Browse Definitions :

Browse Definitions by Alphabet

COL - COM

  • collision sensor - A collision sensor is a piece of electronic equipment that detects an impact.
  • collocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • collocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • colocation - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation (colo) - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation center - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • colocation marketplace - A colocation marketplace is an online platform that connects colocation users with managed service providers, IT vendors and potential business partners.
  • color thin film transistor - Color thin film transistor (CTFT) displays are Thin Film Transistor displays with color.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • column address strobe - In computer memory technology, CAS (column address strobe) is a signal sent to a dynamic random access memory (DRAM) that tells it that an associated address is a column address.
  • column database management system (CDBMS) - There are different types of CDBMS offerings, with the common defining feature being that data is stored by column (or column families) instead of as rows.
  • column-level encryption - Column-level encryption is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.
  • columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
  • columnstore index - A columnstore index is a type of index used to store, manage and retrieve data stored in a columnar format in a database.
  • COM - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • COM+ - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
  • combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
  • combinatorial logic - Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states.
  • comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
  • comma separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
  • command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • command interpreter - A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program.
  • command line interface - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • command line interface (CLI) - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • command-and-control server (C&C server) - A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
  • Commerce Extensible Markup Language - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
  • commercial off the shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
  • commercial off-the-shelf - COTS (commercial off-the-shelf) describes ready-made products that can easily be obtained.
  • Commercial Processing Workload - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
  • commit - A commit is the final step in the successful completion of a previously started database change as part of handling a transaction in a computing system.
  • committed information rate - committed information rate.
  • committed information rate (CIR) - committed information rate.
  • Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity computer - A commodity computer is a standard-issue PC that is widely available for purchase.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • common access card - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Application Programming Interface - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • Common AS/400 commands - Cheat sheet - common AS/400 commands.
  • Common Assurance Maturity Model (CAMM) - The Common Assurance Maturity Model (CAMM) is a global project to list the information assurance maturity of suppliers offering provisioning services (for example, cloud providers).
  • Common Body of Knowledge (CBK) - In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
  • Common Business Oriented Language - COBOL (Common Business-Oriented Language) is a programming language created in 1960, and was the first to run on multiple operating systems.
  • common carrier - A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee.
  • common channel signaling - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
  • common channel signaling (CCS) - Common channel signaling (CCS) is signaling (for example, in a T-carrier system line) in which a group of voice-and-data channels share a separate channel that is used only for control signals.
  • Common Criteria - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
  • Common Criteria for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Desktop Environment - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
  • Common Desktop Environment (CDE) - The Common Desktop Environment (CDE) is a standardized graphical user interface (GUI) for open systems.
  • common gateway interface - Also see FastCGI.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Information Model - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Internet File System - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Common Language Infrastructure (CLI) - Part of Microsoft's .
  • Common Language Runtime - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented class es written in any of the languages.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Management Information Protocol - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • Common Management Information Protocol (CMIP) - Common Management Information Protocol (CMIP) is a network management protocol built on the Open Systems Interconnection (OSI) communication model.
  • Common Object Request Broker Architecture - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • Common Open Policy Service Protocol - COPS (Common Open Policy Service Protocol) is a proposed standard protocol for exchanging network policy information between a policy decision point (PDP) in a network and policy enforcement points (PEPs) as part of overall Quality of Service (QoS) - the allocation of network traffic resources according to desired priorities of service.
  • Common Programming Interface - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Common Service Center - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • common short code - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • common test platform - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • common test platform (CTP) - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Common Vulnerabilities and Exposures - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • Common Weakness Enumeration - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • Communication and Networking Riser - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • Communication and Networking Riser (CNR) - Communication and Networking Riser (CNR), which was developed by Intel, is an open industry standard for a scalable riser card, which is a hardware device that plugs into a motherboard and holds chips for functions like modems and audio devices.
  • communication diagram - A collaboration diagram, also called a communication diagram or interaction diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • communication plan - A communication plan is a policy-driven approach to providing stakeholders with information.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • communication server - Also see Terminal Server product, Microsoft software that serves the Windows desktop and applications to terminals.
  • communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
  • Communications Act of 1934 - The Communications Act of 1934 is United States legislation that transfers the Federal Radio Commission’s authority over radio regulation to the Federal Communications Commission (FCC), which was newly formed under the Act’s provisions.
  • Communications as a Service - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
  • Communications Assistance for Law Enforcement Act - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close