Browse Definitions :

Browse Definitions by Alphabet

C - CAL

  • C - C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community.
  • C sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C shell - C shell is the UNIX shell (command execution program, often called a command interpreter) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell.
  • C# - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • C, C# and C++ Cheat Sheets - We've gathered cheat sheets for fast reference to C-related information.
  • C-Level (C-Suite) - C-level is a term used to describe senior business leaders with high-ranking executive titles.
  • C-sharp - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C/N - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • C14N - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • C3D - C3D (pronounced SEE-THREE-DEE) is a combined hardware/software process that captures a pair of two-dimensional images, objects, or scenes and automatically reconstructs them into a digital three-dimensional (3-D) model.
  • C6 - WinChip (also known as the WinChip C6) is a microprocessor designed for use in business computers that run Microsoft operating systems Made by IDT, the microprocessor reportedly provides comparable performance to Intel's more expensive Pentium microprocessors as well as to the more competitively-priced K6 and the Cyrix 6X86MX.
  • CA - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • CA - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
  • CA - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
  • CA Privileged Access Manager - CA Privileged Access Manager is a product, available as a rack-mounted hardware appliance or a virtual appliance, that tracks and secures the usage of logins involving access to administrative control or sensitive information.
  • CA-ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • CaaS - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • CAB - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cabinet file - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • cabinet file (.cab) - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • Cabir - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • cable - Coaxial cables transmit high-frequency electrical signals through connectors without interference.
  • cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
  • cable modem - A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.
  • cable modem termination system - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • cable modem termination system (CMTS) - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • cable TV or CATV (community antenna television) - Cable TV is also known as "CATV" (community antenna television).
  • CableLabs Certified Cable Modems - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • CAC - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • CAC - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • cache (computing) - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • cache algorithm - A cache algorithm is a detailed list of instructions that decides which items should be discarded in a computer's cache of information.
  • cache coherence - In a shared memory multiprocessor with a separate cache memory for each processor, it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory.
  • cache cramming - Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run.
  • cache engine - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
  • cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
  • cache poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
  • cache poisoning (DNS poisoning, web cache poisoning) - Cache poisoning is an attack vector that exploits the way domain name system (DNS) clients and web servers improve performance by saving old responses for a specified period of time in a temporary storage area called cache.
  • cache server - A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • cached - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • caching - Caching (pronounced “cashing”) is the process of storing data in a cache.
  • CACS - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • CAD - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • CAD - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • CAD (computer-aided design) - CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  • CAD/CAM (computer-aided design/computer-aided manufacturing) - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • caddy - A caddy is the plastic case that enclosed a CD-ROM disk in the period when players required them.
  • CADE - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
  • CADE (Corporate Average Data center Efficiency) - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
  • cadmium telluride (CdTe) photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
  • cadmium telluride photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
  • CAE - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • CAE (computer-aided engineering) - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • CAES - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
  • Caffe2 - Caffe2 (Convolutional Architecture for Fast Feature Embedding) is an open source, high-performance framework for the development of machine learning models.
  • CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
  • cal - The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second (cgs) system of physical units.
  • CalConnect - CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further "the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.
  • CalConnect (Calendaring and Scheduling Consortium) - CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further "the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.
  • calculator - A calculator is a device that performs arithmetic operations on numbers.
  • CALEA - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
  • CALEA (Communications Assistance for Law Enforcement Act) - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
  • Calendaring and Scheduling Consortium - CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further "the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.
  • calibrate - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
  • Calibrated Vectored Cooling - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
  • Calibrated Vectored Cooling (CVC) - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
  • calibration - In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure.
  • calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
  • California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
  • California Primary Care Association - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • California Primary Care Association (CPCA) - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • California Security Breach Information Act - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
  • California Security Breach Information Act (SB-1386) - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
  • call admission control - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call center - A call center is a centralized department to which phone calls from current and potential customers are directed.
  • call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
  • call center schedule adherence - Call center schedule adherence is a common metric used in the call center to determine whether or not call center agents are working the amount of time they are scheduled to work.
  • call center shrinkage - Call center shrinkage is a measure of how much time is lost in the call center because agents are unavailable to receive calls.
  • Call Center Terms: Glossary - This is a WhatIs.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call failure rate - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
  • call failure rate (CFR) - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
  • call forwarding - Call forwarding is a telephone service that automatically routes the user's incoming calls to another number.
  • call logging - Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between agents and callers.
  • call monitoring - Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between agents and callers.
  • call recording - Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between agents and callers.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • call to action - A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.
  • call tree - A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.
  • callback - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
  • callback (international callback) - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
  • callback messaging - Callback messaging, in a call center context, is a service that allows callers to leave a message (usually personal contact information, either spoken or through the number pad) so that an agent can call them back and they retain their place in the queue.
  • caller ID spoofing - Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display.
  • CallXML - CallXML is a language based on the Extensible Markup Language (XML) that lets a company describe a phone-to-Web site application in terms of how the call would be handled at the Web site and how it would interact with the caller based on keyed-in or voice responses.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close