Browse Definitions :

Browse Definitions by Alphabet

COM - COM

  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • common access card - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Application Programming Interface - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • Common AS/400 commands - Cheat sheet - common AS/400 commands.
  • Common Assurance Maturity Model (CAMM) - The Common Assurance Maturity Model (CAMM) is a global project to list the information assurance maturity of suppliers offering provisioning services (for example, cloud providers).
  • Common Body of Knowledge (CBK) - In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
  • Common Business Oriented Language - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • common carrier - A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee.
  • Common Criteria - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
  • Common Criteria for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • common gateway interface - Also see FastCGI.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Internet File System - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Common Language Runtime - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Object Request Broker Architecture - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • Common Programming Interface - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Common Service Center - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common test platform - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • common test platform (CTP) - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Common Vulnerabilities and Exposures - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Weakness Enumeration - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • communication diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • communication plan - A communication plan is a policy-driven approach to providing stakeholders with information.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • communication server - A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN).
  • communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
  • Communications Act of 1934 - The Communications Act of 1934 is United States legislation that transfers the Federal Radio Commission’s authority over radio regulation to the Federal Communications Commission (FCC), which was newly formed under the Act’s provisions.
  • Communications as a Service - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • communications over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
  • community technology center - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • community technology center (CTC) - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • Community Technology Preview (CTP) - The Community Technology Preview (CTP) is an early version of a Microsoft product that is released to testers during the software development process.
  • compact disc - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact disc (CD) - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact disc access time - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • compact disk - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact fluorescent light bulb - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • CompactFlash - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card (CF card) - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • compaction - In a data center, compaction is the reduction or consolidation of hardware to make better use of physical floor space.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  • compensation management - Compensation management is the discipline for determining employees' appropriate pay and benefits.
  • competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
  • competitive advantage - Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.
  • competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
  • competitive local exchange carrier - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • compile - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiled - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • complementary metal oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • complementary metal-oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • Completely Automated Public Turing Test to tell Computers and Humans Apart - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • complex adaptive system (CAS) - Complex adaptive system is a term used by DevOps teams to describe an IT platform or project composed of multiple components that interact in ways that cannot be predicted or controlled with complete accuracy.
  • complex event processing - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex instruction set - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computer - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computing - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex system - A complex system is an arrangement of a great number of related but various elements with intricate interconnections.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compliance as a service (CaaS) - Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
  • compliance burden - Compliance burden, also called regulatory burden, is the administrative cost of a regulation in terms of dollars, time and complexity.
  • compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
  • compliance gaining (behavioral compliance gaining) - Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.
  • Compliance Quizzes - We've gathered quizzes to test your knowledge of compliance and related issues.
  • compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
  • compliance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • compliance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • compliance validation - In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • Component Object Model - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable pieces that application developers independently write and deploy.
  • composable infrastructure - A composable infrastructure is a framework that decouples device resources in order to treat them as services.
  • compositing - Compositing used to create layered images and video in advertisements, memes and other content for print publications, websites and apps.
  • compound - In chemistry, a compound is a substance that results from a combination of two or more different chemical elements, in such a way that the atoms of the different elements are held together by chemical bonds that are difficult to break.
  • compressed - Data compression is a reduction in the number of bits needed to represent data.
  • compressed air - Compressed air is a gas, or a combination of gases, that has been put under greater pressure than the air in the general environment.
  • CompTIA (Computing Technology Industry Association) - CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses.
  • CompTIA Cloud Essentials - CompTIA Cloud Essentials is an entry-level, vendor-neutral cloud certification.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close