that gives users the permissions to create and manage mailboxes, public groups, and external contacts. Members can also import new users, track messages sent and received by users, and manage Exchange ActiveSync settings for the organization)
product sequencing(The practice of classifying and managing characteristics of items so that products with similar characteristics can be scheduled to be produced together)
flow control(The management of data transmission between two devices, such as between the CPU and a peripheral device or between nodes in a network. It ensures that the receiver can handle all the incoming data and usually depends on a set of protocols established at the beginning of the transmission session that define how and when a sender may transmit. Flow control also enables slower-speed devices to communicate with higher-speed ones)
Mail Control(The primary navigation tab for mailflow management features in Outlook Live: Transport rules, called "rules" in Outlook Live service; Supervision policies, including closed campus supervision policy and bad words supervision policy, and anti-bullying supervision policy; IP safelisting; Domain types: hosted or shared)
quotation management(The process of creating, adjusting, issuing, processing, and tracking a quotation from beginning, when customer information is collected, to ending, when the quotation is lost, canceled, or accepted)
Web-Based Enterprise Management(WBEM – An initiative undertaken by the Distributed Management Task Force (DMTF) to provide enterprise system managers with a standard solution for management. Rori)
Web-Based Enterprise Management(An initiative undertaken by the Distributed Management Task Force (DMTF) to provide enterprise system managers with a standard solution for management; WBEM)
workflow management(A feature area of ILM 2 that deals with designing workflows, executing them and managing them. Workflow management consists of the Workflow Designer, request management and the workflow host)
enterprise resource management(The business area related to managing the financial, human, and physical assets and resources of a company. Software solutions are designed and implemented specifically to manage these assets and resources)
risk management(A proactive, formalized process for decision-making and taking action to continuously assess what can go wrong, assess and quantify the identified risks, determine what risks are important to address, implement strategies to deal with those risks, and monitor the status of risks and mitigation activities)
Scan Management(A MMC snap-in tool under Print and Document Services that is used for managing network scanners, and configuring your Distributed Scan Server and how scans should be processed)
Phone Controls(An Item on the View menu that displays the toolbar of controls for PBX phone calls. Includes a Call menu for the currently selected person, Hold, Hang Up, Announced Transfer, Unnanounced Transfer, and Dial Pad buttons)
desired configuration management(A Configuration Manager feature that provides a set of tools and resources for assessing and tracking configuration compliance of client computers in the enterprise. Rori)
identity management(The the management of the identity life cycle of entities (e.g. people, computers) during which the identity is created, documented and destroyed. Rori)
device management(The exchange of requests and responses that control and configure the operational state of a device. Device management requires the use of a Communication Class interface)
digital rights management(Any technology used to protect the interests of owners of digital content and services (such as copyright owners). Typically, authorized recipients or users must acquire a license in order to use the content)
single switch device(An assistive computer technology for people with mobility impairments. A single switch device allows users to interact with a computer by using slight body movements)
management pack file(A file that is associated with an Operations Manager management pack and that incorporates overrides, custom monitors, and custom rules)
focus of control(In a sequence diagram, the time period during which an object or actor is performing an action. Activation is represented by a thin rectangle)
dynamic management function(One of a set of built-in functions that returns server state information about values, objects, and settings in SQL Server)
Trust Center(Part of the Office Center feature that allows users to set various security and privacy options, and to see currently enforced security and privacy rules)
Windows Media Sharing Center(The primary interface used to enable sharing media to other computers and devices, and to access media sharing settings and devices that interact with the media sharing feature. If you enable sharing you can play your favorite music, videos, and pictures on any computer or device in any room in your home)
Media Sharing Center(The primary interface used to enable sharing media to other computers and devices, and to access media sharing settings and devices that interact with the media sharing feature. If you enable sharing you can play your favorite music, videos, and pictures on any computer or device in any room in your home)
Network and Sharing Center(A task page in the Windows Control Panel from where customers can get real-time status information about their network, and also make changes to settings)
Central Management store(The central database (one per organization) that contains the data to define, set up, maintain, and administer a deployment, including the deployment topology and user policies)
stewardship portal(A feature of MDS that provides centralized control over master data, including members and hierarchies and enables data model administrators to ensure data quality by developing, reviewing, and managing data models and enforcing them consistently across domains)
Central Management Server(The server role (one per organization) on one Front End pool in the deployment that manages and deploys basic configuration data to all servers that are running Lync Server. Also provides Lync Server Management Shell and file transfer capabilities)
human capital management cycle(A recurring set of recruitment, hiring, training, compensation, and performance evaluation activities performed by parties that compensate employees and contractors in exchange for services)
control template(A tree of elements that is expanded into the scene whenever a control of a particular type is found. The elements typically have properties bound to properties of the control instance)
Data Management Gateway(The gateway that allows IT to build connections to internal data sources so reports that are published to BI Sites in Office 365 will refresh either on-demand or on a scheduled basis, ensuring that customers are always looking at the latest view of their data)
control(Management of a computer and its processing abilities so as to maintain order as tasks and activities are carried out. Control applies to measures designed to ensure error-free actions carried out at the right time and in the right order relative to other data-handling or hardware-based activities)
part control(A control in the Web Parts control set that inherits directly or indirectly from the System.Web.UI.WebControls.WebParts.Part class and is used to create the primary user interface of Web Parts applications)
host control(An object that is native to a host application (such as Microsoft Office Word or Microsoft Office Excel) to which data binding and events have been added. Examples of host controls include Bookmark controls and ListObject controls)
rebar control(A container for child windows with one or more bands. Each band can contain one child window, which can be a toolbar or any other control)
Math Input Control(A control that provides integration of math handwriting recognition functionality into other applications. This control is for applications that want to include math recognition functionality but do not want to fully implement their own math recognition user interface)
ASP.NET mobile control(One of a set of ASP.NET controls designed for mobile Web applications. ASP.NET mobile controls extend their ASP.NET server control counterparts)
access control entry(An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object)
Windows UI control(A UI control available through WinUI that allow an app take on the look and feel of Windows. Regardless of the developer's choice to use HTML/JS or C++/C, the developer can create an application that carries the new Windows experience. This includes controls enabling the display, entry and manipulation of data and content including View Controls, Text Controls, Pattern Controls, Overlay Controls, Media (Video & Audio) Controls, Content Controls, Collection Controls, and Basic Controls. These controls are available for Windows Store apps)
data source control(An object that can be added to an ASP.NET Web page that encapsulates the logic required to connect to a data source, such as a database or XML file, and that can execute queries or other data-access commands. A data source control can in turn provide data to other controls on that page)
OLE container control(элемент управления Visual Basic, используемый для связи и встраивания объектов из других приложений в приложениях Visual Basic ssn)
content control(A control designed to contain content such as placeholder or sample text or images that is updated by the user, or pre-defined lists of items from which users can select)
command bar control(A built-in or custom control on a menu bar, toolbar, menu, submenu, or shortcut menu. Custom controls you can add to command bars include buttons, edit boxes, drop-down list boxes, and pop-up controls, which display a menu or submenu)
repeater control(A control that developers use to iterate over a small set of data, bind that data to an HTML template, and display it in any repeated UI)
client extension control(A user interface control that can be added to Microsoft Dynamics CRM entity forms and within the application toolbar or navigation area of an entity form. These controls are configured in XML within ISV.Config and are designed to allow the inclusion of functionality from another web application within Microsoft Dynamics CRM. There are three types of client extension controls: Menu Items, Buttons, Entity Form Navigation areas)
headered control(A control that includes a child element that labels the control. Headered controls can either include content (headered content control), or a collection of items (headered items control))
content control(A control designed to contain content such as placeholder or sample text or images that is updated by the user, or pre-defined lists of items from which users can select)
list control(A control on a form, that repeats as needed, into which users can enter text. The control can be formatted as a bulleted, numbered, or plain list)
pager control(A control that is used with a window that does not have enough display area to show all of its content. The pager control allows the user to scroll to the area of the window that is not currently in view)
mix control(A control that allows the creator of a load test scenario to adjust the distribution of tests, browser types, and network types, expressed as percentages. You adjust the percentages by moving sliders)
templated control(An ASP.NET server control that does not itself provide a visual interface but allows its users (page developers) to supply templates that provide a visual interface. When the ASP.NET page parser encounters a templated control, it parses the control's template and dynamically creates child controls that supply the visual interface. The Repeater and DataList ASP.NET server controls are templated controls. The DataGrid control is not strictly a templated control, but uses templates to customize its user interface)
Lync Online administrator controls(Provide Lync Online administrators with the ability to run Lync Online PowerShell cmdlets and assign role-based access control (RBAC) roles to other administrators in the organization)
SQL Server Data Mining Content Viewer Controls(A set of server-side controls that allow a user to browse complex mining models from any computer that has Microsoft Internet Explorer installed)
control-of-flow language(Transact-SQL keywords that control the flow of execution of SQL statements and statement blocks in triggers, stored procedures, and batches. Rori)