Browse Definitions :

Browse Definitions by Alphabet

CER - CIT

  • Certified Associate in Project Management (CAPM) - The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.
  • Certified Cloud Security Professional (CCSP) - The Certified Cloud Security Professional (CCSP) certification is intended for experienced IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of the six CCSP domains.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor (CISA) - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CGI (computer-generated imagery) - CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (AR) and virtual reality (VR) applications.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • change log - A change log is a record of requests for change (RFCs) submitted for all changes in a service.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • change management strategy - A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
  • channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
  • channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • chaos theory - Chaos theory is the study of nonlinear dynamics, in which seemingly random events are actually predictable from simple deterministic equations.
  • CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • character - In information technology, a character is a printable symbol having phonetic or pictographic meaning and usually forming part of a word of text, depicting a numeral, or expressing grammatical punctuation.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge cycle - The number of charge cycles a rechargeable battery can withstand before performance degrades is the accepted method of measurement for rating rechargeables’ charge cycles.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • chart of accounts (COA) - A chart of accounts (COA) is a financial, organizational tool that provides an index of every account in an accounting system.
  • chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • chatbot - A chatbot is a software or computer program that simulates the human conversation or "chatter" through text or voice interactions.
  • ChatOps - ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed.
  • chatting - While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, it can also occur over the internet via Short Message Service (SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • Cheat Sheet - Characters and quotes from The Phoenix Project - Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot.
  • Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project' - Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.
  • check digit (checksum character) - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
  • checksum - A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions.
  • Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
  • Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
  • chief architect (chief IT architect) - In information technology (IT), a chief architect is a c-level executive whose job is to look closely at how IT functions can be centralized so that departments across the company can work together seamlessly.
  • chief customer officer (CCO) - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • chief data officer (CDO) - A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data management responsibilities related to the business to derive maximum value from the data available to the enterprise.
  • chief digital officer (CDO) - A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create business value.
  • chief diversity officer (CDO) - The chief diversity officer (CDO) is a senior leader who develops and implements diversity, equity and inclusion initiatives within an organization.
  • chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • Chief Operating Officer (COO) - A Chief Operating Officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • Chief Process and Innovation Officer (CPIO) - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • Chief Strategy Officer (CSO) - A chief strategy officer (CSO), or chief strategist, is an executive charged with helping formulate, facilitate and communicate the overarching strategy of an organization, usually a large corporation.
  • Chief Technology Officer (CTO) - The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • chief transformation officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
  • Chinese wall - A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information.
  • chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
  • circuit - In electronics, a circuit is a complete circular path that electricity flows through.
  • circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches.
  • Cisco LISP (Location Identifier Separation Protocol) - LISP (Location Identifier Separation Protocol) is a routing and addressing architecture developed by Cisco Systems.
  • Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
  • citizen data scientist - A citizen data scientist is an individual who does some data science work for an organization but doesn't hold the title of data scientist or have a formal background in advanced analytics, statistics or related disciplines.
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • Citizen's Band Radio (CB) - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citrix - Citrix is an American corporation that produces software designed to facilitate secure access to applications and content.
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close