Browse Definitions :

Browse Definitions by Alphabet

CRM - WHA

  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM (customer relationship management) analytics - CRM (customer relationship management) analytics comprises all of the programming that analyzes data about customers and presents it to an organization to help facilitate and streamline better business decisions.
  • crontab - crontab is a UNIX command that creates a table or list of commands, each of which is to be executed by the operating system at a specified time.
  • cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
  • cross-docking - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
  • cross-functional team - A cross-functional team is a workgroup made up of employees from different functional areas within an organization who collaborate to reach a stated objective.
  • cross-media ownership - Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-site request forgery (XSRF or CSRF) - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection attack in which a threat actor inserts data, such as a malicious script, into content from otherwise trusted websites.
  • crosstalk - Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • cryptanalysis - Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.
  • crypto wallet (cryptocurrency wallet) - A crypto wallet (cryptocurrency wallet) is software or hardware that enables users to store and use cryptocurrency.
  • crypto-agility - Crypto-agility, or cryptographic agility, is a data encryption practice used by organizations to ensure a rapid response to a cryptographic threat.
  • cryptocurrency - Cryptocurrency is a digital form of currency that uses cryptography to secure the processes involved in generating units, conducting transactions and verifying the exchange of currency ownership.
  • cryptogram - A cryptogram is a word puzzle featuring encrypted text that the user decrypts to reveal a message of some sort.
  • cryptographic checksum - Generated by a cryptographic algorithm, a cryptographic checksum is a mathematical value assigned to a file sent through a network for verifying that the data contained in that file is unchanged.
  • cryptographic nonce - A nonce is a random or semi-random number that is generated for a specific use.
  • cryptography - Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.
  • Cryptography quiz questions and answers: Test your smarts - Put your encryption knowledge to the test, and perhaps even learn a new word or concept in the process with these cryptography quiz questions.
  • cryptojacking - Cryptojacking is a cybercrime in which another party's computing resources are hijacked to mine cryptocurrency.
  • cryptology - Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.
  • cryptosystem - A cryptosystem is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • CSO (Chief Security Officer) - A Chief Security Officer (CSO) is a C-suite executive responsible for a company's physical and digital security.
  • CSR (Certificate Signing Request) - A Certificate Signing Request or CSR is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) validating the information required by the CA in order for it to issue a certificate.
  • CSS (cascading style sheets) - This definition explains the meaning of cascading style sheets (CSS) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • CSU/DSU (Channel Service Unit/Data Service Unit) - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
  • Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
  • cubic meter (meter cubed) - The cubic meter is the unit of volume in the International System of Units.
  • cultural fit - Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.
  • culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
  • cumulative trauma disorder (CTD) - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
  • curiosity artificial intelligence (curiosity AI) - Curiosity artificial intelligence (curiosity AI) is the simulation of human curiosity in artificial intelligence.
  • currency - Currency is anything that is generally accepted to have value as a medium of exchange so that it can be traded for goods and services.
  • current - Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.
  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and behavior to identify, attract and retain the most profitable customers.
  • customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
  • customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
  • customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
  • customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
  • customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
  • customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
  • customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
  • customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
  • customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or Cross-selling or up-selling strategies.
  • customer intelligence (CI) - Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources to gain insights about customer needs, motivations and behaviors.
  • customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
  • customer proprietary network information (CPNI) - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
  • customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service is the support that organizations offer to customers before and after purchasing a product or service.
  • customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
  • customer success - Customer success is a strategy to assure that a company’s products are meeting the needs of the customer.
  • customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, apps and perhaps internet capability to encourage the customer to control access to information and ordering.
  • cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
  • CVO (Chief Visionary Officer) - The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the future.
  • CVSS (Common Vulnerability Scoring System) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in software.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
  • cyber attack - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
  • cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
  • cyber espionage - Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.
  • cyber hijacking - Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
  • cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
  • cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberpicketing - Cyberpicketing is the use of the Internet to protest a corporation or other institution's wages, work conditions, products, environmental policy, or other issues.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is the division of the Department of Homeland Security (DHS) that is tasked with defending the infrastructure of the internet and improving its resilience and security.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data that threatens violence or results in violence.
  • cyberwarfare - The generally accepted definition of cyberwarfare is the use of cyber attacks against a nation-state, causing it significant harm, up to and including physical warfare, disruption of vital computer systems and loss of life.
  • cycle counting - Cycle counting is an inventory-control method that lets businesses conduct a regular count of several items in different areas in a warehouse, without constantly adding up the entire inventory.
  • Cygwin - Cygwin is a collection of open source tools that allows Unix or Linux applications to be compiled and run on a Microsoft Windows operating system (OS) from within a Linux-like interface.
  • CYOD (choose your own device) - CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options.
  • IT consultant - A consultant is an experienced individual in a given field who provides expert advice for a fee.
  • OpenStack Block Storage (Cinder) - OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data storage to cloud computing applications.
  • What are containers (container-based virtualization or containerization)? - Containers are a type of software that can virtually package and isolate applications for deployment.
  • What is a cloud database? An in-depth cloud DBMS guide - A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close