Browse Definitions :

Browse Definitions by Alphabet

AWS - CAP

  • AWS CloudWatch - Amazon CloudWatch is a component of Amazon Web Services that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • C - C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community.
  • C sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C shell - C shell is the UNIX shell (command execution program, often called a command interpreter) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell.
  • C# (C-Sharp) - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • C-Level (C-Suite) - C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.
  • C-sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C/N - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • CA - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
  • CA - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • CA Privileged Access Manager - CA Privileged Access Manager is a product, available as a rack-mounted hardware appliance or a virtual appliance, that tracks and secures the usage of logins involving access to administrative control or sensitive information.
  • CA-ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • CaaS - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • CAB - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cabinet file - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cabinet file (.cab) - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
  • cable modem termination system - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • cable modem termination system (CMTS) - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • CableLabs Certified Cable Modems - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • CAC - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • CAC - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • cache algorithm - A cache algorithm is a detailed list of instructions that decides which items should be discarded in a computer's cache of information.
  • cache coherence - In a shared memory multiprocessor with a separate cache memory for each processor, it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory.
  • cache engine - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
  • cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
  • cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • cache server - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • cached - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • caching - Caching (pronounced “cashing”) is the process of storing data in a cache.
  • CACS - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • CAD - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • CAD - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • CAD/CAM (computer-aided design/computer-aided manufacturing) - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • CADE - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
  • CADE (Corporate Average Data center Efficiency) - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
  • cadmium telluride (CdTe) photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
  • cadmium telluride photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
  • Caffe2 - Caffe2 (Convolutional Architecture for Fast Feature Embedding) is an open source, high-performance framework for the development of machine learning models.
  • CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
  • cal - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
  • calculator - A calculator is a device that performs arithmetic operations on numbers.
  • calibrate - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
  • calibration - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
  • calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
  • California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
  • California Primary Care Association - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • California Primary Care Association (CPCA) - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • call admission control - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call center - A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
  • call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
  • call center schedule adherence - Call center schedule adherence is a common metric used in the call center to determine whether or not call center agents are working the amount of time they are scheduled to work.
  • call center shrinkage - Call center shrinkage is a measure of how much time is lost in the call center because agents are unavailable to receive calls.
  • Call Center Terms: Glossary - This is a WhatIs.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call management - Call management is the process by which inbound telephone calls are routed to call center agents.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • call to action - A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.
  • call tree - A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.
  • callback - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
  • callback (international callback) - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
  • CALMS - CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
  • calorie - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
  • calorie (cal) - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
  • CAM - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • CAM - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
  • camcorder - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • camcorder (camera recorder) - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • CamelCase - CamelCase is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized so that each word that makes up the name can easily be read.
  • camera recorder - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • Campbell's Law - Campbell's Law is the observation that once a metric has been identified as a primary indicator for success, its ability to accurately measure success tends to be compromised.
  • campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university, or similar organization.
  • Can Spam - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • can you hear me? (telephone voice signature scam) - "Can you hear me?" is a telephone scam in which a perpetrator creates an audio recording of the victim saying the word "yes" by asking a question that will most likely be answered affirmatively.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • canary test (canary deployment) - In software development, a canary is an approach to progressive deployment in which code changes are rolled out to a small number of users who have not volunteered or opted-in for testing.
  • candela - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • candidate management system - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • candidate relationship management - Candidate relationship management is a structured approach to handling job candidates in a company's talent pipeline.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • canvas fingerprinting (CPF) - Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.
  • CAP theorem (Brewer's theorem) - The CAP theorem is the idea that a distributed computing system is not able to provide partition tolerance, consistency and availability at the same time.
  • Capability Maturity Model - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitance - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
  • capacitor - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close