Browse Definitions :

Browse Definitions by Alphabet

CLO - COA

  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud spanning - Cloud spanning is a cloud delivery model in which an application requiring a large pool of computing resources is deployed over multiple cloud environments (private cloud, public cloud and/or hybrid cloud).
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of cloud instances, services or providers that are used by an enterprise.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application program interface that connects a locally-based application to a cloud-based storage system, so that a user can send data to it and access and work with data stored in it.
  • cloud storage appliance - A cloud storage appliance is a stand-alone computing device or virtual machine (VM) image used to move data from a local site to a remote cloud storage service provider.
  • cloud storage backup - Cloud storage backup involves moving data offsite to a managed service provider for protection.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud uptime - Cloud uptime is the amount of time that cloud systems and cloud services hosted by a cloud provider are up and accessible by end users.
  • cloud washing - Cloud washing is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old service by associating the word "cloud" with it.
  • cloud-in-a-can - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
  • cloud-in-a-can (cloud in a box) - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
  • cloud-integrated storage (CIS) - Cloud-integrated storage (CIS) is a term that refers to a conventional storage-area network (SAN), network-attached storage (NAS) or unified storage system that tiers and/or caches data to cloud-based storage and treats the cloud storage as if it were part of the primary storage system.
  • cloud-oriented architecture (COA) - A cloud-oriented architecture (COA) is a conceptual model encompassing all elements in a cloud environment.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • cloud-to-cloud migration - Cloud-to-cloud migration (C2C) is the movement of physical or virtual machines -- along with their associated configurations, operating systems, applications and storage -- from one cloud computing provider to another.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudAudit - CloudAudit is a specification for the presentation of information about how a cloud computing service provider addresses control frameworks.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • CloudBees - CloudBees is a former platform as a service cloud provider that now focuses on open source continuous integration.
  • cloudbook - A cloudbook is a thin client notebook computer with a browser operating system (OS) and interface.
  • Cloudburst VM escape - Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • Cloudflare - Cloudflare is a content distribution network (CDN) for the delivery of website and app content to users around the globe.
  • CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
  • Cloudify - Cloudify is an open source cloud and network functions virtualization (NFV) orchestration platform.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • CloudSwitch - CloudSwitch is a company that makes cloud migration software.
  • CloudTrust Protocol (CTP) - The CloudTrust Protocol or CTP is a mechanism that helps cloud service customers request and retrieve standardized inquiries about cloud provider transparency.
  • CloudVelox - CloudVelox is a software provider that offers migration and disaster recovery tools for cloud computing environments, including Amazon Web Services (AWS).
  • cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
  • CLR - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • Cluster Labs Pacemaker - Pacemaker is an open source high-availability cluster software developed from a collaboration between Red Hat and Novell.
  • cluster log (CL) - A cluster log (CL) is a record of cluster service activity in a server member cluster.
  • cluster name object (CNO) - A cluster name object (CNO) is an Active Directory computer object linked with the network resource Cluster Name.
  • cluster panic - Cluster panic is a multiple-node kernel panic that occurs in a network or other set of interconnected computers called a cluster.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • clustered NAS - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • Clustered network attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • Clustered network-attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • clustered network-attached storage (clustered NAS) - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • clustered storage - Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability.
  • ClusterHQ Flocker - Management of Docker containers can be facilitated with the use of Flocker software – a framework for moving containers across clusters of servers.
  • clustering - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • CM - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • cm - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
  • CM - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • CMA - The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990.
  • CMA - A content management application (CMA) is the front end component of a content management system (CMS).
  • CMDB - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMDM - Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company.
  • CMDSP (Certified Mobile Device Security Professional) - CMDSP (Certified Mobile Device Security Professional) is a certification program offered by the Mobile Resource Group that provides a standardized assurance of competency in the field of mobile security and administration.
  • CMIO - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMIP - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • CMIS - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • CMM - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • CMO (chief marketing officer) - A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.
  • CMOS - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • CMOS (complementary metal-oxide semiconductor) - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CMOx technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • CMP-50 cable - Limited combustible cable (LCC), also called CMP-50 cable, is fire-resistant cable with insulation made of a synthetic material called fluorinated ethylene propylene (FEP).
  • CMR - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • CMS - CMS (Conversational Monitor System) is a product that comes with IBM's VM/ESA operating system and allows each of many simultaneous interactive users to appear to have an entire mainframe computer at their personal disposal.
  • CMS - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • CMS - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • CMTS - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • CMYB - CMYK is a scheme for combining primary pigments.
  • CMYK - CMYK is a scheme for combining primary pigments.
  • CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
  • CNA - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • CNG - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • CNR - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • CNR - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • CO - In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop.
  • CO - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • co browsing - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
  • co location - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • co-browsing - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
  • co-location - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • co-selling - Co-selling is an approach to product and service distribution in which channel partners are the primary route to market.
  • COA - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
  • coalition loyalty program - A coalition loyalty program is a loyalty card system that offers incentives to customers of two or more businesses in return for allowing those businesses to collect user data.
  • coarse wavelength division multiplexing - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
  • coarse wavelength division multiplexing (CWDM) - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close