Browse Definitions :

Browse Definitions by Alphabet

  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
  • channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • Chaos Monkey - Chaos Monkey is a software tool Netflix engineers developed to test the resiliency and recoverability of their Amazon Web Services (AWS) infrastructure.
  • CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • chart of accounts (COA) - A chart of accounts (COA) is a financial, organizational tool that provides an index of every account in an accounting system.
  • chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
  • chat room - A chat room is an online platform that enables users to communicate with each other in real time.
  • chatbot - A chatbot is a software or computer program that simulates the human conversation or "chatter" through text or voice interactions.
  • ChatGPT - ChatGPT is an AI chatbot that uses natural language processing to create humanlike conversational dialogue.
  • ChatOps - ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.
  • chatting - While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, it can also occur over the internet via Short Message Service (SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • Cheat Sheet - Characters and quotes from The Phoenix Project - Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot.
  • Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project' - Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.
  • checksum - A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions.
  • Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
  • Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
  • chief customer officer (CCO) - A chief customer officer, or customer experience officer, is responsible for customer research, communicating with company employees and taking charge of customer experience (CX) metrics.
  • chief data officer (CDO) - A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data management responsibilities related to the business to derive maximum value from the data available to the enterprise.
  • chief digital officer - A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies, such as the cloud, AI, machine learning, automation, IoT, mobile and social media, to create business value.
  • chief diversity officer (CDO) - The chief diversity officer (CDO) is a senior leader who develops and implements diversity, equity and inclusion initiatives within an organization.
  • chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
  • chief financial officer (CFO) - A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations and strategy.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • chief marketing officer (CMO) - A chief marketing officer (CMO) is a C-suite executive responsible for overseeing the planning, development and execution of an organization's marketing and advertising initiatives.
  • Chief Medical Information Officer (CMIO) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a healthcare organization.
  • chief operating officer (COO) - A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chief strategy officer (CSO) - A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an organization's strategic initiatives and future goals.
  • chief sustainability officer (CSO) - A chief sustainability officer (CSO) is an executive tasked with improving sustainability within the company.
  • Chief Technology Officer (CTO) - The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • chief transformation officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CIA triad (confidentiality, integrity and availability) - The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
  • circuit - In electronics, a circuit is a complete circular path that electricity flows through.
  • circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
  • circular economy - A circular economy is a model of production and consumption, where items and products are reused whenever possible rather than discarded.
  • Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a collection of proprietary operating systems (OSes) that runs on Cisco hardware devices, including Cisco Systems network devices, routers and network switches.
  • Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
  • citizen data scientist - A citizen data scientist is an individual who does some data science work for an organization but doesn't hold the title of data scientist or have a formal background in advanced analytics, statistics or related disciplines.
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • Citrix - Citrix Systems is a U.
  • Citrix Cloud - Citrix Cloud is a management and delivery platform for IT administrators to design, deliver and manage virtual desktops and applications and other services, such as file sharing, on any device.
  • Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
  • Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of graphics acceleration technologies that help optimize the delivery of resource-intensive virtual applications on a company's XenDesktop and XenApp platforms.
  • Citrix StoreFront - Citrix StoreFront is an enterprise application store that provides an interface for users to access Citrix Virtual Apps -- formerly XenApp apps -- and Citrix Virtual Desktops -- formerly XenDesktop -- remotely.
  • Citrix Workspace app (Citrix Receiver) - Citrix Receiver was renamed the Citrix Workspace app in 2018.
  • Citrix XenApp - Citrix XenApp, now called Citrix Virtual Apps, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
  • Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library (in object-oriented programming) - In object-oriented programming, a class library is a collection of classes and other reusable software components, such as interfaces and value types.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
  • classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity, or carbon-free electricity, is electricity without high voltage spikes and drops, meaning it is low on emitting electrical pollution.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • click fraud (pay-per-click fraud) - Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for online advertisements.
  • clickstream data (clickstream analytics) - Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • client - A client is a hardware or software device that requests access to a service that is typically made available by a server.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
  • client-server - Client-server is a relationship in which one program, the client, requests a service or resource from another program, the server.
  • client-server network - A client-server network is a distributed communications architecture in which a centralized server receives and responds to requests for services and data from multiple clients.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close