Browse Definitions :

Browse Definitions by Alphabet

COM - COM

  • common channel signaling - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
  • Common Criteria - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
  • Common Criteria for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Desktop Environment - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
  • common gateway interface - Also see FastCGI.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Information Model - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Internet File System - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Common Language Infrastructure - Part of Microsoft's .
  • Common Language Runtime - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Management Information Protocol - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • Common Object Request Broker Architecture - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • Common Open Policy Service Protocol - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
  • Common Programming Interface - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Common Service Center - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common test platform - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • common test platform (CTP) - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Common Vulnerabilities and Exposures - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Weakness Enumeration - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • Communication and Networking Riser - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • communication diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • communication plan - A communication plan is a policy-driven approach to providing stakeholders with information.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • communication server - A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN).
  • communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
  • Communications Act of 1934 - The Communications Act of 1934 is United States legislation that transfers the Federal Radio Commission’s authority over radio regulation to the Federal Communications Commission (FCC), which was newly formed under the Act’s provisions.
  • Communications as a Service - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • Communications Assistance for Law Enforcement Act - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
  • communications enabled business processes - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • communications over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
  • communications-enabled business processes - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • communications-enabled business processes (CEBP) - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • community access television - CATV (originally "community antenna television," now often "community access television") is more commonly known as "cable TV.
  • community antenna television - Cable TV is also known as "CATV" (community antenna television).
  • community technology center - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • community technology center (CTC) - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • Community Technology Preview (CTP) - The Community Technology Preview (CTP) is an early version of a Microsoft product that is released to testers during the software development process.
  • compact disc - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact disc (CD) - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • Compact Disc - interactive - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
  • compact disc access time - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • Compact Disc interactive - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
  • compact disc recordable - CD-R (for compact disc, recordable) is a type of write once, read many (WORM) compact disc (CD) format that allows one-time recording on a disc.
  • compact disc rewriteable - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
  • compact disk - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact fluorescent light bulb - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • Compact HTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • CompactFlash - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card (CF card) - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • compaction - In a data center, compaction is the reduction or consolidation of hardware to make better use of physical floor space.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  • Compensation Management - Compensation management is a critical part of talent management and employee retention.
  • competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
  • competitive advantage - Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.
  • competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
  • competitive intelligence (CI) - Competitive intelligence (CI) is the gathering of publicly-available information about an enterprise's competitors and the use of that information to gain a business advantage.
  • competitive local exchange carrier - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • compile - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiled - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • Complementary Code Keying - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
  • complementary metal oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • complementary metal-oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • Completely Automated Public Turing Test to tell Computers and Humans Apart - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • complex adaptive system (CAS) - Complex adaptive system is a term used by DevOps teams to describe an IT platform or project composed of multiple components that interact in ways that cannot be predicted or controlled with complete accuracy.
  • complex event processing - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex instruction set - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computer - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computing - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex number - A complex number is a quantity of the form v + iw, where  v and w are real numbers, and i represents the unit imaginary numbers equal to the positive square root of -1.
  • complex system - A complex system is an arrangement of a great number of related but various elements with intricate interconnections.
  • compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
  • compliance as a service (CaaS) - Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
  • compliance burden - Compliance burden, also called regulatory burden, is the administrative cost of a regulation in terms of dollars, time and complexity.
  • compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
  • compliance gaining (behavioral compliance gaining) - Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.
  • Compliance Quizzes - We've gathered quizzes to test your knowledge of compliance and related issues.
  • compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
  • compliance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • compliance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • compliance validation - In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close