Browse Definitions :

Browse Definitions by Alphabet

CHI - CLA

  • Chief Digital Officer (CDO) - A chief digital officer (CDO) is an executive enlisted to help businesses transform traditional IT policies and business processes to accommodate digital sectors such as mobile technology and applications and Web-based information management and marketing trends.
  • chief diversity officer (CDO) - The chief diversity officer (CDO) is a senior leader who develops and implements diversity, equity and inclusion initiatives within an organization.
  • chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • Chief IoT Officer (Chief Internet of Things Officer) - A Chief Internet of Things Officer is an enterprise executive in charge of how smart products are developed and implemented to best support company objectives and goals.
  • chief learning officer (CLO) - A chief learning officer (CLO) is a senior-level executive who ensures that a company's corporate learning program and strategy supports its overall business goals.
  • chief marketing technologist (CMT) - A chief marketing technologist (CMT) is a C-level executive who sets a technology vision for the marketing team that aligns with business goals.
  • Chief Operating Officer (COO) - A Chief Operating Officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • Chief Process and Innovation Officer (CPIO) - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chief storyteller - A chief storyteller is an employee of an organization tasked with wording the company's mission, history and messages about their brand, also known as their story, as they want it to be heard internally and externally.
  • Chief Strategy Officer (CSO) - A chief strategy officer (CSO), or chief strategist, is an executive charged with helping formulate, facilitate and communicate the overarching strategy of an organization, usually a large corporation.
  • Chief Technology Officer (CTO) - The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • Chief Transformation Officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
  • chilling effect - The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.
  • CHIME (College of Healthcare Information Management Executives) - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • Chinese wall - A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information.
  • chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • chorus - In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface (MIDI).
  • Chrome Remote Desktop - Chrome Remote Desktop is an extension of the Google Chrome browser that allows a user to remotely see and control another user's desktop through the browser window.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinemagraph - A cinemagraph is an image that combines still photography with active video to create a picture that contains a small moving element while the rest is frozen.
  • cinematography (cinematographer) - Cinematography is a blend of science and art used to capture, manipulate and store moving images for the purpose of creating a motion picture.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • CipherCloud - CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
  • circuit - In electronics, a circuit is a complete circular path that electricity flows through.
  • circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Certified Security Professional (CCSP) - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
  • Cisco Information Security Specialist (CISS) - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches.
  • Cisco Jasper - Cisco Jasper is a branch of the networking company that provides a cloud-based software platform for businesses looking to provide cloud services.
  • Cisco LISP (Location Identifier Separation Protocol) - LISP (Location Identifier Separation Protocol) is a routing and addressing architecture developed by Cisco Systems.
  • Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
  • citation style guides - A number of generally recognized authorities and organizations offer guidance about how to cite sources when writing an academic or journalistic paper.
  • citizen data scientist - A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational background in data analytics (DA) or business intelligence (BI).
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • Citizen's Band Radio (CB) - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citrix - Citrix is an American corporation that produces software designed to facilitate secure access to applications and content.
  • Citrix App Layering (formerly Citrix AppDisk) - Citrix App Layering, formerly Citrix AppDisk, is a tool that delivers applications in layers independently from the virtual desktop operating system.
  • Citrix AppDNA - Citrix AppDNA is an application testing and management technology for XenApp and XenDesktop that analyzes virtual applications' compatibility with specific operating systems and configurations.
  • Citrix certfication - Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.
  • Citrix Cloud - Citrix Cloud is a workspace management tool IT can use to deliver resources, including virtual desktops and apps, to users from a public or private cloud, on-premises deployment, or all three.
  • Citrix Director - Citrix Director is a management console in XenDesktop and XenApp that allows IT administrators to monitor virtual desktop and application deployments, including user and infrastructure tracking.
  • Citrix FlexCast - Citrix FlexCast is a delivery technology that allows an IT administrator to personalize virtual desktops to meet the performance, security and flexibility requirements of end users.
  • Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of graphics acceleration technologies that help optimize the delivery of resource-intensive virtual applications on a company's XenDesktop and XenApp platforms.
  • Citrix Machine Creation Services (Citrix MCS) - Citrix Machine Creation Services is a desktop image delivery feature in XenDesktop used to configure and distribute virtual desktops to end users.
  • Citrix Provisioning Services (Citrix PVS) - Citrix Provisioning Services (Citrix PVS) is a software-streaming technology that allows administrators to patch or reconfigure an entire deployment of virtual desktops from one shared master image.
  • Citrix Receiver - Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.
  • Citrix Secure Browser - Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.
  • Citrix Solution Advisor - Citrix Solution Advisor is Citrix Systems Inc.
  • Citrix StoreFront - Citrix StoreFront is an enterprise application store that acts as a central location for users to access XenDesktop and XenApp virtual desktops and applications from their mobile devices, laptops, Windows PCs or Macs.
  • Citrix User Profile Management - Citrix User Profile Management is a tool in the company's XenDesktop and XenApp desktop virtualization platform that allows IT administrators to deliver employees' personal data and settings to physical and virtual endpoints.
  • Citrix VDI-in-a-Box - Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-sized businesses.
  • Citrix Workspace Suite - Citrix Workspace Suite combines Citrix products including XenApp, XenDesktop, XenMobile, ShareFile Enterprise and NetScaler Gateway into a single platform IT administrators can use to deliver desktops, data, applications and services to users.
  • Citrix X1 Mouse - The Citrix X1 Mouse is a small Bluetooth device that allows users to navigate Windows virtual desktops and applications on mobile devices.
  • Citrix XenApp - Citrix XenApp, now part of Citrix Virtual Apps and Desktops, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
  • Citrix XenDesktop - Citrix XenDesktop is a desktop virtualization product from software vendor Citrix Systems.
  • Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
  • Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • clan culture - A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close