Browse Definitions :

Browse Definitions by Alphabet

AWS - CAV

  • AWS CloudWatch - Amazon CloudWatch is a component of Amazon Web Services that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • C - C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community.
  • C shell - C shell is the UNIX shell (command execution program, often called a command interpreter) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell.
  • C# (C-Sharp) - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • C-Level (C-Suite) - C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.
  • CA Privileged Access Manager - CA Privileged Access Manager is a product, available as a rack-mounted hardware appliance or a virtual appliance, that tracks and secures the usage of logins involving access to administrative control or sensitive information.
  • cabinet file (.cab) - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
  • cable modem termination system (CMTS) - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • cache algorithm - A cache algorithm is a detailed list of instructions that decides which items should be discarded in a computer's cache of information.
  • cache coherence - In a shared memory multiprocessor with a separate cache memory for each processor, it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory.
  • cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
  • cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • cache server - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • caching - Caching (pronounced “cashing”) is the process of storing data in a cache.
  • CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • CAD/CAM (computer-aided design/computer-aided manufacturing) - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Caffe2 - Caffe2 (Convolutional Architecture for Fast Feature Embedding) is an open source, high-performance framework for the development of machine learning models.
  • CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
  • calculator - A calculator is a device that performs arithmetic operations on numbers.
  • calibration - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
  • calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
  • California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call center - A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
  • call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
  • call center schedule adherence - Call center schedule adherence is a standard metric used in business call centers to determine whether call center agents are working the amount of time they are scheduled to work.
  • call center shrinkage - Call center shrinkage is a measure of how much time is lost in the call center because agents are unavailable to receive calls.
  • Call Center Terms: Glossary - This is a WhatIs.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call management - Call management is the process by which inbound telephone calls are routed to call center agents.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • call tree - A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.
  • callback (international callback) - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
  • CALMS - CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
  • calorie (cal) - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
  • camcorder (camera recorder) - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • CamelCase - CamelCase is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized so that each word that makes up the name can easily be read.
  • Campbell's Law - Campbell's Law is the observation that once a metric has been identified as a primary indicator for success, its ability to accurately measure success tends to be compromised.
  • campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university, or similar organization.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • canary testing - In software testing, a canary is a push of programming code changes to a small group of end users who are unaware that they are receiving new code.
  • candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken to ensure that a computing infrastructure has adequate resources to handle current data processing requirements as well as the capacity to accommodate future loads.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity planning - In information technology, capacity planning is the science and art of estimating the space, computer hardware, software and connection infrastructure resources that will be needed over some future period of time.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon capture and reuse (CCR) - Carbon capture and reuse (CCR, also sometimes seen as carbon capture and utilization or CCU) is the collection of carbon dioxide (CO2) from a high-output source point or the environment and reuse of the carbon that is captured in that process.
  • carbon capture and storage (CCS) - Carbon capture and storage (CCS, also sometimes standing for carbon capture and sequestration) is the collection of CO2 for storage as a gas or as a different form of carbon after separating out the oxygen.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon negative - Carbon negativity is the reduction of an entity’s carbon footprint to less than neutral, so that the entity in question has a net effect of removing carbon dioxide from the atmosphere rather than adding it.
  • carbon offset - A carbon offset is a credit that a person or organization can buy to decrease its carbon footprint.
  • carbon usage effectiveness (CUE) - Carbon usage effectiveness (CUE) is a metric developed by The Green Grid to help organizations measure the amount of carbon used -- or carbon footprint -- in the daily operations of their data centers.
  • Carbonite - Carbonite Inc.
  • card (or expansion card , board , or adapter) - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card-not-present fraud (card-not-present transaction) - Card-not-present (CNP) fraud is the unauthorized use of a payment card to conduct a card-not-present transaction when the cardholder cannot or does not physically present the card at the time of the transaction.
  • cardholder data (CD) - Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data types: cardholder name, expiration date or service code (a three- or four-digit number coded onto the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe-read transaction).
  • cardholder data environment (CDE) - A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data, as well as any component that directly connects to or supports this network.
  • cardinality - The term cardinality refers to the number of cardinal (basic) members in a set.
  • Caringo Swarm - Swarm is software designed to store unstructured data on an object storage platform.
  • carrier cloud - A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • Carrier Sensitive Routing (CSR) - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • cartel - A cartel is a body of independent producers that work together to decide production levels and prices.
  • Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • cartonization - Cartonization is a process that uses algorithms to evaluate the items in an order to determine the number and size of each carton needed to ship the order.
  • case - A case is a particular instance of something.
  • case study - In a business context, a case study is a documented implementation of something, such as a practice, a product or a service.
  • case-based reasoning (CBR) - Case-based reasoning (CBR) is an experience-based approach to solving new problems by adapting previously successful solutions to similar problems.
  • Cassandra (Apache Cassandra) - Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.
  • catastrophic failure - Catastrophic failure is a complete, sudden, often unexpected breakdown in a machine, electronic system, computer or network.
  • catchball - Catchball is an approach to decision-making in an organization or group where ideas are pitched from one individual to another throughout the group’s hierarchy and divisions.
  • Categories of twisted-pair cabling systems - A twisted-pair cabling system is a cable consisting of one or several pairs of copper wires.
  • catfish - A catfish is someone who creates a false identity online to deceive victims, often as a means of attracting romantic interest.
  • cathode - A cathode is the metallic electrode through which current flows out in a polarized electrical device.
  • cathode ray tube (CRT) - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
  • causation - Causation, or causality, is the capacity of one variable to influence another.
  • CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close