Browse Definitions :

Browse Definitions by Alphabet

COM - CON

  • competitive advantage - Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.
  • competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
  • compiler - A compiler is a special program that translates a programming language's source code into machine code, bytecode or another programming language.
  • complementary metal-oxide semiconductor (CMOS) - A complementary metal-oxide semiconductor (CMOS) is the semiconductor technology used in most of today's integrated circuits, also known as chips or microchips.
  • complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex system - A complex system is an arrangement of a great number of related but various elements with intricate interconnections.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compliance as a service (CaaS) - Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
  • compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
  • compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable pieces that application developers independently write and deploy.
  • composable infrastructure - Composable infrastructure is a framework that decouples device resources in order to treat them as services.
  • compound - In chemistry, a compound is a substance made up of two or more different chemical elements that are combined in a fixed ratio.
  • CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
  • CompTIA Project+ - CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.
  • CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
  • computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
  • computational fluid dynamics (CFD) - Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.
  • computational linguistics (CL) - Computational linguistics (CL) is the application of computer science to the analysis and comprehension of written and spoken language.
  • computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • computer hardware - Computer hardware is a collective term used to describe any of the physical components of an analog or digital computer.
  • computer instruction - A computer instruction is an order given to a computer processor by a computer program.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • computer numerical control (CNC) - Computer numerical control (CNC) is a method for automating control of machine tools through the use of software embedded in a microcomputer attached to the tool.
  • computer operator - A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
  • computer room air conditioning (CRAC) unit - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a data center, network or server room.
  • computer room air handler (CRAH) - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • computer security incident response team (CSIRT) - A computer security incident response team, or CSIRT, is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts.
  • computer worm - A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • computer-based training (CBT) - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • COMSEC (communications security) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • conductor - A conductor, or electrical conductor, is a substance or material that allows electricity to flow through it.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that explains why estimates become more accurate over the span of a project's lifecycle.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • CONFIG.SYS - CONFIG.SYS is a text file containing disk operating system (DOS) commands that tell the operating system (OS) how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
  • conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
  • conjunction - A conjunction is a word used to connect words, phrases and clauses.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • Consensus Algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • conservation of angular momentum - Conservation of angular momentum is a physical property of a spinning system such that its spin remains constant unless it is acted upon by an external torque; put another way, the speed of rotation is constant as long as net torque is zero.
  • consignment inventory - Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.
  • Consolidated Health Informatics (CHI) - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • const - Const (constant) in programming is a keyword that defines a variable or pointer as unchangeable.
  • constraint (project constraint) - A project constraint is any limit or restriction applied to a project.
  • consumer data - Consumer data is the information trail customers leave behind as a result of their Internet use.
  • consumer panel - A consumer panel is a group of individuals selected by a business or organization to provide input and opinion on products and services for research on consumer behavior.
  • consumer privacy (customer privacy) - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • consumerization of IT - The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes.
  • consumption-based pricing model - A consumption-based pricing model is a service provision and payment scheme in which the customer pays according to the resources used.
  • contact center - A contact center is a central point from which organizations manage all customer interactions across various channels.
  • contact center as a service (CCaaS) - Contact center as a service (CCaaS) is a framework that combines contact center hosting principles and cloud-based contact center infrastructure.
  • contact center infrastructure - A contact center infrastructure is a framework composed of the physical and virtual resources that a call center facility needs to operate effectively.
  • contactless payment - A contactless payment is a wireless financial transaction in which the customer authorizes monetary compensation for a purchase by moving a security token in close proximity to the vendor's point of sale (PoS) reader.
  • container (disambiguation) - This page explains how the term container is used in software development, storage, data center management and mobile device management.
  • container image - A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology (IT) infrastructure.
  • Container Linux by CoreOS - Container Linux by CoreOS, originally named CoreOS Linux, is an open source operating system (OS) that provides the functionality required to deploy and manage applications within containers.
  • container registry - A container registry is a collection of repositories made to store container images.
  • container repository - A container repository is a collection of related container images used to provide different versions of an application.
  • Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
  • content aggregator - A content aggregator is an individual, organization or tool that gathers web content and applications from different online sources for reuse.
  • content analytics - Content analytics is the act of applying business intelligence (BI) and business analytics (BA) practices to digital content.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content filtering - Content filtering is a process involving the use of software or hardware to screen and/or restrict access to objectionable email, webpages, executables and other suspicious items.
  • content management (CM) - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • Content Management Interoperability Services (CMIS) - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content marketing platform (CMP) - A content marketing platform (CMP) is a software solution that helps content marketing teams plan, envision, collaborate and create materials that successfully raise brand awareness, improve lead generation and increase revenue.
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • content services platform - A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.
  • content sprawl - Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.
  • content-addressed memory (CAM) - Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications.
  • content-addressed storage (CAS) - Content-addressed storage (CAS) -- also called content-addressable storage -- is a method for storing fixed content as objects and providing fast access to that content.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close