Browse Definitions :

Browse Definitions by Alphabet

  • AWS CloudWatch - Amazon CloudWatch is a component of Amazon Web Services that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • C - The C programming language is a procedural and general-purpose language that provides low-level access to system memory.
  • C shell - C shell (csh) is a Unix shell that provides a command-line user interface (UI) to interact with an operating system (OS).
  • C# (C-Sharp) - C#, pronounced "C-sharp," is an object-oriented programming language from Microsoft that enables developers to build applications that run on the .
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • C-Level (C-Suite) - C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
  • cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • cache server - A cache server is a dedicated network server or service acting as a server that saves webpages or other internet content locally.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • caching - Caching -- pronounced "cashing" -- is the process of storing data in a cache, which is a temporary storage area that facilitates faster access to data with the goal of improving application and system performance.
  • CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
  • calculator - A calculator is a device that performs arithmetic operations on numbers.
  • California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call center - A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
  • call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
  • call center schedule adherence - Call center schedule adherence is a standard metric used in business call centers to determine whether call center agents are working the amount of time they are scheduled to work.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call management - Call management is the process by which inbound telephone calls are routed to call center agents.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • call tree - A call tree is a layered hierarchical communication model used to notify specific individuals of an event and coordinate recovery if necessary.
  • CALMS - CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
  • camcorder (camera recorder) - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • CamelCase - CamelCase is a way to separate the words in a phrase by making the first letter of each word capitalized and not using spaces.
  • campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university or similar organization.
  • canary testing - In software testing, canary testing refers to testing a new software version or a new feature with real users in a live (production) environment.
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitive touchscreen - A capacitive touchscreen is a control display that uses the conductive touch of a human finger or a specialized input device for input and control.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that ensure that a computing infrastructure has adequate resources to handle current data processing requirements, as well as the capacity to accommodate future loads.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • captive portal - A captive portal is a webpage that the user of a public-access network is required to view and interact with before they can access the network.
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a protocol that enables an access controller to manage a collection of wireless termination points.
  • carbon accounting - Carbon accounting is the process of calculating and tracking the amount of carbon dioxide (CO2) and other greenhouse gas (GHG) emissions both produced and removed from the biosphere by an organization.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon offset - A carbon offset is a credit that a person or organization can buy to decrease its carbon footprint.
  • carbon-aware computing - As a green design principle, carbon-aware computing steers software and hardware development up a path of sustainability toward carbon neutrality.
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • cardholder data (CD) - Cardholder data (CD) is any personally identifiable information (PII) associated with a person who has a credit or debit card.
  • cardholder data environment (CDE) - A cardholder data environment (CDE) is a computer system or networked group of IT systems that processes, stores or transmits cardholder data or sensitive payment authentication data.
  • carrier cloud - A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • case-based reasoning (CBR) - Case-based reasoning (CBR) is an experience-based approach to solving new problems by adapting previously successful solutions to similar problems.
  • catchball - Catchball is an approach to decision-making in an organization or group where ideas are pitched from one individual to another throughout the group’s hierarchy and divisions.
  • Categories of twisted-pair cabling systems - A twisted-pair cabling system is a cable consisting of one or several pairs of copper wires.
  • cathode - A cathode is the metallic electrode through which current flows out in a polarized electrical device.
  • cathode ray tube (CRT) - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
  • causal AI - Causal AI is a form of artificial intelligence (AI) designed to identify and understand the cause and effect of relationships across data.
  • CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality (VR) environment consisting of a cube-shaped VR room or a room-scale area in which the walls, floors and ceilings are projection screens.
  • CBRS (Citizens Broadband Radio Service) - Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum.
  • CCNA certification - Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.
  • CCTV (closed circuit television) - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • CD-ROM - A CD-ROM (Compact Disc Read-Only Memory) is a type of compact disc that can only be read, not written to.
  • CDMA (Code-Division Multiple Access) - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • CDN (content delivery network) - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers.
  • CE router (customer edge router) - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.
  • Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
  • center of excellence (CoE) - A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide best practices for a particular area of interest.
  • Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Centers for Medicare & Medicaid Services (CMS) - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • central bank digital currency (CBDC) - A central bank digital currency (CBDC) is a digital version of a country's central bank money or fiat currency.
  • centrex (central office exchange service) - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • CenturyLink - CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.
  • CEO (Chief Executive Officer) - The chief executive officer (CEO) is the top position in an organization and responsible for implementing existing plans and policies, improving the company's financial strength, supporting ongoing digital business transformation and setting future strategy.
  • Ceph - Ceph is open source software providing scalable object-, block- and file-based storage under a unified system.
  • Cerner Corp. - Cerner Corp.
  • CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • certificate revocation list (CRL) - A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their actual or assigned expiration date.
  • Certified Associate in Project Management (CAPM) - The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.
  • Certified Cloud Security Professional (CCSP) - Certified Cloud Security Professional (CCSP) is an International Information System Security Certification Consortium, or (ISC)2, certification that covers cloud-based cybersecurity best practices.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor (CISA) - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • change management strategy - A change management strategy is a plan for or systematic approach to dealing with a transition or transformation in an organization.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
  • channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close