Browse Definitions :

Browse Definitions by Alphabet

  • clinical documentation - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a feature in an operating system or application that temporarily stores data copied or cut from a document or other location, allowing the user to transfer or duplicate it elsewhere.
  • cloaking - Cloaking is a technique where a different version of web content is returned to users than to the search engine crawlers.
  • clock speed - Clock speed is the number of times a second that a circuit operates and is most associated with the central processing unit (CPU).
  • Clos network - A Clos network is a type of nonblocking, multistage switching network used today in large-scale data center switching fabrics.
  • closed captions - Closed captions are a text version of the spoken part of a television, movie or computer presentation.
  • closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed loop control system - A closed loop control system is a mechanical or electronic device that automatically regulates a system to maintain a desired state or set point without human interaction.
  • closed loop reporting - Closed loop reporting (CLR) is a system in which data and information collected by marketing and sales professionals is made available to both teams.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments.
  • cloud architect - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
  • cloud archive - A cloud archive is storage as a service for long-term data retention.
  • cloud audit - A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.
  • cloud automation - Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.
  • cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
  • cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
  • cloud collaboration - Cloud collaboration is a type of enterprise collaboration that allows employees to work together on documents and other data types, which are stored off-premises and outside of the company firewall.
  • cloud contact center - A cloud contact center is managed by an outside vendor in a remote location.
  • Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
  • cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
  • Cloud Data Management Interface (CDMI) - The Cloud Data Management Interface (CDMI) is an international standard that defines a functional interface that applications use to create, retrieve, update and delete data elements from cloud storage.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
  • cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
  • cloud encryption - Cloud encryption is a service cloud storage providers offer whereby a customer's data is transformed using encryption algorithms from plaintext into ciphertext and stored in the cloud.
  • cloud engineer - A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support.
  • cloud ERP - Cloud ERP is a type of enterprise resource planning software that runs on a provider's cloud computing platform, rather than on premises on an enterprise's own computers.
  • Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications.
  • cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
  • cloud IDE - A cloud IDE is a web-based integrated development platform.
  • cloud infrastructure - Cloud infrastructure refers to the hardware and software components, such as servers, storage, networking, virtualization software, services and management tools, that support the computing requirements of a cloud computing model.
  • cloud infrastructure entitlement management (CIEM) - Cloud infrastructure entitlement management (CIEM) is a discipline for managing identities and privileges in cloud environments.
  • cloud integration - Cloud integration is the act of combining different cloud-based systems into an integral whole.
  • cloud load balancing - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources.
  • cloud management platform (CMP) - A cloud management platform (CMP) is a suite of integrated software tools that an enterprise can use to monitor and control cloud environments.
  • cloud modernization - Cloud modernization is a multistep process where existing on-premises applications, infrastructure and data sources are migrated, updated and transformed into a cloud-based architecture and environment.
  • cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.
  • Cloud Native Computing Foundation (CNCF) - The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of cloud-native computing.
  • cloud networking - Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.
  • cloud object storage - Cloud object storage is a format for storing unstructured data in the cloud.
  • cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
  • cloud PBX (private branch exchange) - A cloud PBX (private branch exchange) is a business phone system for connecting employees to a telephone network using a managed service running in the cloud.
  • cloud penetration testing - Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its own defenses.
  • cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
  • cloud radio access network (C-RAN) - Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.
  • cloud security - Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.
  • Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
  • cloud security posture management (CSPM) - Cloud security posture management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
  • cloud server - A cloud server is a compute server that has been virtualized, making its resources accessible to users remotely over a network.
  • cloud service provider (cloud provider) - A cloud service provider, or CSP, is a company that offers components of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).
  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of an organization's cloud instances, services or providers.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage provider - A cloud storage provider, sometimes referred to as a managed service provider, is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony (cloud calling) is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud washing - Cloud washing (also spelled cloudwashing) is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by associating the buzzword 'cloud' with it.
  • cloud workload protection - Cloud workload protection is the safeguarding of workloads spread out across multiple cloud environments.
  • cloud workload protection platform (CWPP) - A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud or in a hybrid arrangement.
  • cloud-native application - A cloud-native application is a program that is designed for a cloud computing architecture.
  • cloud-native application protection platform (CNAPP) - Cloud-native application protection platform, or CNAPP, is a software product that bundles multiple cloud security tools into one package, thereby delivering a holistic approach for securing an organization's cloud infrastructure, its cloud-native applications and its cloud workloads.
  • cloud-native network function (CNF) - A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • cluster - Clusters are typically defined as collections or groups of items with similar or different characteristics.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered network-attached storage (NAS) system - A clustered network-attached storage (NAS) system is a scale-out storage platform made up of multiple NAS nodes networked together into a single cluster.
  • clustering in machine learning - Clustering is a data science technique in machine learning that groups similar rows in a data set.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons for digital processing.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • codebase (code base) - A codebase, or code base, is the complete body of source code for a software program, component or system.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
  • cognitive bias - Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences.
  • cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
  • cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers might be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently, have divergent perspectives and come from varied backgrounds.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive search - Cognitive search represents a new generation of enterprise search that uses artificial intelligence (AI) technologies to improve users' search queries and extract relevant information from multiple diverse data sets.
  • cohort learning - Cohort learning is a learning strategy prioritizing coursework or lessons that groups of students complete together in an interactive fashion.
Networking
  • What is wavelength?

    Wavelength is the distance between identical points, or adjacent crests, in the adjacent cycles of a waveform signal propagated ...

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • What is exposure management?

    Exposure management is a cybersecurity approach to protecting exploitable IT assets.

  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • What is a startup company?

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or ...

  • What is a CEO (chief executive officer)?

    A chief executive officer (CEO) is the highest-ranking position in an organization and responsible for implementing plans and ...

  • What is labor arbitrage?

    Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • What is the law of diminishing returns?

    The law of diminishing returns is an economic principle stating that as investment in a particular area increases, the rate of ...

  • What is an abandoned call?

    An abandoned call is a call or other type of contact initiated to a call center or contact center that is ended before any ...

  • What is an outbound call?

    An outbound call is one initiated by a contact center agent to prospective customers and focuses on sales, lead generation, ...

Close