Browse Definitions :

Browse Definitions by Alphabet

COL - COM

  • Collaborative Master Data Management (CMDM) - Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company.
  • collaborative robot - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collaborative software - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • collaborative tagging - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • College of Healthcare Information Management Executives - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • collision sensor - A collision sensor is a piece of electronic equipment that detects an impact.
  • collocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • collocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • colocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation center - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • colocation marketplace - A colocation marketplace is an online platform that connects colocation users with managed service providers, IT vendors and potential business partners.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • column address strobe - In computer memory technology, CAS (column address strobe) is a signal sent to a dynamic random access memory (DRAM) that tells it that an associated address is a column address.
  • column database management system (CDBMS) - There are different types of CDBMS offerings, with the common defining feature being that data is stored by column (or column families) instead of as rows.
  • column-level encryption - Column-level encryption is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.
  • columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
  • columnstore index - A columnstore index is a type of index used to store, manage and retrieve data stored in a columnar format in a database.
  • COM - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • COM+ - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
  • combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
  • combinatorial logic - Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states.
  • comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
  • comma separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
  • command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • command interpreter - A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program.
  • command line interface - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • command line interface (CLI) - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • command-and-control server (C&C server) - A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
  • Commerce Extensible Markup Language - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
  • commercial off the shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
  • commercial off-the-shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
  • Commercial Processing Workload - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
  • commit - A commit is the final step in the successful completion of a previously started database change as part of handling a transaction in a computing system.
  • committed information rate - committed information rate.
  • committed information rate (CIR) - committed information rate.
  • Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • common access card - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Application Programming Interface - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • Common AS/400 commands - Cheat sheet - common AS/400 commands.
  • Common Assurance Maturity Model (CAMM) - The Common Assurance Maturity Model (CAMM) is a global project to list the information assurance maturity of suppliers offering provisioning services (for example, cloud providers).
  • Common Body of Knowledge (CBK) - In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
  • Common Business Oriented Language - COBOL (Common Business-Oriented Language) is a programming language created in 1960, and was the first to run on multiple operating systems.
  • common carrier - A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee.
  • common channel signaling - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
  • common channel signaling (CCS) - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
  • Common Criteria - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
  • Common Criteria for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Desktop Environment - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
  • Common Desktop Environment (CDE) - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
  • common gateway interface - Also see FastCGI.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Information Model - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Internet File System - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Common Language Infrastructure (CLI) - Part of Microsoft's .
  • Common Language Runtime - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented class es written in any of the languages.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Management Information Protocol - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • Common Management Information Protocol (CMIP) - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • Common Object Request Broker Architecture - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • Common Open Policy Service Protocol - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
  • Common Programming Interface - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Common Service Center - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common test platform - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • common test platform (CTP) - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Common Vulnerabilities and Exposures - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Weakness Enumeration - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • Communication and Networking Riser - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • Communication and Networking Riser (CNR) - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • communication diagram - A collaboration diagram, also called a communication diagram or interaction diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • communication plan - A communication plan is a policy-driven approach to providing stakeholders with information.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close