CPW - CSD
-
- CPW - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 ...
- CPW (Commercial Processing Workload) - CPW (...
- CR - Cognitive radio (CR) is a form of wireless communication in which a trans...
- CRA - Customer relationship analysis (CRA), sometimes termed customer relatio...
- CRAC - A computer room air conditioning (CRAC) unit is a device that monitor...
- CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
- cracker - A cracker is someone who breaks into someone else's computer sy...
- cracking - Brute force (also known as brute force cracking) is a trial a...
- Craftsman Costs Books - The Craftsman Costs Books are a ser...
- CRAH - A computer room air handler (CRAH) is a device used frequently in dat...
- CRAM - CRAM (challenge-response authentication mechanism) is the two-level s...
- CRAM (challenge-response authentication mechanism)
- cramming - Cramming is the addition of unexpected or unauthorized charge...
- crapware - Definition - What is crapware?Crapware is an unflattering nam...
- crash - A crash is the sudden failure of a software application or operatin...
- Crash Course: Spyware - In general, spyware is any technolo...
- crawl depth - Crawl depth is the extent to which a search engine inde...
- crawler - A crawler is a program that visits Web sites and reads their pa...
- CRC - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reductio...
- CRC - Cyclic redundancy checking is a method of checking for errors in data t...
- CRC 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy ch...
- CRC Energy Efficiency Scheme - The CRC Energy Effici...
- CRC-4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy ch...
- CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cycl...
- create read update delete - The CRUD cycle describes th...
- credential prediction - Session prediction, also called cre...
- credential session prediction - Session prediction,...
- credential/session prediction - Session prediction,...
- Credit Card Accountability, Responsibility, and...
- Credit CARD Act - The Credit CARD Act is legislation governing th...
- Credit CARD Act (Credit Card Accountability, Re...
- creeping featuritis - Feature creep (sometimes known as requi...
- creepy whisper - Directional sound is a technology that concentrat...
- crimeware - Crimeware is any computer program or set of programs design...
- crimeware kit - A crimeware kit, also called an infection, exploit ...
- crimeware kit (attack kit) - A crimeware kit, also cal...
- crippleware - Crippleware is any software program that cannot be full...
- critical path method - The critical path method (CPM) is a s...
- critical path method (CPM) - The critical path method ...
- critical section routine - In computers, a critical sect...
- CRL - Certificate Revocation List (CRL) is one of two common methods when usi...
- CRM - CRM (customer relationship management) is an information industry term ...
- CRM (customer relationship management)
- CRM analytics - CRM (customer relationship management) analytics co...
- CRM chat - In customer relationship management (CRM), customer service c...
- CRM Learning Guides - We've gathered a collection of our lear...
- CRM Quizzes - We've gathered quizzes to test your knowledge of custom...
- CRM Real-time Analytics - CRM (customer relationship mana...
- CRO - The chief risk officer (CRO) is the corporate executive tasked with ass...
- CRON script - A CRON script is a list of one or more commands to a co...
- crontab - crontab is a UNIX command that creates a table or list of comma...
- cross engineering - X-engineering (sometimes called cross-engin...
- cross media queuing - In a call center, cross-media queuing d...
- cross section - A cross section is a cut through something (such as...
- cross site scripting - Cross-site scripting (XSS) is a secur...
- cross site tracing - Cross-site tracing (XST) is a sophisticat...
- cross-bar switch - In a network, a cross-bar switch is a device ...
- cross-engineering - X-engineering (sometimes called cross-engin...
- cross-media queuing - In a call center, cross-media queuing d...
- cross-post - On a Web or bulletin board discussion list or a Usenet ne...
- cross-sell - Cross-sell is a marketing term for the practice of sugges...
- cross-site request forgery - Cross-site request forger...
- cross-site request forgery (XSRF or CSRF)
- cross-site scripting - Cross-site scripting (XSS) is a secur...
- cross-site scripting (XSS) - Cross-site scripting (XSS...
- cross-site tracing - Cross-site tracing (XST) is a sophisticat...
- cross-site tracing (XST) - Cross-site tracing (XST) is a...
- crossbar latch - A crossbar latch, also called a molecular crossba...
- crossfade - In digital audio production, a crossfade is editing that ma...
- crossover cable - A crossover cable is a cable that is used to in...
- crosstalk - Crosstalk is a disturbance caused by the electric or magnet...
- crowdcasting - Crowdcasting is a problem-solving and idea-generating...
- crowdfunding - Crowdfunding is a financing method that involves soli...
- crowdsourcing - Crowdsourcing is the practice of outsourcing tasks ...
- CRT - A cathode ray tube (CRT) is a specialized vacuumtube in which images ar...
- CRUD cycle - The CRUD cycle describes the elemental functions of a per...
- CRUD cycle (Create, Read, Update and Delete Cycle)
- cruft - Cruft is the elements of a program, system or product that are eith...
- crumb - In computers, crumb is jargon for two bits (that is, two binary dig...
- Crusoe - Crusoe is a family of "smart" microprocessors from Transmeta that...
- cryptanalysis - Cryptanalysis refers to the study of ciphers, ciphe...
- crypto - Depending on its usage, crypto can be a short form for cryptograp...
- cryptographic checksum - A cryptographic checksum is a mat...
- cryptography - Cryptography is the science of information security.
- cryptology - Cryptology is the mathematics, such as number theory, and...
- cryptoperiod - A cryptoperiod (sometimes called a key lifetime or a ...
- cryptoperiod (key lifetime or a validity period)
- cryptotrojan - Ransomware is a type of malware used for data kidnapp...
- cryptovirus - Ransomware is a type of malware used for data kidnappin...
- cryptovirus cryptoworm - Ransomware is a type of malware u...
- cryptoworm - Ransomware is a type of malware used for data kidnapping,...
- Crypzip - Ransomware is a type of malware used for data kidnapping, an ex...
- Crystal Reports - Crystal Reports is a popular Windows-based repo...
- CSA - The Cloud Security Alliance (CSA) is a nonprofit organization that prom...
- CSAT - In customer relationship management, customer satisfaction (CSAT) is ...
- CSC - In customer relationship management (CRM), customer service chat (CSC) ...
- CSC - A Common Service Center (CSC) is an information and communication techn...
- CSC - Common short codes (CSC) are short telephone numbers, usually consistin...
- CSD - Circuit switched data (CSD) was the original form of data transmission ...
- CSD (circuit switched data) - Circuit switched data (...

