Glossary Letter C
C - C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community.
C sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
C shell - C shell is the UNIX shell (command execution program, often called a command interpreter) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell.
C# (C-Sharp) - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
C, C# and C++ Cheat Sheets - We've gathered cheat sheets for fast reference to C-related information.
C-Level (C-Suite) - C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.
C-sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
C/N - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
C14N - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
C3D - C3D (pronounced SEE-THREE-DEE) is a combined hardware/software process that captures a pair of two-dimensional images, objects, or scenes and automatically reconstructs them into a digital three-dimensional (3-D) model.
C6 - WinChip (also known as the WinChip C6) is a microprocessor designed for use in business computers that run Microsoft operating systems Made by IDT, the microprocessor reportedly provides comparable performance to Intel's more expensive Pentium microprocessors as well as to the more competitively-priced K6 and the Cyrix 6X86MX.
CA - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
CA - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
CA - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
CA Privileged Access Manager - CA Privileged Access Manager is a product, available as a rack-mounted hardware appliance or a virtual appliance, that tracks and secures the usage of logins involving access to administrative control or sensitive information.
CA-ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
CaaS - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
CAB - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
cabinet file - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
cabinet file (.cab) - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
Cabir - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
cable - Coaxial cables transmit high-frequency electrical signals through connectors without interference.
cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
cable modem - A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.
cable modem termination system - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
cable modem termination system (CMTS) - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
cable TV or CATV (community antenna television) - Cable TV is also known as "CATV" (community antenna television).
CableLabs Certified Cable Modems - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
CAC - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
CAC - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
cache (computing) - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
cache algorithm - A cache algorithm is a detailed list of instructions that decides which items should be discarded in a computer's cache of information.
cache coherence - In a shared memory multiprocessor with a separate cache memory for each processor, it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory.
cache cramming - Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run.
cache engine - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
cache poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
cache poisoning (DNS poisoning, web cache poisoning) - Cache poisoning is an attack vector that exploits the way domain name system (DNS) clients and web servers improve performance by saving old responses for a specified period of time in a temporary storage area called cache.
cache server - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
cached - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
caching - Caching (pronounced “cashing”) is the process of storing data in a cache.
CACS - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
CAD - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
CAD - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
CAD/CAM (computer-aided design/computer-aided manufacturing) - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
CADE - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
CADE (Corporate Average Data center Efficiency) - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
cadmium telluride (CdTe) photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
cadmium telluride photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
CAE - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
CAE (computer-aided engineering) - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
CAES - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
Caffe2 - Caffe2 (Convolutional Architecture for Fast Feature Embedding) is an open source, high-performance framework for the development of machine learning models.
CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
cal - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
calculator - A calculator is a device that performs arithmetic operations on numbers.
CALEA - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
CALEA (Communications Assistance for Law Enforcement Act) - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
calibrate - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
Calibrated Vectored Cooling - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
Calibrated Vectored Cooling (CVC) - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
calibration - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
California Primary Care Association - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
California Primary Care Association (CPCA) - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
California Security Breach Information Act - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
California Security Breach Information Act (SB-1386) - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
call admission control - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
call center - A call center is a centralized department to which phone calls from current and potential customers are directed.
call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
call center schedule adherence - Call center schedule adherence is a common metric used in the call center to determine whether or not call center agents are working the amount of time they are scheduled to work.
call center shrinkage - Call center shrinkage is a measure of how much time is lost in the call center because agents are unavailable to receive calls.
Call Center Terms: Glossary - This is a WhatIs.
call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
call detail record - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
call failure rate - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
call failure rate (CFR) - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
call forwarding - Call forwarding is a telephone service that automatically routes the user's incoming calls to another number.
call logging - Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between agents and callers.
call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
call to action - A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.
call tree - A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.
callback - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
callback (international callback) - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
callback messaging - Callback messaging, in a call center context, is a service that allows callers to leave a message (usually personal contact information, either spoken or through the number pad) so that an agent can call them back and they retain their place in the queue.
caller ID spoofing - Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display.
calm technology - In computing, calm technology aims to reduce the "excitement" of information overload by letting the user select what information is at the center of their attention and what information is peripheral.
CALMS - CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
calorie - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
calorie (cal) - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
CAM - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
CAM - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
cam - A cam, homecam, or Webcam is a video camera, usually attached directly to a computer, whose current or latest image is requestable from a Web site.
camcorder - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
camcorder (camera recorder) - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
CamelCase - CamelCase is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized so that each word that makes up the name can easily be read.
camera recorder - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
Campbell's Law - Campbell's Law is the observation that once a metric has been identified as a primary indicator for success, its ability to accurately measure success tends to be compromised.
campus - In telecommunications, a campus is a physically contiguous association of locations such as several adjacent office buildings.
campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university, or similar organization.
CAN - A corporate area network (CAN) is a separate, protected portion of a corporation's intranet.
Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
can you hear me? (telephone voice signature scam) - "Can you hear me?" is a telephone scam in which a perpetrator creates an audio recording of the victim saying the word "yes" by asking a question that will most likely be answered affirmatively.
Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
canary test (canary deployment) - In software development, a canary is an approach to progressive deployment in which code changes are rolled out to a small number of users who have not volunteered or opted-in for testing.
cancelbot - A cancelbot is a program or bot (robot) that sends a message to one or more Usenet newsgroups to cancel (remove from posting) a certain type of message.
candela - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
candela per meter squared - The candela per meter squared (cd / m 2) is the standard unit of luminance.
candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
candidate management system - An applicant tracking system (ATS) manages the recruiting and hiring process, including job postings and job applications.
candidate relationship management - Candidate relationship management is a structured approach to handling job candidates in a company's talent pipeline.
canned air - Canned air is compressed air in a spray can with a very long nozzle that enables a precisely focused blast of air for cleaning delicate or sensitive things.
cannibalization - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
canonical - In programming, canonical means "according to the rules.
canonical name - A canonical name is the properly denoted host name of a computer or network server.
canonicalisation - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
canonicalization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
canonify - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
canonization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
canonize - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
canvas fingerprinting (CPF) - Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.
CAP - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
cap and trade system - A cap and trade system is a market-based approach to controlling pollution that allows corporations or national governments to trade emissions allowances under an overall cap, or limit, on those emissions.
CAP theorem (Brewer's theorem) - The CAP theorem is the idea that a distributed computing system is not able to provide partition tolerance, consistency and availability at the same time.
Capability Maturity Model - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
capacitance - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
capacitive scanner - A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and store a digital image of a human fingerprint.
capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
capacitor - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken to ensure that a computing infrastructure has adequate resources to handle current data processing requirements as well as the capacity to accommodate future loads.
capacity on demand - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
capacity optimization - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
capacity optimization (CO) - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
capacity planning - In information technology, capacity planning is the science and art of estimating the space, computer hardware, software and connection infrastructure resources that will be needed over some future period of time.
capacity-optimized storage - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
capacity-optimized transport - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
CAPEX - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
CAPI - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
capital expenditure - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
CAPP - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
CAPTCHA - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
capture - Capture is the process or means of obtaining and storing external data, particularly images or sounds, for use at a later time.
capture board - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
carbon capture and reuse (CCR) - Carbon capture and reuse (CCR, also sometimes seen as carbon capture and utilization or CCU) is the collection of carbon dioxide (CO2) from a high-output source point or the environment and reuse of the carbon that is captured in that process.
carbon capture and storage (CCS) - Carbon capture and storage (CCS, also sometimes standing for carbon capture and sequestration) is the collection of CO2 for storage as a gas or as a different form of carbon after separating out the oxygen.
carbon copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
carbon dioxide - Carbon dioxide (CO2) is an odorless, non-flammable gas composed of one atom of carbon and two atoms of oxygen.
carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
carbon nanotube computer - A carbon nanotube computer is one with a processor that uses carbon nanotubes as its semiconductor material.
carbon negative - Carbon negativity is the reduction of an entity’s carbon footprint to less than neutral, so that the entity in question has a net effect of removing carbon dioxide from the atmosphere rather than adding it.
carbon neutral - To be carbon neutral is to balance the amount of carbon dioxide released into the atmosphere by a particular activity, like flying, driving or operating a data center, with an equal amount of carbon sequestration or carbon offsets from a third party.
carbon offset - A carbon offset is a credit that an individual or organization can purchase to negate a carbon footprint.
Carbon Reduction Commitment - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
Carbon Reduction Commitment (CRC) - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
carbon usage effectiveness (CUE) - Carbon usage effectiveness (CUE) is a metric developed by The Green Grid to help organizations measure the amount of carbon used -- or carbon footprint -- in the daily operations of their data centers.
carbon-negative data center - A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.
Carbonite - Carbonite Inc.
card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
card (or expansion card , board , or adapter) - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
Card Bus - CardBus is the trade name for an advanced PC Card (also known as PCMCIA card) specification.
card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
card verification value - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
card-not-present fraud (card-not-present transaction) - Card-not-present (CNP) fraud is the unauthorized use of a payment card to conduct a card-not-present transaction when the cardholder cannot or does not physically present the card at the time of the transaction.
CardBus - CardBus is the trade name for an advanced PC Card (also known as PCMCIA card) specification.
cardholder data (CD) - Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data types: cardholder name, expiration date or service code (a three- or four-digit number coded onto the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe-read transaction).
cardholder data environment (CDE) - A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data, as well as any component that directly connects to or supports this network.
Cardholder Information Security Program - Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
Cardholder Information Security Program Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
cardinal - Cardinal refers to a basic or primary value.
cardinality - The term cardinality refers to the number of cardinal (basic) members in a set.
carding - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
Career horoscopes for Geeks - 2008 Career horoscopesOur own overview of what you need to focus on in 2008.
Career Learning Guides - We've gathered a collection of our learning guides and tutorials on Internet-related topics.
Career Quizzes - We've gathered a collection of our quizzes on learning and career-related topics.
Caringo Swarm - Swarm is software designed to store unstructured data on an object storage platform.
Carnivore - Carnivore was an Internet surveillance system developed for the U.
carrier cloud - A carrier cloud is a cloud computing system, or network of servers that store data in a way that it is easily accessible from multiple locations, that is owned and operated by a traditional telecommunications service provider.
carrier detect - Carrier detect (see modem lights) is a control signal between a modem and a computer that indicates that the modem detects a "live" carrier that can be used for sending and receiving information.
Carrier Ethernet - Carrier Ethernet is the use of high-bandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks (LANs).
carrier hotel - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
carrier hotel (colocation center) - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
Carrier Sense Multiple Access - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
Carrier Sense Multiple Access - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
Carrier Sense Multiple Access Collision Detect - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
Carrier Sense Multiple Access/Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
Carrier Sense Multiple Access/Collision Detect (CSMA/CD) - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
Carrier Sensitive Routing (CSR) - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
carrier signal - A carrier signal is a transmitted electromagnetic pulse or wave at a steady base frequency of alternation on which information can be imposed by increasing signal strength, varying the base frequency, varying the wave phase, or other means.
carrier to noise - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
carrier-to-noise ratio (CNR or C/N) - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
carrierless amplitude phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
carrierless amplitude phase modulation - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
carrierless amplitude/phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
carrierless amplitude/phase (CAP) - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
cartel - A cartel is a body of independent producers that work together to decide production levels and prices.
Cartesian coordinates - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
cartonization - Cartonization is a process that uses algorithms to evaluate the items in an order to determine the number and size of each carton needed to ship the order.
cartridge - Magnetic tape is one of the oldest technologies for electronic data storage.
CAS - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
CAS - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
cascading style sheet - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
Cascading Style Sheet (CSS) Cheat Sheets - We've gathered resources from around the Web to help you with CSS.
Cascading Style Sheet, level 1 (CSS1) - CSS1 (Cascading Style Sheet, level is the recommendation from the World Wide Web Consortium (W3C) for a standard cascading style sheet specification.
CASE - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
case - A case is a particular instance of something.
case study - In a business context, a case study is a documented implementation of something, such as a practice, a product or a service.
case-based reasoning (CBR) - Case-based reasoning (CBR) is an experience-based approach to solving new problems by adapting previously successful solutions to similar problems.
Cassandra - Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.
Cassandra (Apache Cassandra) - Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.
cast shadow - In graphic design, a drop shadow is an effect where an image is repeated behind itself to create the illusion that the image is floating over its background.
CAT 1 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 2 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 3 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 4 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 5 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 5E - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 6 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
CAT 7 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
catalog - In computing, a catalog is a directory of information about data sets, files, or a database.
catastrophic failure - Catastrophic failure is a complete, sudden, often unexpected breakdown in a machine, electronic system, computer or network.
catchball - Catchball is an approach to decision-making in an organization or group where ideas are pitched from one individual to another throughout the group’s hierarchy and divisions.
Categories of twisted pair cabling systems - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
Category 5 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems, such as wires, junctions, and connectors.
category management - Category management is a model that optimizes the oversight and allocation of resources by organizing related products or resources into logical groups so they can be more effectively managed.
catfish - A catfish is someone who creates a false identity online to deceive victims, often as a means of attracting romantic interest.
cathode - A cathode is the metallic electrode through which current flows out in a polarized electrical device.
cathode ray tube - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
cathode ray tube (CRT) - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
CATT - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
CATT (Computer Aided Test Tool) - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
CATV - CATV (originally "community antenna television," now often "community access television") is more commonly known as "cable TV.
CATV (community access television) - CATV (originally "community antenna television," now often "community access television") is more commonly known as "cable TV.
causation - Causation, or causality, is the capacity of one variable to influence another.
CAVE - CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens.
CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens.
Cave Automatic Virtual Environment - CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens.
CAVEman - CAVEman is an interactive, object-oriented model of a human body consisting of over 3,000 anatomically correct, catalogued and computerized body parts.
CB - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
CBA - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
CBC - Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).
CBR - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
CBT - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
CC - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
cc - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
CCD - The Continuity of Care Document (CCD) is an electronic document exchange standard for sharing patient summary information.
CCD - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
CCHIT - Certification Commission for Healthcare Information Technology - The Certification Commission for Healthcare Information Technology (CCHIT) is an independent, not-for-profit group that certifies electronic health records (EHR) and networks for health information exchange (HIE) in the United States.
CCIE - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
CCITT - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
CCITT or ITU-T (Telecommunication Standardization Sector of the International Telecommunications) - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
CCK - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
CCMP - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
CCNA - Cisco Certified Network Associaten (CCNA) is an entry-level certification for the Cisco certified professional program.
CCNA certification - Cisco Certified Network Associaten (CCNA) is an entry-level certification for the Cisco certified professional program.
CCNP - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
CCO - A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.
CCO (Corporate or Chief Compliance Officer) - A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.
CCoA - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
CCR - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
CCS - The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.
CCS - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
CCSP - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
CCTV - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
CCTV - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
CCTV (closed circuit television) - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
CD - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
cd - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
CD burner - A CD burner is the informal name for a CD recorder, a device that can record data to a compact disc.
CD burner (CD recorder) - A CD burner is the informal name for a CD recorder, a device that can record data to a compact disc.
CD i - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
CD Magneto Optical - CD-Magneto Optical (CD-MO) is a compact disc format that uses magnetic fields for data storage.
CD MO - CD-Magneto Optical (CD-MO) is a compact disc format that uses magnetic fields for data storage.
CD Plus - Enhanced CD (E-CD) is a compact disc (CD) format that enables discs to be played on either a CD player or a multimedia-capable device, such as a CD-i player, or a DVD-ROM, or CD-ROM drive, where added material can be displayed.
CD recorder - A CD burner is the informal name for a CD recorder, a device that can record data to a compact disc.
CD-Bridge Disc - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
CD-Bridge Disk - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
CD-i - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
CD-i (Compact Disc - interactive) - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
CD-Magneto Optical - CD-Magneto Optical (CD-MO) is a compact disc format that uses magnetic fields for data storage.
CD-Magneto Optical (CD-MO) - CD-Magneto Optical (CD-MO) is a compact disc format that uses magnetic fields for data storage.
CD-MO - CD-Magneto Optical (CD-MO) is a compact disc format that uses magnetic fields for data storage.
CD-R - CD-R (for compact disc, recordable) is a type of write once, read many (WORM) compact disc (CD) format that allows one-time recording on a disc.
CD-R (compact disc, recordable) - CD-R (for compact disc, recordable) is a type of write once, read many (WORM) compact disc (CD) format that allows one-time recording on a disc.
CD-R shelf life - CD-R shelf life refers to the length of time that a burned compact disc will remain viable once data has been burned onto it.
CD-ROM - .
CD-ROM XA - CD-ROM XA (Compact Disc - read-only-memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video, and audio at the same time.
CD-ROM XA (Compact Disc - read-only-memory, extended architecture) - CD-ROM XA (Compact Disc - read-only-memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video, and audio at the same time.
CD-RW - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
CD-RW (compact disc, rewriteable) - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
CD/DVD Fast Guide - Quick look-up for getting up to speed about CDs and DVDs.
CDA - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
CDAC - The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.
CDC - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
CDC - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
CDD - A contract delivery date (CDD) is the date of delivery required by a contract.
CDDI - For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.
CDDI (Copper Distributed Data Interface) - For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.
CDE - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
CDI - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
CDMA (Code-Division Multiple Access) - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
CDMA 2000 - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
CDMA One - Also see CDMA, WCDMA, and CDMA2000.
CDMA One (cdmaOne or code-division multiple access one) - Also see CDMA, WCDMA, and CDMA2000.
CDMA2000 - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
CDMA2000 (IMT-CDMA Multi-Carrier or code-division multiple access 2000) - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
cdmaOne - Also see CDMA, WCDMA, and CDMA2000.
CDN - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
CDN (content delivery network) - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
CDO - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
CDP - Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made.
CDP - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
CDPD - CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks.
CDPD (Cellular Digital Packet Data) - CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks.
CDR - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
CDR - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
cdr shelf life - CD-R shelf life refers to the length of time that a burned compact disc will remain viable once data has been burned onto it.
CDROM - .
CDSL - Also see our Fast guide to DSL.
CDSL (Consumer Digital Subscriber Line) - Also see our Fast guide to DSL.
CDSS - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
CdTe photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
CE router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
CE router (customer edge router) - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
CEBP - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
CEEDA (Certified Energy-Efficient Datacenter Award) - CEEDA is a data center certification for the efficient use of energy.
Celeron - Celeron is the low-end (and low cost) member of the family of microprocessors from Intel that is based on its P6 architecture.
CELL - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
cell - In wireless telephony, a cell is the geographical area covered by a cellular telephone transmitter.
cell breathing - Cell breathing is the constant change of the range of the geographical area covered by a cellular telephone transmitter based on the amount of traffic currently using that transmitter.
Cell of Origin - Cell of Origin (COO) is a mobile positioning technique for finding a caller's cell (the basic geographical coverage unit of a cellular telephone system) location.
Cell of Origin (COO) - Cell of Origin (COO) is a mobile positioning technique for finding a caller's cell (the basic geographical coverage unit of a cellular telephone system) location.
cell phone - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
cell phone jammer - A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use.
cell phone spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
cell phone virus - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
cell phone worm - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
Cell processor - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
Cell processor (CELL) - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
cell-Internet phone - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
cell-phone unlocking - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
cellphone virus - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
cellphone worm - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
cellular - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
cellular automata - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
cellular automaton - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
Cellular Digital Packet Data - CDPD (Cellular Digital Packet Data) is a specification for supporting wireless access to the Internet and other public packet-switched networks.
cellular phone - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
cellular telephone - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
cellular telephone (mobile telephone) - Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog or digital telecommunication in which a subscriber has a wireless connection from a mobile telephone to a relatively nearby transmitter.
Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
cellular-Internet phone - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
censorware - Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content.
Center for Humane Technology - The Center for Humane Technology (CHT) is an organization dedicated to mitigating the negative effects of digital technology, which they refer to as human downgrading.
Center for Internet Security (CIS) - The Center for Internet Security (CIS) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response.
center of excellence (CoE) - A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide best practices for a particular area of interest.
Centers for Disease Control and Prevention - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
Centers for Medicare & Medicaid Services - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
Centers for Medicare & Medicaid Services (CMS) - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
centimeter - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
centimeter (cm) - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
centimeter cubed per gram - The centimeter cubed per gram (symbolized cm 3 /g) is the standard unit of specific volume in the centimeter-gram-second (cgs) or small-unit metric system.
centimeter gram second - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
centimeter per second squared - The centimeter per second squared (symbolized cm/s 2 or cm/sec 2) is the unit of acceleration vector magnitude in the centimeter-gram-second (cgs) or small-unit metric system.
Central Identities Data Repository (CIDR) - Central Identities Data Repository (CIDR) is a government agency in India that stores and manages data for the country's Aadhaar project.
central office - In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop.
central office (CO) - In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop.
central office exchange service - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
central processing unit - CPU (central processing unit) is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.
centralized backup - Centralized backup is a process that involves automatically replicating data from remote sites and sending it over a network to a main (centralized) location for storage.
centrex - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
centrex (central office exchange service) - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
Centrino - Centrino is a technology package from Intel that provides built-in wireless support for laptop computers while making it possible to run a laptop all day (up to seven hours) without a battery recharge.
Centronics parallel interface - The Centronics parallel interface is an older and still widely-used standard I/O interface for connecting printers and certain other devices to computers.
centum call second - The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.
CenturyLink - CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.
CEO - The CEO, or chief executive officer, is the top position in an organization.
CEO (Chief Executive Officer) - The CEO, or chief executive officer, is the top position in an organization.
Ceph - Ceph is open source software providing scalable object-, block- and file-based storage under a unified system.
Ceridian - Ceridian is a human capital management software (HCM) vendor and human resources (HR) services provider headquartered in Minneapolis, Minn.
CERN - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
CERN (Conseil Europeen pour la Recherche Nucleaire) - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
Cerner Corp. - Cerner Corp.
CERT - CERT (pronounced SUHRT), officially called the CERT Coordination Center, is the Internet's official emergency team.
CERT In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
CERT-In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
certificate authority - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
Certificate of Competency - In defense contracting, a Certificate of Competency states that the holder is authorized to receive and perform on a specific government contract.
Certificate Revocation List - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
Certificate Revocation List (CRL) - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
certified 8(a) - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
certified 8a - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
Certified Associate in Project Management (CAPM) - Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification for individuals interested in entering the project management (PM) field.
Certified Cloud Security Professional (CCSP) - The Certified Cloud Security Professional (CCSP) certification is intended for experienced IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of the six CCSP domains.
certified e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
certified email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
Certified in the Governance of Enterprise IT (CGEIT) - Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance.
Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
Certified Information Systems Auditor - Certified Information Systems Auditor is a credential that demonstrates an IT professional's ability to assess risk and institute technology controls.
Certified Information Systems Auditor (CISA) - The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
Certified Information Systems Risk and Compliance Professional (CISRCP) - A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).
Certified Information Systems Security Professional - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
Certified Internet Webmaster - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
Certified Internet Webmaster (CIW) - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
Certified OpenStack Administrator - Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.
Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
Certified Wireless Networking Professional - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
Certified Wireless Networking Professional (CWNP) - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
CES (Consumer Electronics Show) - CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.
CESG - CESG is the UK government's national technical authority for information assurance (IA).
CESG Good Practice Guides (GPG) - Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.
CF card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
CFAA - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
CFB - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
CFI - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
cfl - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
CFML - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
CFML (ColdFusion Markup Language) - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
CFO - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
CFR - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
CGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
CGI - Also see FastCGI.
CGI (computer-generated imagery) - CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (AR) and virtual reality (VR) applications.
CGI scanner - A CGI (common gateway interface) scanner is a program that searches for known vulnerabilities in Web servers and application programs by testing HTTP requests against known CGI strings.
CGO - A CGO is a Chief Green Officer.
CGO (Chief Green Officer) - A CGO is a Chief Green Officer.
cgs - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
cgs system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
chaffing - Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.
chaffing and winnowing - Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.
chalcogenide RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
Challenge Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
challenge response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
Challenge-Handshake Authentication Procedure - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
Challenge-Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
challenge-response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
Chameleon Card - The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned.
change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
change control - Change control is a systematic approach to managing all changes made to a product or system.
change data capture - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
change data capture (CDC) - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
change fatigue - Change fatigue is an organizational affliction that results from management-led change initiatives.
Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
change log - A change log is a record of requests for change (RFCs) submitted for all changes in a service.
change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
change management strategy - A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.
change mode - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
change request - A change request is a formal proposal for an alteration to some product or system.
Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
channel - In telecommunications in general, a channel is a separate path through which signals can flow.
channel 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
channel associated signaling - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
channel bank - A channel bank is a device at a telephone company central office (public exchange) that converts analog signals from home and business users into digital signals to be carried over higher-speed lines between the central office and other exchanges.
channel bonding - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
channel captain - A channel captain is the individual or organization responsible for managing a particular distribution channel and overseeing channel partnerships.
channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
Channel Definition Format (CDF) - The Channel Definition Format (CDF) is a file format from Microsoft that lets you create a file that defines a Web "channel," which is a preselected Web site or group of related Web sites.
channel extender - A channel extender is a device used with IBM's S/390 line of computers to increase the maximum communication distances between the S/390 channel-connected mainframe computers, or between an S/390 and peripheral devices such as workstations, printers, and storage devices.
channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
Channel Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
Channel Service Unit/Data Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
channel-associated signaling - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
channel-associated signaling (CAS) - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
channelized T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
channelized T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
chaos engineering - Chaos engineering is the process of testing a distributed system to ensure that the system can withstand unexpected disruptions in function.
Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
chaos theory - Chaos theory is the study of nonlinear dynamics, in which seemingly random events are actually predictable from simple deterministic equations.
CHAP - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
character - In information technology, a character is a printable symbol having phonetic or pictographic meaning and usually forming part of a word of text, depicting a numeral, or expressing grammatical punctuation.
characteristic impedance of free space - The characteristic impedance of free space, also called the Z o of free space, is an expression of the relationship between the electric-field and magnetic-field intensities in an electromagnetic field (EM field) propagating through a vacuum.
characters per inch - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
charge - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
charge coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
charge cycle - The number of charge cycles a rechargeable battery can withstand before performance degrades is the accepted method of measurement for rating rechargeables’ charge cycles.
charge quantity - Charge quantity is an expression of the extent to which an object is electrically charged.
charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
charge-coupled device (CCD) - A charge-coupled device (CCD) is a light-sensitive integrated circuit that stores and displays the data for an image in such a way that each pixel (picture element) in the image is converted into an electical charge the intensity of which is related to a color in the color spectrum.
Charles Babbage - If John von Neumann is the father of modern computing, then the English mathematician and inventor Charles Babbage can be considered its grandfather.
charm offensive - A charm offensive is an intense and carefully plotted campaign to win over someone who may not be favorably disposed toward the campaigner.
chart of accounts - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
chart of accounts (COA) - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
charts - Data visualization is a graphical representation of numerical data.
chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
chat channels - Chat channels are technologies enabling companies to engage with customers in live conversations.
chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
chatbot - A chatbot -- sometimes referred to as a chatterbot -- is programming that simulates the conversation or "chatter" of a human being through text or voice interactions.
ChatOps - ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed.
Chatter (Salesforce Chatter) - Chatter is an enterprise collaboration platform from Salesforce, a cloud-based customer relationship management (CRM) vendor.
chatting - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
chatty protocol - A chatty protocol is an application or routing protocol that requires a client or server to wait for an acknowledgement before it can transmit again.
CHDR - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
Cheapernet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
cheat sheet - A cheat sheet is a piece of paper with information written down on it that an unethical person might create if they weren't prepared for a test.
Cheat Sheet - Characters and quotes from The Phoenix Project - Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot.
Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project' - Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.
Cheat Sheets and Quick Reference Guides - A handy collection of thing you may need to look up frequently.
cheatsheet - A cheat sheet is a piece of paper with information written down on it that an unethical person might create if they weren't prepared for a test.
check digit - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
check digit (checksum character) - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
checkpoint - A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine.
checksum - A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions.
checksum character - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
CHI - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
chief analytics officer - The chief analytics officer is a C-level position responsible for data analysis within an organization.
chief architect (chief IT architect) - In information technology (IT), a chief architect is a c-level executive whose job is to look closely at how IT functions can be centralized so that departments across the company can work together seamlessly.
Chief Complicance Officer - A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.
chief customer officer (CCO) - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
chief data officer (CDO) - A chief data officer (CDO) is a C-level executive who is responsible for an organization's data use and data governance.
Chief Digital Officer (CDO) - A chief digital officer (CDO) is an executive enlisted to help businesses transform traditional IT policies and business processes to accommodate digital sectors such as mobile technology and applications and Web-based information management and marketing trends.
Chief Executive Officer - The CEO, or chief executive officer, is the top position in an organization.
chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
Chief Financial Officer - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
Chief Green Officer - A CGO is a Chief Green Officer.
Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
Chief Information Officer - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
Chief IoT Officer (Chief Internet of Things Officer) - A Chief Internet of Things Officer is an enterprise executive in charge of how smart products are developed and implemented to best support company objectives and goals.
Chief Knowledge Officer - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
chief learning officer (CLO) - A chief learning officer (CLO) is a senior-level executive who ensures that a company's corporate learning program and strategy supports its overall business goals.
chief marketing technologist (CMT) - A chief marketing technologist (CMT) is a C-level executive who sets a technology vision for the marketing team that aligns with business goals.
Chief Medical Information Officer - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
Chief Operating Officer (COO) - A Chief Operating Officer (COO) is the corporate executive who oversees ongoing business operations within the company.
Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
Chief Process and Innovation Officer - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
Chief Process and Innovation Officer (CPIO) - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
chief procurement officer (CPO) - A chief procurement officer (CPO) is an executive title commonly given to the person responsible for the strategic acquisition of goods and services at an organization.
chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
chief reputation officer (CRO) - A chief reputation officer (CRO) is the C-level corporate executive charged with overseeing activities in all areas of an organization that could potentially have an impact on the public perception of that enterprise.
Chief Risk Officer - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
Chief Security Officer - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
Chief Social Scientist (Senior Social Scientist) - A Chief (or Senior) Social Scientist is a sociologist who provides advice to government officials or corporate executives concerning the roles of individuals and institutions in human society.
chief storyteller - A chief storyteller is an employee of an organization tasked with wording the company's mission, history and messages about their brand, also known as their story, as they want it to be heard internally and externally.
Chief Strategy Officer (CSO) - A chief strategy officer (CSO), or chief strategist, is an executive charged with helping formulate, facilitate and communicate the overarching strategy of an organization, usually a large corporation.
Chief Sustainability Officer - A CGO is a Chief Green Officer.
Chief Technology Officer (CTO) - The Chief Technology Officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
Chief Transformation Officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information and how it is protected.
chief visionary officer - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
child partition - A child partition is a logical hard drive division in the Microsoft Hyper-V environment that runs an isolated operating system.
chiller - A data center chiller is a cooling system used in a data center to remove heat from one element and deposit it into another element.
chilling effect - The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.
CHIME - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
CHIME (College of Healthcare Information Management Executives) - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
Chinese wall - A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information.
Chinese wall method - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
Chip and PIN - Chip and PIN is a UK government-backed initiative to implement the EMV (Europay, Mastercard and Visa) standard for smart card payment authorization.
chip art - Microchip art is a microscopic non-functioning drawing impressed on the surface of the design mask used in the production of microchip s.
chip set - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
chipping rate - Megachips per second (Mcps) is a measure of the speed with which encoding elements, called chips (not to be confused with microchips), are generated in Direct Sequence Spread Spectrum (DSSS) signals.
chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
chmod - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
chmod (change mode) - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
choreography - Choreography, in a Web services context, refers to specifications for how messages should flow among diverse, interconnected components and applications to ensure optimum interoperability.
chorus - In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface (MIDI).
Chrome Remote Desktop - Chrome Remote Desktop is an extension of the Google Chrome browser that allows a user to remotely see and control another user's desktop through the browser window.
Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
CHTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
chucking - In computer and telephone use, chucking is the process of discarding a small piece of hardware by violent means, such as hurling it out a window, against a wall, or into a body of water.
churn - In a general context, churn is a synonym for agitation or turnover.
churn (agitation or turnover) - In a general context, churn is a synonym for agitation or turnover.
churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
CI - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
CI - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
CICS - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
CIDR - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
CIDR - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
CIFS - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
CIM - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
cinema pulldown 3:2 - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
cinemagraph - A cinemagraph is an image that combines still photography with active video to create a picture that contains a small moving element while the rest is frozen.
cinematography (cinematographer) - Cinematography is a blend of science and art used to capture, manipulate and store moving images for the purpose of creating a motion picture.
CIO - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
cipher - In cryptology, the discipline concerned with the study of cryptographic algorithms, a cipher is an algorithm for encrypting and decrypting data.
cipher block chaining - Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).
cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).
CipherCloud - CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications.
ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
ciphertext feedback - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
ciphertext feedback (CFB) - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
CIR - committed information rate.
circuit - In electronics, a circuit is a path between two or more points along which an electrical current can be carried.
circuit bending - Circuit bending is the practice of modifying existing electronics items, most often toys, to create other items, usually musical instruments.
circuit breaker - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
circuit switched data - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
circuit-switched - Circuit-switched is a type of network in which a physical path is obtained for and dedicated to a single connection between two end-points in the network for the duration of the connection.
circular economy - A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.
circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
circular mil - The circular mil is a unit of area used especially when denoting the cross-sectional size of a wire or cable.
CISA - Certified Information Systems Auditor is a credential that demonstrates an IT professional's ability to assess risk and institute technology controls.
CISC - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
Cisco Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
Cisco Catalyst Blade Switch 3020 - The Cisco Catalyst Blade Switch 3020 is a switch designed for the Hewlett-Packard (HP) BladeSystem c-Class of blade servers.
Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
Cisco Certified Internetwork Expert - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
Cisco Certified Network Associate - Cisco Certified Network Associaten (CCNA) is an entry-level certification for the Cisco certified professional program.
Cisco Certified Network Professional - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
Cisco Certified Security Professional - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
Cisco Certified Security Professional (CCSP) - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
Cisco Cloud Builder - Cisco Cloud Builder is one of three tracks within the Cisco Cloud Partner Program.
Cisco Cloud Partner Program - The Cisco Cloud Partner Program is an initiative by Cisco to help its channel partners enter the cloud computing marketplace.
Cisco Discovery Protocol - The Cisco Discovery Protocol is a Layer-2 protocol used to share data about other Cisco equipment that is directly connected nearby.
Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
Cisco Identity Services Engine - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
Cisco Information Security Specialist - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
Cisco Information Security Specialist (CISS) - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
Cisco Integrated Service Routers Generation 2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
Cisco Integrated Service Routers Generation 2 (ISR G2) - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches.
Cisco Jasper - Cisco Jasper is a branch of the networking company that provides a cloud-based software platform for businesses looking to provide cloud services.
Cisco LISP (Location Identifier Separation Protocol) - LISP (Location Identifier Separation Protocol) is a routing and addressing architecture developed by Cisco Systems.
Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
Cisco Systems, Inc. - Cisco Systems, Inc.
Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
CISP PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
CISP-PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
CISP-PCI (Cardholder Information Security Program - Payment Card Industry Data Security Standard) - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
CISPA - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
CISS - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
CISSP - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
citizen data scientist - A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational background in data analytics (DA) or business intelligence (BI).
citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
citizen relationship management - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
Citizen's Band Radio - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
Citizen's Band Radio (CB) - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
Citrix - Citrix is an American corporation that produces software designed to facilitate secure access to applications and content.
Citrix App Layering (formerly Citrix AppDisk) - Citrix App Layering, formerly Citrix AppDisk, is a tool that delivers applications in layers independently from the virtual desktop operating system.
Citrix AppDNA - Citrix AppDNA is an application testing and management technology for XenApp and XenDesktop that analyzes virtual applications' compatibility with specific operating systems and configurations.
Citrix certfication - Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.
Citrix Cloud - Citrix Cloud is a workspace management tool IT can use to deliver resources, including virtual desktops and apps, to users from a public or private cloud, on-premises deployment, or all three.
Citrix Cloud Provider Program - The Citrix Cloud Provider Program is an invitation-only partner program for cloud computing service providers.
Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
Citrix Director - Citrix Director is a management console in XenDesktop and XenApp that allows IT administrators to monitor virtual desktop and application deployments, including user and infrastructure tracking.
Citrix FlexCast - Citrix FlexCast is a delivery technology that allows an IT administrator to personalize virtual desktops to meet the performance, security and flexibility requirements of end users.
Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of remote display and graphics acceleration technologies designed to optimize the user experience of resource-intensive virtual applications on the XenDesktop and XenApp platforms.
Citrix Machine Creation Services (Citrix MCS) - Citrix Machine Creation Services is a desktop image delivery feature in XenDesktop used to configure and distribute virtual desktops to end users.
Citrix Provisioning Services (Citrix PVS) - Citrix Provisioning Services (Citrix PVS) is a software-streaming technology that allows administrators to patch or reconfigure an entire deployment of virtual desktops from one shared master image.
Citrix Receiver - Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.
Citrix Secure Browser - Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.
Citrix Solution Advisor - Citrix Solution Advisor is Citrix Systems Inc.
Citrix StoreFront - Citrix StoreFront is an enterprise application store that acts as a central location for users to access XenDesktop and XenApp virtual desktops and applications from their mobile devices, laptops, Windows PCs or Macs.
Citrix User Profile Management - Citrix User Profile Management is a tool in the company's XenDesktop and XenApp desktop virtualization platform that allows IT administrators to deliver employees' personal data and settings to physical and virtual endpoints.
Citrix VDI-in-a-Box - Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-sized businesses.
Citrix Workflow Studio - Citrix Workflow Studio is a workflow automation software product.
Citrix Workspace Suite - Citrix Workspace Suite combines Citrix products including XenApp, XenDesktop, XenMobile, ShareFile Enterprise and NetScaler Gateway into a single platform IT administrators can use to deliver desktops, data, applications and services to users.
Citrix WorkspacePod - Citrix WorkspacePod is a converged infrastructure product that de-centralizes storage to provide scalable and consistent mobile workspace and application delivery.
Citrix Worx - Citrix Worx is a line of certified mobile applications for the enterprise.
Citrix X1 Mouse - The Citrix X1 Mouse is a small Bluetooth device that allows users to navigate Windows virtual desktops and applications on mobile devices.
Citrix XenApp - Citrix XenApp, now part of Citrix Virtual Apps and Desktops, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
Citrix XenClient - Citrix XenClient is a Type 1 (or bare metal) client hypervisor from software provider Citrix Systems.
Citrix XenDesktop - Citrix XenDesktop is a desktop virtualization product from software vendor Citrix Systems.
Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
CIW - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
CIW - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
CKO - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
clan culture - A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values.
Clarus - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
Class C2 - Class C2 is a security rating established by the U.
class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
classification of data - Data classification is the process of organizing data into categories for its most effective and efficient use.
classless inter domain routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
Classless Inter-Domain Routing - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
Classless Inter-Domain Routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
classless interdomain routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
Claude Shannon - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
clean computing - Clean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage.
clean desk policy - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
clean electricity - Clean electricity is electrical power that is free from voltage spikes and drops.
clean install - A clean install is a software installation in which any previous version is removed.
clean room - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
clean room design - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
clean room technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
clean room technique (clean room design) - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
clean tech - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
clean technology - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
clean technology (clean tech) - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
cleanroom - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
cleanroom technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
clear 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
clear box - A white box or clear box is a device, program or system whose internal workings are well understood.
clear channel - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
clear zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
CLEC - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
CLI - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
click - In Web advertising, a click is an instance of a user pressing down (clicking) on a mouse button in an ad space.
click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
click to talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
Click to Tweet - Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.
click tracking - Click tracking is a method used by companies to observe and analyze how many viewers visit a website, and digest its content, over a specific period of time.
click-for-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
click-through rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
click-to-callback - Click-to-callback is a Web-based customer relationship management (CRM) technology that enables users browsing a company's Web site to leave a phone number where a company representative can call them back with more information.
click-to-dial - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
click-to-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
clickbait - Clickbait is a negative term that describes links to frivolous content whose only goal is to improve the original web page's clickthrough rate.
clickbait title - A clickbait title is a title for online content that is designed to engage the reader and tempt them into clicking through to the associated content.
clickjacking - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
clicks and mortar - Clicks and mortar, sometimes seen as clicks-and-mortar or clicks and bricks, is a type of omnichannel business model that takes advantage of both online and offline operations.
clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
clickthrough rate (CTR) - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
client - A client is the requesting program or user in a client/server relationship.
Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
client hypervisor - A client hypervisor is a hypervisor that resides on a laptop, PC or other client device.
client solid state drive - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
client solid state drive (SSD) - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
client-based virtual machine - A client-based virtual machine is an instance of an operating system that is managed centrally on a server and executed locally on a client device.
client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
client-server network - A client-server network is a communications model in which multiple client programs share the services of a common server program.
client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
clinical business intelligence - Clinical business intelligence is the application of data analytics to medical records through various systems to improve medical care.
clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
Clinical Data Repository - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
Clinical Data Repository/Health Data Repository (CHDR) - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
clinical decision support system - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
clinical document (HL7 clinical document) - A clinical document is a written, printed or electronic record that provides evidence of medical care.
Clinical Document Architecture - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
clip art - Clip art, frequently used in desktop publishing before the arrival of the Web, is "canned" artwork designed for use in publications or Web pages by artists or non-artists.
clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
Clipper - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
cloak of invisibility - A cloak of invisibility is a method of rendering physical objects undetectable or invisible.
cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
clock cycle - In a computer, the clock cycle is the time between two adjacent pulses of the oscillator that sets the tempo of the computer processor.
clock gating - Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits.
clock speed - In a computer, clock speed refers to the number of pulses per second generated by an oscillator that sets the tempo for the processor.
clocks or cycles per instruction - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
clone - A clone is an identical copy of something and is a term that first became familiar to the public from the biosciences.
Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
Clos network - A Clos network is a type of non-blocking, multistage switching architecture that reduces the number of ports required in an interconnected fabric.
closed caption - Closed captions are a text version of the spoken part of a television, movie, or computer presentation.
closed captions - Closed captions are a text version of the spoken part of a television, movie, or computer presentation.
closed circuit television - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
closed circuit television - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
closed loop control system - A closed loop control system is a set of mechanical or electronic devices that automatically regulates a process variable to a desired state or set point without human interaction.
closed loop manufacturing resource planning - Closed loop manufacturing resource planning, also known as closed loop MRP (CLMRP), is a manufacturing resource planning model that includes returned products in the supply chain.
closed loop manufacturing resource planning (MRP) - Closed loop manufacturing resource planning, also known as closed loop MRP (CLMRP), is a manufacturing resource planning model that includes returned products in the supply chain.
closed loop reporting - Closed loop reporting (CLR) is a system in which data and information collected by marketing and sales professionals is made available to both teams.
cloud - In telecommunications, a cloud is the unpredictable part of any network through which data passes between two end points.
cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
cloud adaptor - A cloud adaptor is a software utility that controls the transfer of information between local back office systems and a cloud provider.
cloud agent - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
cloud aggregator - A cloud aggregator is a type of cloud broker that packages and integrates multiple cloud computing services into one or more composite services.
cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
cloud architect - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
cloud archive - Cloud archiving is a storage procurement model in which data that is no longer accessed on a regular basis is managed and backed up remotely by a cloud storage service provider.
cloud automation - Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.
cloud backup - Cloud backup, also known as online backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server.
cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
cloud bursting - Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.
cloud cartography - Cloud cartography is a scheme for pinpointing the physical locations of Web servers hosted on a third-party cloud computing service.
cloud collaboration - Cloud collaboration is a system of communication that enables employees to work together on a project that is hosted in the cloud, can be accessed at any time and can be edited by multiple users at once.
cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
Cloud Computing (quiz) - Test yourself.
cloud computing maturity model (CCMM) - A Cloud Computing Maturity Model (CCMM) is a model that defines and analyzes the progress of an organization’s ability to deliver cloud services in key areas such as capabilities, domains, maturity and adoption.
cloud configuration - Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate.
cloud content management - Cloud content management is the process of collecting, delivering, retrieving, governing and managing information within a cloud-based hosting environment.
cloud controller - A cloud controller is a device that moves data between on-premises storage and the cloud.
Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
cloud cost analysis tool - A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations.
Cloud Cruiser - Cloud Cruiser is a vendor that offers cost-analtyics software for hybrid cloud and multi-cloud computing environments.
cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
Cloud Data Management Interface - Cloud Data Management Interface (CDMI) is a Storage Networking Industry Association (SNIA) industry standard that defines the interface that applications will use to create, retrieve, update and delete data elements from the cloud.
cloud database - A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.
cloud database - A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.
cloud DBMS (cloud database management system) - A cloud database management system (CDBMS) is a database management system that is hosted by a third-party service provider on a remote server and accessed over the Internet.
cloud disaster recovery - Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.
cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
cloud DR - Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.
cloud drive - A cloud drive is an umbrella term used to describe any Web-based service that provides storage space on a remote server.
cloud drive storage - Cloud drive storage is a term that refers to the ability to mount the storage capacity provided by a cloud storage service so that it appears to the server as a normal drive letter.
cloud economics - Cloud economics is the branch of knowledge concerned with the principles, costs and benefits of cloud computing.
cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
cloud encryption (cloud storage encryption) - Cloud encryption is a service offered by cloud storage providers whereby a customer's data is transformed using encryption algorithms into ciphertext and stored in the cloud.
cloud engineer - A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support.
cloud ERP - Cloud ERP is a type of enterprise resource planning (ERP) software that runs on a provider's cloud computing platform, rather than on premises in an enterprise's own data center.
cloud federation - A federated cloud (also called cloud federation) is the deployment and management of multiple external and internal cloud computing services to match business needs.
cloud federation - Cloud federation is the practice of interconnecting service providers' cloud environments to load balance traffic and accommodate spikes in demand.
cloud file sharing - Cloud file sharing is a method of allowing multiple users to access data within a public cloud, private cloud or hybrid cloud.
cloud file storage - Cloud file storage is a storage service that is delivered over the Internet, billed on a pay-per-use basis and has an architecture based on common file level protocols such as Server Message Block (SMB), Common Internet File System (CIFS) and Network File System (NFS).
cloud file syncing - Cloud file syncing is an application that updates files held in different locations through the cloud.
Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications on public and private cloud models.
cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
cloud IDE - A cloud IDE is a web-based integrated development platform (IDE) that is accessed through a browser.
cloud in a box - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
cloud in a can - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
Cloud Industry Forum - The Cloud Industry Forum (CIF) is a cloud computing organization in the United Kingdom (UK) that seeks to promote transparency and security in cloud deployments by creating a Code of Practice for cloud service providers.
cloud infrastructure - Cloud infrastructure refers to the hardware and software components -- such as servers, storage, a network, virtualization software, services and management tools -- that support the computing requirements of a cloud computing model.
cloud insurance - Cloud insurance is any type of financial or data protection obtained by a cloud service provider.
cloud integration - Cloud integration is the act of combining different cloud-based systems into an integral whole.
cloud integration platform - A cloud integration platform is a product that facilitates the integration of an organization’s onsite (non-cloud-based) business resources with cloud-based resources.
cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
cloud load balancing - Cloud load balancing is the process of distributing workloads and network traffic among multiple servers or other resources in a cloud environment.
cloud management platform - A cloud management platform is a suite of integrated tools that an enterprise can use to monitor and control cloud computing resources.
cloud marketplace - A cloud marketplace is an online storefront, operated by a cloud provider, through which customers may subscribe to Software as a Service (SaaS) applications that are built on, integrate with or complement the cloud provider's main infrastructure, platform or software service.
cloud NAS - Cloud NAS (network attached storage) is remote storage that is accessed over the Internet as if it was local.
cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the Internet as if it was local.
Cloud Native Computing Foundation (CNCF) - The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of cloud-native computing.
cloud network attached storage - Cloud NAS (network attached storage) is remote storage that is accessed over the Internet as if it was local.
cloud networking - Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.
cloud object storage - Cloud object storage is a format for storing unstructured data in the cloud.
cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
cloud OS - Cloud OS is a marketing label used to describe a lightweight operating system (OS) intended for netbooks or tablet PCs that access Web-based applications and stored data from remote servers.
cloud outage - A cloud outage is a period of time during which cloud services are unavailable.
cloud portability - Cloud portability is the ability to move applications and data from one cloud computing environment to another with minimal disruption.
cloud printing - Cloud printing is a service that lets users print from any device on a network.
cloud provider API - A cloud provider API is an application program interface that allows the end user to interact with a cloud provider's service.
cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
cloud radio access network (C-RAN) - C-RAN, or cloud radio access network, is a centralized, cloud computing-based architecture for radio access networks (RAN) that enables large-scale deployment, collaborative radio technology support and real time virtualization capabilities.
cloud robotics - Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.
cloud security - Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks.
Cloud Security Alliance - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
Cloud Security Posture Management (CSPM) - Cloud Security Posture Management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
cloud seeding - Cloud seeding is a strategy for uploading large amounts of data to a cloud storage service.
cloud server - A cloud server is a compute server that has been virtualized, making its resources accessible to users remotely over a network.
cloud service governance - Cloud services governance is a general term for applying specific policies or principles to the use of cloud computing services.
cloud service latency - Latency greatly affects how usable and enjoyable devices and communications are.
cloud service migration - Cloud service migration is the process of transitioning an organization’s data and perhaps other business elements from one cloud service provider to another.
cloud service provider (cloud provider) - A cloud service provider, or CSP, is a company that offers some component of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).
cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
cloud services reseller - A cloud services reseller is a middleman who facilitates commerce between a cloud service provider and the marketplace.
cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
cloud spanning - Cloud spanning is a cloud delivery model in which an application requiring a large pool of computing resources is deployed over multiple cloud environments (private cloud, public cloud and/or hybrid cloud).
cloud sprawl - Cloud sprawl is the uncontrolled proliferation of cloud instances, services or providers that are used by an enterprise.
cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
cloud storage API - A cloud storage API is an application program interface that connects a locally-based application to a cloud-based storage system, so that a user can send data to it and access and work with data stored in it.
cloud storage appliance - A cloud storage appliance is a stand-alone computing device or virtual machine (VM) image used to move data from a local site to a remote cloud storage service provider.
cloud storage backup - Cloud storage backup involves moving data offsite to a managed service provider for protection.
cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
cloud uptime - Cloud uptime is the amount of time that cloud systems and cloud services hosted by a cloud provider are up and accessible by end users.
cloud washing - Cloud washing is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old service by associating the word "cloud" with it.
cloud-in-a-can - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
cloud-in-a-can (cloud in a box) - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
cloud-integrated storage (CIS) - Cloud-integrated storage (CIS) is a term that refers to a conventional storage-area network (SAN), network-attached storage (NAS) or unified storage system that tiers and/or caches data to cloud-based storage and treats the cloud storage as if it were part of the primary storage system.
cloud-oriented architecture (COA) - A cloud-oriented architecture (COA) is a conceptual model encompassing all elements in a cloud environment.
Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
cloud-to-cloud migration - Cloud-to-cloud migration (C2C) is the movement of physical or virtual machines -- along with their associated configurations, operating systems, applications and storage -- from one cloud computing provider to another.
Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
CloudAudit - CloudAudit is a specification for the presentation of information about how a cloud computing service provider addresses control frameworks.
CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
CloudBees - CloudBees is a former platform as a service cloud provider that now focuses on open source continuous integration.
cloudbook - A cloudbook is a thin client notebook computer with a browser operating system (OS) and interface.
Cloudburst VM escape - Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc.
CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
Cloudflare - Cloudflare is a content distribution network (CDN) for the delivery of website and app content to users around the globe.
CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
Cloudify - Cloudify is an open source cloud and network functions virtualization (NFV) orchestration platform.
cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
CloudSwitch - CloudSwitch is a company that makes cloud migration software.
CloudTrust Protocol (CTP) - The CloudTrust Protocol or CTP is a mechanism that helps cloud service customers request and retrieve standardized inquiries about cloud provider transparency.
CloudVelox - CloudVelox is a software provider that offers migration and disaster recovery tools for cloud computing environments, including Amazon Web Services (AWS).
cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
CloudWatch (Amazon CloudWatch) - Amazon CloudWatch is a component of Amazon Web Services (AWS) that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
CLR - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented class es written in any of the languages.
cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
Cluster Labs Pacemaker - Pacemaker is an open source high-availability cluster software developed from a collaboration between Red Hat and Novell.
cluster log (CL) - A cluster log (CL) is a record of cluster service activity in a server member cluster.
cluster name object (CNO) - A cluster name object (CNO) is an Active Directory computer object linked with the network resource Cluster Name.
cluster panic - Cluster panic is a multiple-node kernel panic that occurs in a network or other set of interconnected computers called a cluster.
cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
clustered NAS - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
Clustered network attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
Clustered network-attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
clustered network-attached storage (clustered NAS) - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
clustered storage - Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability.
ClusterHQ Flocker - Management of Docker containers can be facilitated with the use of Flocker software – a framework for moving containers across clusters of servers.
clustering - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
CM - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
CM - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
cm - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
CMA - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
CMA - A content management application (CMA) is the front end component of a content management system (CMS).
CMDB - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
CMDM - Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company.
CMDSP (Certified Mobile Device Security Professional) - CMDSP (Certified Mobile Device Security Professional) is a certification program offered by the Mobile Resource Group that provides a standardized assurance of competency in the field of mobile security and administration.
CMIO - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
CMIP - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
CMIS - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
CMM - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
CMO (chief marketing officer) - A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.
CMOS - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
CMOS (complementary metal-oxide semiconductor) - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
CMOx technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
CMP-50 cable - Limited combustible cable (LCC), also called CMP-50 cable, is fire-resistant cable with insulation made of a synthetic material called fluorinated ethylene propylene (FEP).
CMS - CMS (Conversational Monitor System) is a product that comes with IBM's VM/ESA operating system and allows each of many simultaneous interactive users to appear to have an entire mainframe computer at their personal disposal.
CMS - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
CMS - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
CMTS - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
CMYB - CMYK is a scheme for combining primary pigments.
CMYK - CMYK is a scheme for combining primary pigments.
CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
CNA - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
CNR - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
CNR - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
CO - In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop.
CO - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
co-branding - Co-branding is the practice of using multiple brand names together on a single product or service.
co-location - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
co-selling - Co-selling is an approach to product and service distribution in which channel partners are the primary route to market.
COA - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
coalition loyalty program - A coalition loyalty program is a loyalty card system that offers incentives to customers of two or more businesses in return for allowing those businesses to collect user data.
coarse wavelength division multiplexing - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
coarse wavelength division multiplexing (CWDM) - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
coax - Coaxial cables transmit high-frequency electrical signals through connectors without interference.
coaxial antenna - A coaxial antenna is a variant of the dipole antenna, designed for use with an unbalanced feed line.
coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
COBIT - COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.
COBIT - COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management best practices.
COBIT 5 - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
COBOL - COBOL (Common Business-Oriented Language) is a programming language created in 1960, and was the first to run on multiple operating systems.
COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
cobot - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
cobranding - Co-branding is the practice of using multiple brand names together on a single product or service.
CoCo - In the U.K.
cocooning - Cocooning is the act of insulating or hiding oneself from the normal social environment, which may be perceived as distracting, unfriendly, dangerous, or otherwise unwelcome, at least for the present.
COD - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
Codd - E. F.
code - In programming, code (noun) is a term used for both the statements written in a particular programming language - the source code, and a term for the source code after it has been processed by a compiler and made ready to run in the computer - the object code.
code division multiple access 2000 - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
code division multiple access one - Also see CDMA, WCDMA, and CDMA2000.
Code of Connection - In the U.K.
Code of Connection (CoCo) - In the U.K.
code review - Code review is a phase in the computer program development process in which the authors of code, peer reviewers, and perhaps quality assurance reviewers get together to review code, line by line.
codebase (code base) - A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.
codec - A codec is either a hardware device or a software-based process that compresses and decompresses large amounts of data used in voice over IP, video conferencing and streaming media.
coded orthogonal frequency division multiplexing - COFDM is a modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
coding error - In computer technology, a bug is a coding error in a computer program.
coefficient - In a mathematical equation, a coefficient is a constant by which a variable is multiplied.
coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
COFDM - COFDM is a modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
cognitive architecture - Cognitive architecture is the theory about the structures of the human mind and how they work together to manage intelligent behavior in any complex environment.
cognitive bias - Cognitive bias is a limitation in objective thinking that is caused by the tendency for the human brain to perceive information through a filter of personal experience and preferences.
cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
cognitive computing - Cognitive computing systems use computerized models to simulate the human cognition process to find solutions in complex situations where the answers may be ambiguous and uncertain.
cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently.
cognitive hacking - Cognitive hacking is a cyberattack that seeks to manipulate the perception of people by exploiting their psychological vulnerabilities.
cognitive load theory (CLT) - Cognitive load theory (CLT) is based on the premise that instructional materials should be presented at a pace and level of difficulty that corresponds to how humans process information.
cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
cognitive radio - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones.
cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones.
cognitive robotics - Cognitive robotics is a field of technology involving robots that can learn from experience, from human teachers, and even on their own, thereby developing the ability to effectively deal with their environment.
cognitive search - Cognitive search is a new generation of enterprise search that uses artificial intelligence technologies to improve users' search queries and extract relevant information from multiple, diverse data sets.
cognitive security - Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.
Cognos - Cognos is IBM's business intelligence (BI) and performance management software suite.
cohort - A cohort is a group of people that have some demographic or statistical characteristic in common.
CoIP - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
COLD - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
COLD (Computer Output to Laser Disk) - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
cold backup - Cold backups are ideal for disaster recovery because they protect important data.
cold backup (offline backup) - Cold backups are ideal for disaster recovery because they protect important data.
cold boot - To reboot is to restart a computer and reload the operating system.
cold boot attack - A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system.
cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
cold cloning - Cold cloning is a cloning method that takes place while the server OS is not running.
cold fusion - Not to be confused with ColdFusion, a software product, cold fusion is a hypothetical process in which hydrogen fusion supposedly occurs at room temperature.
cold server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
cold site - A hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.
cold storage - Cold storage is a computer system designed for retaining inactive data, such as information required for regulatory compliance, at low cost and high efficiency.
cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
ColdFusion - ColdFusion, a product from Macromedia, is a popular and sophisticated set of products for building Web sites and serving pages to users.
ColdFusion Cheat Sheets - We've gathered cheat sheets for fast reference to ColdFusion-related information.
ColdFusion Markup Language - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
coldset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
coldset Web offset printing - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
coldset Web offset printing (non-heatset) - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
collaboration - Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project.
Collaboration and collaborative software: Glossary - Collaboration is growing both within and beyond the enterprise.
Collaboration Data Objects - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
Collaboration Data Objects (CDO) - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
collaboration software - Groupware refers to programs that help people work together collectively while located remotely from each other.
collaboration specialist - A collaboration specialist is an individual in charge of managing customer experience and implementing a collaborative platform across the enterprise in order to enhance the user experience and employee productivity, and collectively accomplish tasks.
collaborative authoring - WebDAV (World Wide Web Distributed Authoring and Versioning) is the Internet Engineering Task Force (IETF) standard for collaborative authoring on the Web: a set of extensions to the Hypertext Transfer Protocol (HTTP) that facilitates collaborative editing and file management between users located remotely from each other on the Internet.
collaborative BI (collaborative business intelligence) - Collaborative BI (collaborative business intelligence) is the merging of business intelligence software with collaboration tools, including social and Web 2.
collaborative browsing (co-browsing) - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
collaborative citizen journalism (CCJ) - Collaborative citizen journalism (CCJ), a concept made possible by the Internet and the advent of blogging, is the pooling of research and reporting by volunteers to develop journalistic news stories or to critically examine existing ones, especially stories from the mainstream media.
collaborative computing - Collaborative computing is a diverse collection of information technologies designed to support work between individuals.
collaborative consumption - Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.
collaborative CRM - Collaborative CRM is an approach to customer relationship management (CRM) in which the various departments of a company, such as sales, technical support, and marketing, share any information they collect from interactions with customers.
collaborative filtering - Collaborative filtering is the predictive process behind recommendation engines.
Collaborative Master Data Management - Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company.
Collaborative Master Data Management (CMDM) - Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company.
collaborative robot - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
collaborative software - Groupware refers to programs that help people work together collectively while located remotely from each other.
collaborative tagging - Social bookmarking is a user-defined taxonomy system for bookmark s.
College of Healthcare Information Management Executives - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
collocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
collocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
colocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
colocated care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
colocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
colocation center - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
colocation marketplace - A colocation marketplace is an online platform that connects colocation users with managed service providers, IT vendors and potential business partners.
colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
column address strobe - In computer memory technology, CAS (column address strobe) is a signal sent to a dynamic random access memory (DRAM) that tells it that an associated address is a column address.
column database management system (CDBMS) - There are different types of CDBMS offerings, with the common defining feature being that data is stored by column (or column families) instead of as rows.
column-level encryption - Column-level encryption is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.
columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
columnstore index - A columnstore index is a type of index used to store, manage and retrieve data stored in a columnar format in a database.
COM - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
COM+ - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
combinatorial logic - Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states.
comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
comma separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
comma-separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
command interpreter - A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program.
command line interface - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
command line interface (CLI) - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
command-and-control server (C&C server) - A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
Commerce Extensible Markup Language - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
Commerce XML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
commercial off the shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
commercial off-the-shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
Commercial Processing Workload - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
commit - A commit is the final step in the successful completion of a previously started database change as part of handling a transaction in a computing system.
committed information rate - committed information rate.
committed information rate (CIR) - committed information rate.
Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
common access card - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
Common Application Programming Interface - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
Common AS/400 commands - Cheat sheet - common AS/400 commands.
Common Assurance Maturity Model (CAMM) - The Common Assurance Maturity Model (CAMM) is a global project to list the information assurance maturity of suppliers offering provisioning services (for example, cloud providers).
Common Body of Knowledge (CBK) - In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
Common Business Oriented Language - COBOL (Common Business-Oriented Language) is a programming language created in 1960, and was the first to run on multiple operating systems.
common carrier - A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee.
common channel signaling - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
common channel signaling (CCS) - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
Common Criteria - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
Common Criteria for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
Common Desktop Environment - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
Common Desktop Environment (CDE) - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
common gateway interface - Also see FastCGI.
common gateway interface (CGI) - Also see FastCGI.
Common Information Model - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
Common Internet File System - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
Common Language Infrastructure (CLI) - Part of Microsoft's .
Common Language Runtime - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented class es written in any of the languages.
Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
Common Management Information Protocol - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
Common Management Information Protocol (CMIP) - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
Common Object Request Broker Architecture - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
Common Open Policy Service Protocol - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
Common Programming Interface - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
Common Service Center - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
common short code - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
common test platform - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
common test platform (CTP) - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
Common Vulnerabilities and Exposures - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
Common Weakness Enumeration - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
Communication and Networking Riser - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
Communication and Networking Riser (CNR) - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
communication diagram - A collaboration diagram, also called a communication diagram or interaction diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
communication plan - A communication plan is a policy-driven approach to providing stakeholders with information.
communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
communication server - Also see Terminal Server product, Microsoft software that serves the Windows desktop and applications to terminals.
communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
Communications Act of 1934 - The Communications Act of 1934 is United States legislation that transfers the Federal Radio Commission’s authority over radio regulation to the Federal Communications Commission (FCC), which was newly formed under the Act’s provisions.
Communications as a Service - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
Communications Assistance for Law Enforcement Act - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
communications enabled business processes - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
communications over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
communications-enabled business processes - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
communications-enabled business processes (CEBP) - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
community access television - CATV (originally "community antenna television," now often "community access television") is more commonly known as "cable TV.
community computing - Community computing is a resource-sharing model in which users are provided with free or low-cost computer and Internet access.
community technology center - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
community technology center (CTC) - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
Community Technology Preview (CTP) - The Community Technology Preview (CTP) is an early version of a Microsoft product that is released to testers during the software development process.
compact disc - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
compact disc (CD) - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
Compact Disc - interactive - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
compact disc access time - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
Compact Disc interactive - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
compact disc recordable - CD-R (for compact disc, recordable) is a type of write once, read many (WORM) compact disc (CD) format that allows one-time recording on a disc.
compact disc rewriteable - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
compact disk - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
compact fluorescent light bulb - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
Compact HTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
Compact HTML (CHTML) - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
CompactFlash - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
CompactFlash card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
CompactFlash card (CF card) - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
compaction - In a data center, compaction is the reduction or consolidation of hardware to make better use of physical floor space.
compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
Compensation Management - Compensation management is a critical part of talent management and employee retention.
competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
competitive advantage - Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.
competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
competitive intelligence (CI) - Competitive intelligence (CI) is the gathering of publicly-available information about an enterprise's competitors and the use of that information to gain a business advantage.
competitive local exchange carrier - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
Compiere - Compiere is a popular open-source system of software applications that provide enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), tax accounting, and general accounting for the small and medium-size enterprise.
compile - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
compiled - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
Complementary Code Keying - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
Complementary Code Keying (CCK) - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
complementary metal oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
complementary metal-oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
Completely Automated Public Turing Test to tell Computers and Humans Apart - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
complex adaptive system (CAS) - Complex adaptive system is a term used by DevOps teams to describe an IT platform or project composed of multiple components that interact in ways that cannot be predicted or controlled with complete accuracy.
complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
complex instruction set - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
complex instruction set computer - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
complex instruction set computing - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
complex number - A complex number is a quantity of the form v + iw, where v and w are real numbers, and i represents the unit imaginary numbers equal to the positive square root of -1.
complex system - A complex system is an arrangement of a great number of related but various elements with intricate interconnections.
compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
compliance as a service (CaaS) - Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.
compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
compliance burden - Compliance burden, also called regulatory burden, is the administrative cost of a regulation in terms of dollars, time and complexity.
compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
compliance gaining (behavioral compliance gaining) - Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.
Compliance Quizzes - We've gathered quizzes to test your knowledge of compliance and related issues.
compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
compliance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
compliance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
compliance validation - In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out.
Compliance: Glossary - A printable glossary of compliance-related terms.
component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
Component Object Model - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
Component Object Model + - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
component video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable pieces that application developers independently write and deploy.
composable infrastructure - A composable infrastructure is a framework that decouples device resources in order to treat them as services.
composite video - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
composite video (baseband video or RCA video) - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
compositing - Compositing used to create layered images and video in advertisements, memes and other content for print publications, websites and apps.
composition - Here is a list of the seven elementary rules of English usage and 11 elementary principles of composition from William Strunk, Jr.
compound - In chemistry, a compound is a substance that results from a combination of two or more different chemical elements, in such a way that the atoms of the different elements are held together by chemical bonds that are difficult to break.
compound document - In information technology, a compound document is an organized collection of user interfaces that form a single integrated perceptual environment.
compressed - Data compression is a reduction in the number of bits needed to represent data.
compressed air - Compressed air is a gas, or a combination of gases, that has been put under greater pressure than the air in the general environment.
compressed air energy storage - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
compressed air energy storage (CAES) - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
compression artifact - A compression artifact is the fuzz or distortion in a compressed image or sequence of video images.
CompTIA (Computing Technology Industry Association) - CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses.
CompTIA Cloud Essentials - CompTIA Cloud Essentials is an entry-level, vendor-neutral cloud certification.
CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
CompTIA Project+ - CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.
CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
computational economics - Computational economics is a field of economic study at the intersection of computer science, economics and management science.
computational fluid dynamics (CFD) - Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.
computational grid - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
computational law - Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.
computational linguistics (CL) - Computational linguistics is the application of computer science to the analysis, synthesis, and comprehension of written and spoken language.
computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
computational reflection - Computational reflection (sometimes just called reflection) is a computer process involving self-awareness.
computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
Compute Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
Computed Dental Radiography - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
computer aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
computer aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
Computer Aided Test Tool - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
computer barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
Computer Emergency Readiness Team - CERT (pronounced SUHRT), officially called the CERT Coordination Center, is the Internet's official emergency team.
Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
computer file - In data processing, using an office metaphor, a file is a related collection of records.
computer forensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
computer hallucination - Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.
computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
computer hardware chart - This handy computer hardware quick look-up was designed by Sonic84.
Computer history museum guide - Computer history museum guide.
Computer Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
Computer Misuse Act 1990 - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
Computer Misuse Act 1990 (CMA) - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating machine tools through software embedded in an attached microcomputer.
computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
Computer Output to Laser Disk - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
computer pidgin language - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
computer room air conditioning unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
computer room air conditioning unit (CRAC) - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
computer room air handler - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
computer telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
Computer to computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
computer worm - A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.
computer-aided design - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
computer-aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
computer-aided manufacturing - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
computer-aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
Computer-aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
Computer-aided process planning (CAPP) - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
computer-aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
computer-assisted software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
Computer-based Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
computer-based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
computer-intensive - Computer-intensive is a term that applies to any computing application that requires the resources of a lot of computers, such as grid computing.
Computer-Supported Cooperative Work - Groupware refers to programs that help people work together collectively while located remotely from each other.
computer-telephony integration - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
Computer-to-computer interface - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
computerized physician order entry - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
computing arbitrage - Computing arbitrage is a cloud services business model in which a company purchases computing resources -- typically a large block of bandwidth – at wholesale rates and offers it in smaller packages, with a greater cumulative value, to other companies.
Computing Basics Quizzes - We've gathered quizzes to test your knowledge of computing fundamentals.
COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
concatenate - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
concatenating - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
concatenation - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
concentration - Amount of substance concentration, often called simply concentration, is a quantitative measure of the number of atoms per unit volume in a sample of a matter.
concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
concentrator - As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.
concept map - A concept map is a graphical tool for organizing and representing knowledge.
concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
conditional access - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
conditional access (CA) - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
conductance - Conductance is an expression of the ease with which electric current flows through a substance.
conductive metal oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
conductive metal-oxide (CMOx) technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
conductive metal-oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
cone of uncertainty - The cone of uncertainty is a project management tool that explains why estimates become more accurate over the span of a project's lifecycle.
conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
configuration item - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
configuration management - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
configuration management database - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
configure - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
conformal coating - Conformal coating is the process of spraying a dielectric material onto a device component to protect it from moisture, fungus, dust, corrosion, abrasion, and other environmental stresses.
conformance - In information technology, a state or acts of adherence to a certain specification, standard, or guideline.
conformance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
confusion matrix - A confusion matrix is a table that outlines different predictions and test results and contrasts them with real world values.
conglomerate - A conglomerate is a company that comprises multiple different corporations.
conjunction - A conjunction is a word used to connect words, phrases and clauses.
connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
connection broker - In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop.
connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
connectionless - In telecommunication, connectionless describes communication between two network end points in which a message can be sent from one end point to another without prior arrangement.
Connector ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
Connector/ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
Conseil Europeen pour la Recherche Nucleaire - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
consensus algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
conservation of angular momentum - Conservation of angular momentum is a physical property of a spinning system such that its spin remains constant unless it is acted upon by an external torque; put another way, the speed of rotation is constant as long as net torque is zero.
consignment inventory - Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.
consistency - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
Consolidated Health Informatics - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
Consolidated Health Informatics (CHI) - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
const - The const (constant) keyword indicates that the associated variable cannot be changed.
Constellation - Constellation was the early name for the Communicator browser and related programs from Netscape Communications.
Constrained Application Protocol (CoAP) - Constrained Application Protocol (CoAP) is a protocol for low-power compute-constrained devices to operate in the internet of things (IoT).
constraint (project constraint) - A project constraint is any limit or restriction applied to a project.
construction accounting software - Construction accounting software is collection of programs, processes and information that serves all the essential job functions of general accounting software, such as accounts receivable, accounts payable and general ledger, with the addition of modules for construction-specific functions such as equipment service and usage tracking, time and material billing, and consolidated general ledgers.
construction estimating software - Construction estimating software is a collection of programs, processes and information used to calculate the total cost of a construction project.
construction project management software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
construction scheduling software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
construction scheduling software (construction project management software) - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
construction software - Construction software is the collection of programs, processes and information used to perform various tasks within the building or assembling of a structure or infrastructure as a means of increasing productivity, efficiency, and competitiveness.
construction takeoff software - Construction takeoff software (sometimes spelled take-off or take off) is a collection of programs, processes and information used to perform a part of the cost estimating process in the construction industry.
consumer data - Consumer data is the information trail customers leave behind as a result of their Internet use.
Consumer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
consumer device - Consumer device is an industry term for Internet-capable mobile computers that are marketed to individuals, not businesses.
Consumer Digital Subscriber Line - Also see our Fast guide to DSL.
Consumer DSL - Also see our Fast guide to DSL.
consumer packaged goods (CPG) - Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.
consumer panel - A consumer panel is a group of individuals selected by a business or organization to provide input and opinion on products and services for research on consumer behavior.
Consumer Price Index (CPI) - The Consumer Price Index (CPI) is a measure of the weighted average change in the price that U.
consumer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
consumer privacy (customer privacy) - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
consumer surveillance - Consumer surveillance is the monitoring and recording of people’s activities and data, either online or in the physical environment, for commercial purposes.
consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
consumerization of IT - IT consumerization is the blending of personal and business use of technology devices and applications.
consumerization policy - A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization.
consumption-based pricing model - A consumption-based pricing model is a service provision and payment scheme in which the customer pays according to the resources used.
contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
contact center as a service (CCaS) - Contact center as a service (CCaaS) is a framework for contact center infrastructure management that combines the principles of contact center hosting and cloud-based contact center infrastructure.
contact center infrastructure - A contact center infrastructure is a framework composed of the physical and virtual resources that a call center facility needs to operate effectively.
contact center software - Contact center software is a technology tool that increases the effectiveness and efficiency of a contact center, with specific focus on interactions between customers and contact center agents.
Contact Center: Glossary - Browse through contact center vocabulary in a handy printable glossary.
contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
contactless payment - A contactless payment is a wireless financial transaction in which the customer authorizes monetary compensation for a purchase by moving a security token in close proximity to the vendor's point of sale (PoS) reader.
container (disambiguation) - This page explains how the term container is used in software development, storage, data center management and mobile device management.
container image - A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology (IT) infrastructure.
Container Linux by CoreOS - Container Linux by CoreOS, originally named CoreOS Linux, is an open source operating system (OS) that provides the functionality required to deploy and manage applications within containers.
container registry - A container registry is a collection of repositories made to store container images.
container repository - A container repository is a collection of related container images used to provide different versions of an application.
Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
content - Many people agree that on the World Wide Web, "content is King.
content addressed storage - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
content aggregator - A content aggregator is an individual or organization that gathers Web content (and/or sometimes applications) from different online sources for reuse or resale.
content analytics - Content analytics is the act of applying business intelligence (BI) and business analytics (BA) practices to digital content.
content as a service (CaaS) - Content as a service (CaaS) is a web-based service for the creation, storage, management and delivery of content such as text, audio, video or images.
content automation - Content automation is a digital marketing strategy that focuses on removing the need for human intervention in the content lifecycle.
content caching - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
content curation - Content curation is the gathering, organizing and online presentation of content related to a particular theme or topic.
content delivery - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
content delivery network - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
Content Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
content distribution - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
content distribution delivery - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
content farm - A content farm, also called a content mill, is a Web site whose content is written for search engine bots instead of human readers.
content farm (content mill) - A content farm, also called a content mill, is a Web site whose content is written for search engine bots instead of human readers.
content filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
content filtering (information filtering) - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
content gamification - Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.
content generation software - Content generation software is a type of computer program that produces content for publication.
content managemen - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
content management - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
content management (CM) - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
content management application - A content management application (CMA) is the front end component of a content management system (CMS).
content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
Content Management Interoperability Services - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
Content Management Interoperability Services (CMIS) - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
content management system - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
content marketing - Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising.
content marketing platform (CMP) - A content marketing platform (CMP) is a software solution that helps content marketing teams plan, envision, collaborate and create materials that successfully raise brand awareness, improve lead generation and increase revenue.
content mill - A content farm, also called a content mill, is a Web site whose content is written for search engine bots instead of human readers.
content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
content pillar - A content pillar is a comprehensive article or series of articles that is used as the foundation for other smaller, more digestible pieces of content.
Content Protection for Removable Media - Content Protection for Removable Media (CPRM) is a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying.
Content Protection for Removable Media (CPRM) - Content Protection for Removable Media (CPRM) is a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying.
content replication - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
Content Scrambling System - Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.
Content Scrambling System (CSS) - Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.
content scraping - Content scraping is the duplication of website content either manually, through copy and paste, or through running a program that picks up the content.
content services platform - A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.
content spinner - A content spinner is software that rewrites content to make it reusable as new content.
content spoofing - Content spoofing is a type of exploit used by a malicious hackers to present a faked or modified Web site to the user as if it were legitimate.
content sprawl - Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.
content type - On the Internet and as defined by Request for Comments (Request for Comments) 1521, a media type (also referred to as a content type) is a general category of data content, such as: application (executable program), audio content, an image, a text message, a video stream, and so forth.
content-addressed memory (CAM) - Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications.
content-addressed storage - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
content-addressed storage (CAS) - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
content-based security (asset-based security) - Content-based security, also known as asset-based security, is a gerneral term for security features that are embedded within enterprise content.
context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
context switch - A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.
context-aware network access control - Context-aware network access control (CANAC) is an approach to managing the security of a proprietary network by granting access to network resources according to contextual-based security policies.
context-aware security - Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions.
context-driven testing - Context-driven testing is a paradigm for developing and debugging computer software that takes into account the ways in which the programs will be used or are expected to be used in the real world.
contextual collaboration - Contextual collaboration is a new approach to collaborative software that involves embedding all the relevant applications, such as word processors, enterprise instant messaging (EIM), shared calendars, and groupware, into a unified user interface that uses presence technology to enhance collaboration.
contextual computing - Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.
contextual marketing - Contextual marketing is an online marketing model in which people are served with targeted advertising based on their current page or recent browsing behavior.
contiguity - Contiguity (from Latin contiguus and contingere, to have contact with) is the state of being in close proximity with or even touching another object.
contiguous - Contiguous describes two or more objects that are adjacent to each other.
continental United States - Refers to the continental United States.
contingency budget (cost contingency) - Contingency, in the context of project management, is an amount of money that is included to cover potential events that are not specifically accounted for in a cost estimate.
contingency plan - In business continuity and risk management, a contingency plan is a process that prepares an organization to respond coherently to an unplanned event.
contingent workforce - A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.
continual service improvement - Continual service improvement is a method to identify and execute opportunities to make IT processes and services better, and to objectively measure the effects of these efforts over time.
continuation symbol - The continuation symbol is used to indicate extension of a sequence or set, or to imply the existence of intermediate elements in a sequence or set.
Continuity of Care Document - The Continuity of Care Document (CCD) is an electronic document exchange standard for sharing patient summary information.
Continuity of Care Document (CCD) - The Continuity of Care Document (CCD) is an electronic document exchange standard for sharing patient summary information.
Continuity of Care Record - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
Continuity of Care Record (CCR) - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
continuous authentication - Continuous authentication is a method of verification aimed at providing identity confirmation and cybersecurity protection on an ongoing basis.
continuous backup - Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made.
continuous data protection - Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made.
continuous data protection - Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
continuous delivery (CD) - Continuous delivery (CD) is an approach for software delivery in which development teams produce and test code in short but continual cycles, usually with high degrees of automation.
continuous deployment - Continuous deployment is a strategy for software releases wherein any code commit that passes the automated testing phase is automatically released into the production environment, making changes that are visible to the software's users.
continuous improvement - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap major improvements.
continuous innovation - Continuous innovation is an iterative process of incorporating both modest, incremental and radical revolutionary improvements in processes, product designs, services and technologies.
continuous integration - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
continuous integration (CI) - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
continuous learning - The goal of continuous learning is to provide the reinforcement an employee needs to retain knowledge and skills over time.
continuous media - Continuous media is data where there is a timing relationship between source and destination.
continuous modeling (data center continuous modeling) - Continuous modeling is an approach to data center management that supplements infrastructure management (DCIM) tools with engineering simulation tools such as computational fluid dynamics (CFD).
continuous performance management - Continuous performance management, in a human resource (HR) management context, is the supervision of an employee's performance through one-on-one discussions and ongoing feedback from supervisors during regularly scheduled check-ins.
continuous quality - Continuous quality is a systematic approach to finding and fixing software defects during all phases of the software development cycle.
continuous software development - Continuous software development is a blanket term that covers several aspects of an iterative application development process based on making each change when it is ready, rather than wrapping many changes into large batches.
ContinuousNEXT - ContinuousNEXT is a business strategy suggested by Gartner to position technology companies for success in constant change.
continuum - A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.
contract delivery date - A contract delivery date (CDD) is the date of delivery required by a contract.
contract delivery date (CDD) - A contract delivery date (CDD) is the date of delivery required by a contract.
contract management software - Contract management software is a program or series of related programs for storing and managing legal agreements such as contracts with vendors, leases and licensing agreements.
contract theory - Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry.
contracting officer - A contracting officer is an individual entrusted by an organization with the authority to enter into, administer, renew or terminate contract s, along with related determinations and findings.
control framework - A control framework is a data structure that organizes and categorizes an organization’s internal controls, which are practices and procedures established to create business value and minimize risk.
control loop - A control loop is a system made up of all the hardware components and software control functions needed for the measurement and adjustment of a variable that controls an individual process.
control network - A control network is a network of nodes that collectively monitor, sense, and control or enable control of an environment for a particular purpose.
Control Objectives for Information and Related Technology - COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.
control plane (CP) - The control plane is the part of a network that carries signaling traffic and is responsible for routing.
control system - A control system is a set of mechanical or electronic devices that regulates other devices or systems by way of control loops.
Control-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
controller - A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities.
ControlUp - ControlUp is a monitoring software company that sells tools IT professionals can use to manage, monitor and analyze virtual desktop and application performance.
CONUS - Refers to the continental United States.
CONUS (continental United States) - Refers to the continental United States.
conventional memory - DOS memory, sometimes referred to as conventional memory, refers to the memory -addressing scheme used in the original IBM and compatible PCs.
converged data center - A converged data center pre-integrates server, storage and networking hardware with management, hypervisor and operating system platforms, as well as applications and services.
converged infrastructure - Converged infrastructure is an approach to data center management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance.
converged infrastructure reference architecture - A converged infrastructure reference architecture is a document that stipulates the components, design and configuration a CI appliance, which includes storage, compute and networking resources within a single-box system.
converged network adapter - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
converged network adapter (CNA) - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
converged secondary storage - Converged secondary storage is a combination of common data protection elements and non-primary storage tasks into one platform.
converged storage - Converged storage is the combination of storage and computing hardware and processes to speed delivery time, optimize application performance, and minimize power, cooling, and physical space requirements in virtualized and cloud-based environments.
conversational commerce (voice commerce) - Conversational commerce is the process of interacting with a brand or making a purchase through a voice assistant or chat application.
Conversational Monitor System - CMS (Conversational Monitor System) is a product that comes with IBM's VM/ESA operating system and allows each of many simultaneous interactive users to appear to have an entire mainframe computer at their personal disposal.
Conversational Monitor System (CMS) - CMS (Conversational Monitor System) is a product that comes with IBM's VM/ESA operating system and allows each of many simultaneous interactive users to appear to have an entire mainframe computer at their personal disposal.
conversational user interface - A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users.
conversion rate - The conversion rate is the rate at which website visitors or potential customers take a specific desirable action.
conversion rate optimization - In online marketing, conversion rate optimization (CRO) is a strategic approach to increasing the percentage of website visitors who follow a desired call to action.
convertible tablet - A convertible tablet is a computer that can function as either a standalone touch screen device or as a notebook with a physical keyboard.
convolutional neural network - A convolutional neural network (CNN) is a type of artificial neural network used in image recognition and processing that is specifically designed to process pixel data.
Conway's law - Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.
COO - Cell of Origin (COO) is a mobile positioning technique for finding a caller's cell (the basic geographical coverage unit of a cellular telephone system) location.
cook-off test - A cook-off test is a controlled experiment conducted to determine if or how soon a component, device or system will malfunction because of internally generated heat.
cooked data - Cooked data is raw data after it has been processed - that is, extracted, organized, and perhaps analyzed and presented - for further use.
cookie - A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.
cookie poisoning - On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft.
cool - On the World Wide Web, cool has a number of meanings, including:EngagingLaid-back, understatedIn tune with the latest thinking, even a little ahead of itTechnically or graphically impressiveThe term "cool" seems to have originated among jazz musicians in the 1940s.
cooperative (co-op) - A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members.
cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
coopetition (co-opetition) - Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.
Coordinated Universal Time - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
Coordinated Universal Time (UTC, GMT, CUT) - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
coordinates - Coordinates are distances or angles, represented by numbers, that uniquely identify points on surfaces of two dimensions (2D) or in space of three dimensions (3D).
COPE (corporate-owned, personally-enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
COPPA (Children's Online Privacy Protection Act ) - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
Copper Distributed Data Interface - For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.
coprocessor - A coprocessor is a special set of circuits in a microprocessor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits could perform the same task.
COPS - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
COPS (Common Open Policy Service Protocol) - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
copy board - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
copy data - Copy data is the electronic data that is created as a result of data protection functions like backups, snapshots and disaster recovery.
copy data management (CDM) - Copy data management (CDM) is an approach to reducing storage consumption that involves eliminating the unnecessary duplication of production data.
copy-on-write snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
copyleft - Copyleft is the idea and the specific stipulation when distributing software that the user will be able to copy it freely, examine and modify the source code, and redistribute the software to others (free or priced) as long as the redistributed software is also passed along with the copyleft stipulation.
copypasta - Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.
copyright - Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, movies, music and computer programs.
CORBA - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
CORBA (Common Object Request Broker Architecture) - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
cordless mouse - A cordless mouse frees you from cord problems.
core banking system - A core banking system is the software used to support a bank’s most common transactions.
core competency (core competencies) - Core competency is an organization's defining strength, providing the foundation from which the business will grow, seize upon new opportunities and deliver value to customers.
core dump - A core dump is the printing or the copying to a more permanent medium (such as a hard disk) the contents of random access memory (RAM) at one moment in time.
core HR (core human resources) - Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and the software used to manage basic HR processes.
core router - A core router is a router that forwards packets to computer hosts within a network (but not between networks).
CoreOS rkt - CoreOS rkt (pronounced rocket) is a containerization engine to run application workloads in isolation from the underlying infrastructure.
Cornerstone OnDemand - Cornerstone OnDemand is a vendor of cloud-based learning and talent management software.
corollary - A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.
corporate account manager - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
corporate account manager (CAM) - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
corporate activism - Corporate activism is a public stance taken by a large enterprise to positively impact social change or legislation.
corporate area network - A corporate area network (CAN) is a separate, protected portion of a corporation's intranet.
corporate area network (CAN) - A corporate area network (CAN) is a separate, protected portion of a corporation's intranet.
Corporate Average Data center Efficiency - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
corporate business glossary - A corporate business glossary is a collection of terms commonly used within a business, along with their standard definitions specific to industry and the organization.
corporate cloud - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
Corporate Compliance Officer - A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.
corporate culture - Corporate culture is the collection of values, beliefs, ethics and attitudes that characterize an organization and guide its practices.
corporate culture model - A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.
corporate division - A corporate division, also known as a business division, is a discrete part of a company that may operate under the same name and legal responsibility or as a separate corporate and legal entity under another business name.
corporate email policy - A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment.
corporate executive board - A corporate executive board, or board of directors, oversees activities and strategic planning and decision making in an organization.
corporate governance - Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.
corporate mobility policy - A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network.
corporate performance - Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.
Corporate Performance Management - Corporate performance management (CPM) is the area of business intelligence involved with monitoring and managing an organization's performance.
corporate performance management (CPM) - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
corporate portal - Corportal is short for "corporate portal.
corporate social responsibility - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
corporate social responsibility (CSR) - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
corporate travel management software - Corporate travel management (CTM) software is a computer program or suite designed to oversee, regulate, and coordinate the travel activities and expenses of a company's employees.
corporate virtual machine - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
corporate VM - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
corporate VM (corporate virtual machine) - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
corporate wellness technology - Corporate wellness technology is software, and sometimes associated hardware, that human resources departments use to improve and manage workers' health and well-being.
corporation (C corporation, C corp) - A corporation is a large and complex organization that is owned by its shareholders and governed by a board of directors.
corportal - Corportal is short for "corporate portal.
corportal (Corporate Portal) - Corportal is short for "corporate portal.
correlated subquery - A correlated subquery is a SQL query that depends on values executed by the outer query in order to complete.
correlation - Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in relation to each other.
correlation coefficient - A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another.
correlation engine - A correlation engine is a software application that programmatically understands relationships.
cosine wave - A cosine wave is a signal waveform with a shape identical to that of a sine wave, except each point on the cosine wave occurs exactly 1/4 cycle earlier than the corresponding point on the sine wave.
Cosmo - Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.
Cosmos - Cosmos is an open source, evolving, .
COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
cost benefit analysis - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
cost center - Cost centers are a necessary evil in companies, departments that don't contribute to the bottom line but are essential to the everyday maintenance of business processes.
cost containment - Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.
cost management - Cost management is the process of planning and controlling the budget of a business.
cost of goods sold (COGS) - Cost of goods sold (COGS) is the total of the costs directly attributable to producing goods.
Cost Per Call - In a call center, cost per call is a numerical metric calculated by dividing the total operational costs by the total number of calls for a given period of time.
cost per engagement (CPE) - Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when users interact with their campaign in some way.
cost per impression - Cost per Impression (CPI) is a business efficiency measure common to advertising in paper and web-based media.
cost per like (CPL) - Cost per like (CPL) is the amount a company pays to receive a new fan for a Facebook page, through paid advertising and sometimes through earned media.
cost per sale (CPS) - The cost per sale (CPS), also known as the pay per sale, is a metric used by advertising teams to determine the amount of money paid for every sale generated by a specific advertisement.
cost price - A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.
cost-benefit analysis - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
cost-benefit analysis (CBA) - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
cost-benefit analysis software - Cost-benefit analysis software is a computer program or suite that assists personnel in the complex task of determining whether or not a proposed plan or project will pay off.
cost-plus pricing - Cost-plus pricing is a pricing model in which the price charged for a product is equal to its cost of production plus a specific mark up.
COTS - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
COTS (commercial off-the-shelf) - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
CouchDB - CouchDB is an open source document-oriented database based on common web standards.
coulomb - The coulomb (symbolized C) is the standard unit of electric charge in the International System of Units (SI).
coulomb per centimeter squared - The coulomb per centimeter squared (symbolized C/cm 2) is a unit of electric flux density.
coulomb per meter cubed - The coulomb per meter cubed is the unit of electric charge density.
counter - On the Web, a counter is a program that counts and typically displays how many people have visited an HTML page (usually the home page).
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
counterfeit detector pen - A counterfeit detector pen is a felt tip pen containing an iodine solution that can be used to help identify computer-generated counterfeit bills.
counterintelligence - Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions.
countermeasure - A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.
counterthreat operations team - A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and long-term recommendations for improvements in software development as well as configuration and network management.
countess of Lovelace - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
counting board - Historically, a counting board was a portable flat surface, usually of wood or stone, on which a user placed objects such as pebbles or beads for the purpose of maintaining a count of something.
coupling - Coupling is the act of joining two things together.
courseware - Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.
courtesy copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
covert redirect - Covert redirect is a security flaw that allows attackers to exploit an open redirect vulnerability.
COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
cow power - Cow power is a term for the conversion of manure to usable energy.
cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
cowboy coding - Cowboy coding describes an undisciplined approach to software development.
coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
cPanel (cPanel Control Panel) - cPanel is a Unix-based control panel that automates and simplifies the website hosting process.
CPCA - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
CPE - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
CPE credit - Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields.
CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
CPIO - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
CPL - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
CPM - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
CPM - Corporate performance management (CPM) is the area of business intelligence involved with monitoring and managing an organization's performance.
CPNI - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
CPNI (Customer Proprietary Network Information) - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
CPOE - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
CPRM - Content Protection for Removable Media (CPRM) is a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying.
CPS - Cps (cycles per second) is the measure of how frequently an alternating current changes direction.
CPT - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
CPU - CPU (central processing unit) is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.
CPW - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
CR - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones.
CRAC - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
cracking - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
CRAH - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
CRAM - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
cramming - Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.
crapware - Definition - What is crapware?Crapware is an unflattering name for unwanted software or software that doesn't perform as expected.
crash - A crash is the sudden failure of a software application or operating system or of a hardware device such as a hard disk.
Crash Course: Spyware - In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge.
CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
Cray Inc. - Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.
CRC - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
CRC - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
CRC 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
CRC-4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
create read update delete - The CRUD cycle describes the elemental functions of a persistent database in a computer.
Creative Commons - Creative Commons is a nonprofit organization that offers copyright licenses for digital work.
creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
credential prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
credential session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
credential stuffing - Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login.
credential/session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
Credit Card Accountability, Responsibility, and Disclosure Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
Credit CARD Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
creeping featuritis - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
creepy whisper - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
crimeware - Crimeware is programming that is designed to facilitate illegal online activity.
crimeware kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
crippleware - Crippleware is any software program that cannot be fully utilized until the user registers or, in the case of shareware, purchases the program.
crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
crisis management - Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event.
crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
critical infrastructure security - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
critical path - The critical path is the longest sequence of tasks in a project plan.
critical path method - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
critical path method (CPM) - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
critical section routine - In computers, a critical section routine is an approach to the problem of two or more programs competing for the same resource at the same time.
critical success factors - Critical success factors are a limited number of key variables or conditions that have a tremendous impact on how successfully and effectively an organization meets its mission or the strategic goals or objectives of a program or project.
critical thinking - Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems.
CRL - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
CRM Quizzes - We've gathered quizzes to test your knowledge of customer relationship management and related issues.
CRO - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
CRON script - A CRON script is a list of one or more commands to a computer operating system or application server that are to be executed at a specified time.
crontab - crontab is a UNIX command that creates a table or list of commands, each of which is to be executed by the operating system at a specified time.
crop insurance - Crop insurance is a type of protection policy that covers agricultural producers against unexpected loss of projected crop yields or profits from produce sales at market.
cross engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
cross section - A cross section is a cut through something (such as a coaxial cable) at an angle perpendicular to its axis in order to view its interior structure.
cross site scripting - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
cross site tracing - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
cross-bar switch - In a network, a cross-bar switch is a device that is capable of channeling data between any two devices that are attached to it up to its maximum number of ports.
cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
cross-channel analytics - Cross-channel analytics is a strategy used by marketing professionals to study the methods by which customers are influenced to buy a product or service, especially when those methods are combined.
cross-docking - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
cross-engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
cross-functional team - A cross-functional team is a workgroup made up of employees from different functional areas within an organization who collaborate to reach a stated objective.
cross-media ownership - Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies.
cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
cross-post - On a Web or bulletin board discussion list or a Usenet newsgroup, a cross-post is the posting (submission) of an article to more than one discussion list or newsgroup at a time.
cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.
cross-site request forgery - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
cross-site request forgery (XSRF or CSRF) - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
cross-site scripting - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
cross-site tracing - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
cross-site tracing (XST) - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
crossbar latch - A crossbar latch, also called a molecular crossbar latch, is a nanoscale device with properties similar to those of a conventional silicon transistor, but physically much smaller, having a diameter of approximately 2 nanometers (nm, where 1 nm = 10-9 m).
crossfade - In digital audio production, a crossfade is editing that makes a smooth transition between two audio files.
crossover cable - A crossover cable is a cable that is used to interconnect two computers by "crossing over" (reversing) their respective pin contacts.
crosstalk - Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit.
crowdcasting - Crowdcasting is a problem-solving and idea-generating tactic in which a corporation disseminates details of a specific problem or situation to a carefully chosen group of people for possible solutions.
crowdfunding - Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals.
crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
CRT - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
CRUD cycle - The CRUD cycle describes the elemental functions of a persistent database in a computer.
CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
crumb - In computers, crumb is jargon for two bits (that is, two binary digits).
CRUSH (Controlled Replication Under Scalable Hashing) - CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.
Crusoe - Crusoe is a family of "smart" microprocessors from Transmeta that combines a relatively simple, low-powered hardware processor with software that makes the hardware processor look like an x86 Intel processor (such as a Pentium III).
cryogenics - Cryogenics is the study of material sciences at extremely low temperatures.
cryptanalysis - Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.
crypto - Depending on its usage, crypto can be a short form for cryptography or for encryption.
crypto-agility - Crypto-agility, or cryptographic agility, is a data encryption practice used by organizations to ensure a rapid response to a cryptographic threat.
cryptocurrency - A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.
cryptogram - A cryptogram is a word puzzle featuring encrypted text that the user decrypts to reveal a message of some sort.
cryptographic checksum - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
cryptographic nonce - A nonce is a random or semi-random number that is generated for a specific use, typically related to cryptographic communication or information technology.
cryptography - Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
cryptojacking - Cryptojacking is the surreptitious and unauthorized use of a computer for the resource and power-demanding requirements of cryptocurrency mining.
cryptology - Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.
cryptomining malware - Cryptomining malware is a form of malware that takes over a computer or mobile device's resources and uses them to perform cryptocurrency mining, a process of verifying cryptocurrency transactions using complex mathematical formulas also known as cryptojacking.
cryptoperiod - A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.
cryptoperiod (key lifetime or a validity period) - A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.
cryptosystem - A cryptosystem is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely.
cryptotrojan - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
cryptovirus - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
cryptovirus cryptoworm - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
cryptoworm - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
Crypzip - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
CSA - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
CSAT - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
CSC - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
CSC - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
CSD - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
CSD (circuit switched data) - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
CSMA CD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
CSMA/CA - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
CSMA/CD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
CSMACD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
CSO - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
CSO (Chief Security Officer) - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
CSR - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
CSR - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
CSR (Certificate Signing Request) - A Certificate Signing Request or CSR is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) validating the information required by the CA in order for it to issue a certificate.
CSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
CSS - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
CSS - Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.
CSS (cascading style sheets) - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
CSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
CSU DSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
CSU/DSU (Channel Service Unit/Data Service Unit) - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
CSV - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
CSV file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
CT scan - A computerized tomography (CT scan) is a form of computer-assisted imaging, that is assembled from many xrays.
CTC - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
CTC - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
CTCI - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
CTCI (Computer-to-computer interface) - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
CTD - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
CTI - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
CTI (computer-telephony integration) - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
CTOps team - A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and long-term recommendations for improvements in software development as well as configuration and network management.
CTP - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
Ctrl-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
CubeSat - A CubeSat is a small, low-cost, cube-shaped research satellite.
cubic foot - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
cubic meter - The cubic meter is the unit of volume in the International System of Units.
cubic meter (meter cubed) - The cubic meter is the unit of volume in the International System of Units.
cubicle - An idea that is now over 40 years old, the office cubicle is a somewhat partitioned space for one or several workers in what is otherwise an unpartitioned and open building space for offices.
cuckoo egg - A cuckoo egg is an MP3 file that typically contains 30 seconds of the original song with the remainder of the song overwritten with cuckoo clock noises, white noise, and/or voice messages such as, "Congratulations, you must've goofed up somewhere.
cultural fit - Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.
culture hacking - Culture hacking is the gradual process of implementing numerous small, positive changes in an organization.
culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
cumulative trauma disorder - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
cumulative trauma disorder (CTD) - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
curie - The curie is a unit of ionizing radiation (radioactivity), symbolized Ci and equal to 3.
curiosity artificial intelligence (curiosity AI) - Curiosity artificial intelligence (curiosity AI) is the simulation of human curiosity in artificial intelligence.
curiosity gap - The curiosity gap is the detection that new and valuable information is available, sparking people’s desire to access it.
Curl - Curl is an object-oriented programming language designed to replace HTML, JavaScript, and related tools as a means for creating interactive Web pages.
currency - Currency is anything that is generally accepted to have value as a medium of exchange so that it can be traded for goods and services.
current - Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.
Current Procedural Terminology - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
CUSeeMe - CUseeMe is a low-cost product for Internet videoconferencing.
custom domain name suffix - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
custom factory integration - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
custom factory integration (CFI) - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
custom TLD - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
customer analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
customer communications management (CCM) - Customer communications management (CCM) is the administration of outbound communications to customers that includes the creation, delivery and storage of all types of communications.
customer data analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
customer data integration - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
Customer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
customer edge router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
customer experience (CX) automation - Customer experience (CX) automation is any technology that assists customers with common tasks, sometimes replacing the involvement of humans, to improve customer interactions.
customer feedback loop - A feedback loop, in customer relationship management (CRM), is a strategy for gathering information about a buyer’s perception of a product or service in order to determine future actions.
customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or cross-selling or up-selling strategies.
Customer Information Control System - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
customer intelligence - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
customer intelligence (CI) - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
customer lifetime value (CLV) - The customer lifetime value (CLV) is a metric that represents a customer's monetary worth to an organization.
customer loyalty - Customer loyalty is an adherence between a customer and a brand that causes the customer to make repeat purchases.
customer premises equipment - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
customer premises equipment (CPE) - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
customer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
Customer Proprietary Network Information - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
customer satisfaction - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
customer scoring models - A customer scoring model is a component of customer relationship management (CRM) programs that refers to various metrics used to help companies predict the long term financial value of customers.
customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
customer service chat (CSC) - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
customer success - Customer success is a strategy to assure that a company’s products are meeting the needs of the customer.
customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
customer valuation - In customer relationship management (CRM), customer valuation is a scoring process used to help a company determine which customers the company should target in order to maximize profit.
customer-centric - Customer-centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
CUT - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
cut-and-paste attack - A cut-and-paste attack is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.
cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
CVC - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
CVE - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
CVO - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
CVO (chief visionary officer) - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
CVS - CVS also is an abbreviation for Computer Vision Syndrome.
CVSS (Common Vulnerability Scoring System) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in software.
CVV - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
CWDM - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
CWNP - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
cXML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
cyan magenta yellow key - CMYK is a scheme for combining primary pigments.
cyan, magenta, yellow, and black pigment model - CMYK is a scheme for combining primary pigments.
cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
cyber attack - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
cyber espionage - Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.
cyber hijacking - Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
cyber hygiene - Cyber hygiene (or cybersecurity hygiene) is a cybersecurity practice that maintains the basic health and security of hardware and software.
Cyber Intelligence Act - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
Cyber Intelligence Sharing and Protection Act of 2011 - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
Cyber Intelligence Sharing and Protection Act of 2011 (CISPA) - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
Cyber Storm - Cyber Storm is the name of a simulated attack exercise conducted by the U.
cyber vigilantism - Cyber vigilantism is a rough approximation of law enforcement or an attempt at achieving justice or accomplishing something online through unauthorized channels.
cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
cybercommuting - Telecommuting and telework are synonyms for the use of telecommunication to work outside the traditional office or workplace, usually at home (SOHO) or in a mobile situation.
cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
cyberextortionist - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
cyberforensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
cyberheist - A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly.
cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
Cyberoam - Cyberoam is a vendor for information security products and services.
cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
cybersecurity - Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.
Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is the division of the Department of Homeland Security (DHS) that is tasked with defending the infrastructure of the internet and improving its resilience and security.
Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
cybersecurity insurance (cybersecurity liability insurance) - Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to help reduce the financial risks associated with doing business online.
cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
cybersquatting - Cybersquatting is registering, trafficking in, or using a domain name with bad-faith intent to profit from the goodwill of a trademark belonging to someone else.
cyberstalker - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
cyberstalking - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
cyberterror - According to the U.
cyberterrorism - According to the U.
cyberwarfare - Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state.
cyborg - Cyborg, a compound word derived from cybernetics and organism, is a term coined by Manfred Clynes in 1960 to describe the need for mankind to artificially enhance biological functions in order to survive in the hostile environment of Space.
cyborg anthropologist - A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
cyborg insect - The Hybrid Insect Micro-Electro-Mechanical Systems (HI-MEMS) program, also known as the cybug program, is a proposal from the Defense Advanced Research Projects Agency (DARPA) to encourage the development of cyborg insects that can be controlled by humans.
cybrarian - A cybrarian (pronounced sai-BREHR-i-uhn, a compound of cyber and librarian) is a library and information science professional that specializes in using the Internet as a resource tool.
cycle counting - Cycle counting is an inventory-control method that lets businesses conduct a regular count of several items in different areas in a warehouse, without constantly adding up the entire inventory.
cycle time - Cycle time is the time, usually measured in nanosecond s, between the start of one random access memory (RAM) access to the time when the next access can be started.
cycles per second - Cps (cycles per second) is the measure of how frequently an alternating current changes direction.
cycles per second (CPS) - Cps (cycles per second) is the measure of how frequently an alternating current changes direction.
Cyclic Redundancy Check 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
cyclic redundancy checking - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
Cyclic Redundancy Checking 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.
Cygwin - Cygwin is an open source collection of tools that allows Unix or Linux applications to be compiled and run on a Windows operating system from within a Linux-like interface.
CYOD (choose your own device) - CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options.
cypherpunk - Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy.
Cyrix - Cyrix (pronounced SYE-rihks) was a line of low-cost microprocessors intended for personal computers and information appliances that competed, along with AMD and Intel, for the low-cost microprocessor market.