Browse Definitions :

Browse Definitions by Alphabet

CLO - COM

  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of an organization's cloud instances, services or providers.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud washing - Cloud washing (also spelled cloudwashing) is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by associating the buzzword 'cloud' with it.
  • cloud-native network function (CNF) - A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudBees - CloudBees is a former platform as a service cloud provider that now focuses on open source continuous integration.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • Cloudify - Cloudify is an open source cloud and network functions virtualization (NFV) orchestration platform.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • cluster - Clusters are typically defined as collections or groups of items with similar or different characteristics.
  • cluster name object (CNO) - A cluster name object (CNO) is an Active Directory computer object linked with the network resource Cluster Name.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • clustered network-attached storage (NAS) system - A clustered network-attached storage (NAS) system is a scale-out storage platform made up of multiple NAS nodes networked together into a single cluster.
  • clustered storage - Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMO (chief marketing officer) - A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBIT 5 - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • code review - Code review is a phase in the computer program development process in which the authors of code, peer reviewers, and perhaps quality assurance reviewers get together to review code, line by line.
  • codebase (code base) - A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
  • cognitive bias - Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences.
  • cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
  • cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers may be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive search - Cognitive search is a new generation of enterprise search that uses artificial intelligence technologies to improve users' search queries and extract relevant information from multiple, diverse data sets.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
  • cold storage - Cold storage is a computer system or mode of operation designed for the retention of inactive data.
  • cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
  • collaboration - Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project.
  • collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • collaborative BI (collaborative business intelligence) - Collaborative BI (collaborative business intelligence) is the merging of business intelligence software with collaboration tools, including social and Web 2.
  • collaborative filtering - Collaborative filtering is the predictive process behind recommendation engines.
  • collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
  • COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
  • command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
  • command-and-control server (C&C server) - A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • command-line interface (CLI) - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
  • commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
  • committed information rate (CIR) - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Body of Knowledge (CBK) - In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
  • common carrier - A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard that defines device and application characteristics so system administrators and management programs can control devices and applications from different manufacturers.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • communication plan - A communication plan is a policy-driven approach to providing company stakeholders with certain information.
  • communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
  • Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
  • compact disc (CD) - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • CompactFlash card (CF card) - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • compaction - In a data center, compaction is the reduction or consolidation of hardware to make better use of physical floor space.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  • compensation management - Compensation management is the discipline for determining employees' appropriate pay and benefits.
  • competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close