Browse Definitions :

Browse Definitions by Alphabet

  • client-side framework - A client-side framework is a software development framework that focuses on executing application processes on end user devices rather than the application's own server.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • cloaking - Cloaking is a technique where a different version of web content is returned to users than to the search engine crawlers.
  • clock speed - Clock speed is the number of times a second that a circuit operates and is most associated with the central processing unit (CPU).
  • Clos network - A Clos network is a type of nonblocking, multistage switching network used today in large-scale data center switching fabrics.
  • closed captions - Closed captions are a text version of the spoken part of a television, movie or computer presentation.
  • closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed loop control system - A closed loop control system is a mechanical or electronic device that automatically regulates a system to maintain a desired state or set point without human interaction.
  • closed loop reporting - Closed loop reporting (CLR) is a system in which data and information collected by marketing and sales professionals is made available to both teams.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments.
  • cloud architect - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
  • cloud archive - A cloud archive is storage as a service for long-term data retention.
  • cloud audit - A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.
  • cloud automation - Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.
  • cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
  • cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
  • cloud collaboration - Cloud collaboration is a type of enterprise collaboration that allows employees to work together on documents and other data types, which are stored off-premises and outside of the company firewall.
  • cloud computing - Cloud computing is a general term for the delivery of hosted computing services and IT resources over the internet with pay-as-you-go pricing.
  • cloud contact center - A cloud contact center is managed by an outside vendor in a remote location.
  • Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
  • cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
  • Cloud Data Management Interface (CDMI) - The Cloud Data Management Interface (CDMI) is an international standard that defines a functional interface that applications use to create, retrieve, update and delete data elements from cloud storage.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
  • cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
  • cloud encryption - Cloud encryption is a service cloud storage providers offer whereby a customer's data is transformed using encryption algorithms from plaintext into ciphertext and stored in the cloud.
  • cloud engineer - A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support.
  • cloud ERP - Cloud ERP is a type of enterprise resource planning software that runs on a provider's cloud computing platform, rather than on premises on an enterprise's own computers.
  • Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications.
  • cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
  • cloud IDE - A cloud IDE is a web-based integrated development platform.
  • cloud infrastructure - Cloud infrastructure refers to the hardware and software components, such as servers, storage, networking, virtualization software, services and management tools, that support the computing requirements of a cloud computing model.
  • cloud integration - Cloud integration is the act of combining different cloud-based systems into an integral whole.
  • cloud load balancing - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources.
  • cloud management platform (CMP) - A cloud management platform (CMP) is a suite of integrated software tools that an enterprise can use to monitor and control cloud environments.
  • cloud modernization - Cloud modernization is a multistep process where existing on-premises applications, infrastructure and data sources are migrated, updated and transformed into a cloud-based architecture and environment.
  • cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.
  • Cloud Native Computing Foundation (CNCF) - The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of cloud-native computing.
  • cloud networking - Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.
  • cloud object storage - Cloud object storage is a format for storing unstructured data in the cloud.
  • cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
  • cloud PBX (private branch exchange) - A cloud PBX (private branch exchange) is a business phone system for connecting employees to a telephone network using a managed service running in the cloud.
  • cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
  • cloud radio access network (C-RAN) - Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.
  • cloud security - Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks.
  • Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
  • cloud security posture management (CSPM) - Cloud security posture management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
  • cloud server - A cloud server is a compute server that has been virtualized, making its resources accessible to users remotely over a network.
  • cloud service provider (cloud provider) - A cloud service provider, or CSP, is a company that offers components of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).
  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of an organization's cloud instances, services or providers.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage provider - A cloud storage provider, sometimes referred to as a managed service provider, is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony (cloud calling) is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud washing - Cloud washing (also spelled cloudwashing) is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by associating the buzzword 'cloud' with it.
  • cloud workload protection - Cloud workload protection is the safeguarding of workloads spread out across multiple cloud environments.
  • cloud-native application - A cloud-native application is a program that is designed for a cloud computing architecture.
  • cloud-native network function (CNF) - A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • cluster - Clusters are typically defined as collections or groups of items with similar or different characteristics.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered network-attached storage (NAS) system - A clustered network-attached storage (NAS) system is a scale-out storage platform made up of multiple NAS nodes networked together into a single cluster.
  • clustering in machine learning - Clustering is a data science technique in machine learning that groups similar rows in a data set.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • codebase (code base) - A codebase, or code base, is the complete body of source code for a software program, component or system.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
  • cognitive bias - Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences.
  • cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
  • cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers might be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently, have divergent perspectives and come from varied backgrounds.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive search - Cognitive search represents a new generation of enterprise search that uses artificial intelligence (AI) technologies to improve users' search queries and extract relevant information from multiple diverse data sets.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
  • HR automation

    Human resources automation (HR automation) is a method of using software to automate and streamline repetitive and laborious HR ...

  • compensation management

    Compensation management is the discipline and process for determining employees' appropriate pay and benefits.

  • HR technology (human resources tech)

    HR technology (human resources technology) is an umbrella term for hardware and software used to automate the human resource ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close