Browse Definitions by Alphabet
CON - CSV
- ControlUp - ControlUp is a monitoring software company that sells tools IT professionals can use to manage, monitor and analyze virtual desktop and application performance.
- CONUS (continental United States) - Refers to the continental United States.
- converged data center - A converged data center pre-integrates server, storage and networking hardware with management, hypervisor and operating system platforms, as well as applications and services.
- converged infrastructure - Converged infrastructure is an approach to data center management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance.
- converged network adapter (CNA) - A converged network adapter (CNA) is a single network interface device that provides the functionality of both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet network interface card (NIC).
- conversational AI - Conversational AI is a type of artificial intelligence that enables consumers to interact with computer applications the way they would with other humans.
- conversational marketing - Conversational marketing is marketing that engages customers through dialogue.
- conversion rate optimization - In online marketing, conversion rate optimization (CRO) is a strategic approach to increasing the percentage of website visitors who follow a desired call to action.
- convolutional neural network (CNN) - A convolutional neural network (CNN or convnet) is a subset of machine learning.
- cookie - A cookie is information that a website puts on a user's computer.
- cookie poisoning - Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain unauthorized access to a user's account, open a new account in the user's name or steal the user's information for purposes such as identity theft.
- cooperative (co-op) - A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members.
- cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
- coopetition (co-opetition) - Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.
- COPE (corporate-owned, personally enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
- COPPA (Children's Online Privacy Protection Act ) - The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that imposes specific requirements on operators of websites and online services to protect the privacy of children under 13.
- copy data management (CDM) - Copy data management (CDM) is an approach to reducing storage consumption that involves eliminating the unnecessary duplication of production data.
- copypasta - Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.
- copyright - Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.
- cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
- core banking system - A core banking system is the software used to support a bank’s most common transactions.
- core competency (core competencies) - For any organization, its core competency refers to the capabilities, knowledge, skills and resources that constitute its 'defining strength.
- core HR (core human resources) - Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and the software used to manage basic HR processes.
- CoreOS rkt - CoreOS rkt (pronounced rocket) is a containerization engine to run application workloads in isolation from the underlying infrastructure.
- Cornerstone OnDemand - Cornerstone OnDemand is a vendor of cloud-based learning and talent management software.
- corollary - A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.
- corporate account manager (CAM) - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
- corporate culture - Corporate culture is the collection of values, beliefs, ethics and attitudes that characterize an organization and guide its practices.
- corporate culture model - A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.
- corporate division - A corporate division, also known as a business division, is a discrete part of a company that may operate under the same name and legal responsibility or as a separate corporate and legal entity under another business name.
- corporate governance - Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.
- corporate performance management (CPM) - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
- corporate social responsibility (CSR) - Corporate social responsibility (CSR) is a strategy undertaken by companies to not just grow profits, but also to take an active and positive social role in the world around them.
- corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
- corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
- correlation - Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in relation to each other.
- correlation coefficient - A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another.
- COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
- COSO Framework - The COSO Framework is a system used to establish internal controls to be integrated into business processes.
- cost containment - Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.
- cost management - Cost management is the process of planning and controlling the budget of a business.
- cost of goods sold (COGS) - Cost of goods sold (COGS) is the total of the costs directly attributable to producing things that can be sold.
- cost per engagement (CPE) - Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when users interact with their campaign in some way.
- cost per sale (CPS) - The cost per sale (CPS), also known as the pay per sale, is a metric used by advertising teams to determine the amount of money paid for every sale generated by a specific advertisement.
- cost price - A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.
- COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
- coulomb (C) - A coulomb (C) is the standard unit of electric charge in the International System of Units (SI).
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol based on the U.
- counterintelligence - Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions.
- COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
- cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
- CPE credit - Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields.
- CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
- CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
- CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
- CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
- CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
- creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
- credential stuffing - Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login.
- credential theft - Credential theft is a type of cybercrime that involves stealing a victim's proof of identity.
- crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
- crisis management - Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event.
- crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
- critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
- critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
- critical infrastructure security - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
- critical path method (CPM) - The critical path method (CPM) is a step-by-step project management technique for process planning that defines critical and non-critical tasks with the goal of preventing project schedule problems and process bottlenecks.
- CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
- CRM (customer relationship management) analytics - CRM (customer relationship management) analytics comprises all of the programming that analyzes data about customers and presents it to an organization to help facilitate and streamline better business decisions.
- crontab - Crontab is a Unix command that creates a table or list of commands, each of which is to be executed by the operating system (OS) at a specified time and on a regular schedule.
- cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
- cross-docking - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
- cross-functional team - A cross-functional team is a workgroup made up of employees from different functional areas within an organization who collaborate to reach a stated objective.
- cross-media ownership - Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies.
- cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
- cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection attack in which a threat actor inserts data, such as a malicious script, into content from otherwise trusted websites.
- crosstalk - Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit.
- crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
- CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
- cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
- cryptanalysis - Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.
- crypto wallet (cryptocurrency wallet) - A crypto wallet (cryptocurrency wallet) is software or hardware that enables users to store and use cryptocurrency.
- crypto-agility - Crypto-agility, or cryptographic agility, is a data encryption practice used by organizations to ensure a rapid response to a cryptographic threat.
- cryptocurrency - Cryptocurrency is a digital form of currency that uses cryptography to secure the processes involved in generating units, conducting transactions and verifying the exchange of currency ownership.
- cryptogram - A cryptogram is a word puzzle featuring encrypted text that the user decrypts to reveal a message of some sort.
- cryptographic checksum - Generated by a cryptographic algorithm, a cryptographic checksum is a mathematical value assigned to a file sent through a network for verifying that the data contained in that file is unchanged.
- cryptographic nonce - A nonce is a random or semi-random number that is generated for a specific use.
- cryptography - Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.
- Cryptography quiz questions and answers: Test your smarts - Put your encryption knowledge to the test, and perhaps even learn a new word or concept in the process with these cryptography quiz questions.
- cryptojacking - Cryptojacking is a cybercrime in which another party's computing resources are hijacked to mine cryptocurrency.
- cryptology - Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.
- cryptosystem - A cryptosystem is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely.
- Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
- CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
- CSO (Chief Security Officer) - A Chief Security Officer (CSO) is a C-suite executive responsible for a company's physical and digital security.
- CSR (Certificate Signing Request) - A Certificate Signing Request (CSR) is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA).
- CSS (cascading style sheets) - This definition explains the meaning of cascading style sheets (CSS) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
- CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
- CSU/DSU (Channel Service Unit/Data Service Unit) - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
- CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.