Browse Definitions :

Browse Definitions by Alphabet

CLA - CLO

  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
  • classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity, or carbon-free electricity, is electricity without high voltage spikes and drops, meaning it is low on emitting electrical pollution.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
  • click fraud (pay-per-click fraud) - Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for online advertisements.
  • clickstream data (clickstream analytics) - Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • client - A client is a hardware or software device that requests access to a service that is typically made available by a server.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
  • client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
  • client-server network - A client-server network is a communications model in which multiple client programs share the services of a common server program.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
  • clock gating - Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits.
  • clock speed - In a computer, clock speed refers to the number of pulses per second generated by an oscillator that sets the tempo for the processor.
  • Clos network - A Clos network is a type of non-blocking, multistage switching architecture that reduces the number of ports required in an interconnected fabric.
  • closed captions - Closed captions are a text version of the spoken part of a television, movie or computer presentation.
  • closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed loop control system - A closed loop control system is a mechanical or electronic device that automatically regulates a system to maintain a desired state or set point without human interaction.
  • closed loop reporting - Closed loop reporting (CLR) is a system in which data and information collected by marketing and sales professionals is made available to both teams.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud architect - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
  • cloud archive - A cloud archive is storage as a service for long-term data retention.
  • cloud audit - A cloud audit is a periodic examination an organization does to assess and document its cloud vendor's performance.
  • cloud automation - Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.
  • cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
  • cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
  • cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
  • cloud collaboration - Cloud collaboration is a type of enterprise collaboration that allows employees to work together on documents and other data types, which are stored off-premises and outside of the company firewall.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
  • cloud configuration - Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate.
  • cloud contact center - A cloud contact center is managed by an outside vendor in a remote location.
  • cloud controller - A cloud controller is a device that moves data between on-premises storage and the cloud.
  • Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
  • cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
  • Cloud Data Management Interface (CDMI) - The Cloud Data Management Interface (CDMI) is an international standard that defines a functional interface that applications use to create, retrieve, update and delete data elements from cloud storage.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
  • cloud drive - A cloud drive is an umbrella term used to describe any Web-based service that provides storage space on a remote server.
  • cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
  • cloud encryption (cloud storage encryption) - Cloud encryption is a service offered by cloud storage providers whereby a customer's data is transformed using encryption algorithms into ciphertext and stored in the cloud.
  • cloud engineer - A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support.
  • cloud ERP - Cloud ERP is a type of enterprise resource planning (ERP) software that runs on a provider's cloud computing platform, rather than on premises in an enterprise's own data center.
  • cloud federation - Cloud federation is the practice of interconnecting service providers' cloud environments to load balance traffic and accommodate spikes in demand.
  • cloud file sharing - Cloud file sharing is a method of allowing multiple users to access data within a public cloud, private cloud or hybrid cloud.
  • cloud file syncing - Cloud file syncing is an application that updates files held in different locations through the cloud.
  • Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications on public and private cloud models.
  • cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
  • cloud IDE - A cloud IDE is a web-based integrated development platform.
  • cloud infrastructure - Cloud infrastructure refers to the hardware and software components, such as servers, storage, networking, virtualization software, services and management tools, that support the computing requirements of a cloud computing model.
  • cloud integration - Cloud integration is the act of combining different cloud-based systems into an integral whole.
  • cloud load balancing - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources.
  • cloud management platform - A cloud management platform is a suite of integrated software tools that an enterprise can use to monitor and control cloud environments.
  • cloud marketplace - A cloud marketplace is an online storefront, operated by a cloud provider, through which customers may subscribe to Software as a Service (SaaS) applications that are built on, integrate with or complement the cloud provider's main infrastructure, platform or software service.
  • cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.
  • Cloud Native Computing Foundation (CNCF) - The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of cloud-native computing.
  • cloud networking - Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.
  • cloud object storage - Cloud object storage is a format for storing unstructured data in the cloud.
  • cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
  • cloud PBX (private branch exchange) - A cloud PBX (private branch exchange) is a business phone system for connecting employees to a telephone network using a managed service running in the cloud.
  • cloud provider API - A cloud provider API is an application program interface that allows the end user to interact with a cloud provider's service.
  • cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
  • cloud radio access network (C-RAN) - Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.
  • cloud security - Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks.
  • Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
  • Cloud Security Posture Management (CSPM) - Cloud Security Posture Management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
  • cloud server - A cloud server is a compute server that has been virtualized, making its resources accessible to users remotely over a network.
  • cloud service latency - Latency greatly affects how usable and enjoyable devices and communications are.
  • cloud service provider (cloud provider) - A cloud service provider, or CSP, is a company that offers components of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of an organization's cloud instances, services or providers.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
  • cloud storage provider - A cloud storage provider, sometimes referred to as a managed service provider, is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • SOC 3 (System and Organization Controls 3)

    A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls ...

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • messaging security

    Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's ...

CIO
  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close