Browse Definitions :

Browse Definitions by Alphabet

COM - COM

  • Compact Disc interactive - CD-i (Compact Disc - interactive) is the multimedia CD format specified in 1986 (in the Green Book).
  • compact disc recordable - CD-R (for compact disc, recordable) is a type of write once, read many (WORM) compact disc (CD) format that allows one-time recording on a disc.
  • compact disc rewriteable - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
  • compact disk - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • compact fluorescent light bulb - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • Compact HTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • Compact HTML (CHTML) - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • CompactFlash - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CompactFlash card (CF card) - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • compaction - In a data center, compaction is the reduction or consolidation of hardware to make better use of physical floor space.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  • Compensation Management - Compensation management is a critical part of talent management and employee retention.
  • competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
  • competitive advantage - Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals.
  • competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
  • competitive intelligence (CI) - Competitive intelligence (CI) is the gathering of publicly-available information about an enterprise's competitors and the use of that information to gain a business advantage.
  • competitive local exchange carrier - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • compile - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiled - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • Complementary Code Keying - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
  • Complementary Code Keying (CCK) - Complementary Code Keying (CCK) is a modulation scheme used with wireless networks (WLANs) that employ the IEEE 802.
  • complementary metal oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • complementary metal-oxide semiconductor - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • Completely Automated Public Turing Test to tell Computers and Humans Apart - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • complex adaptive system (CAS) - Complex adaptive system is a term used by DevOps teams to describe an IT platform or project composed of multiple components that interact in ways that cannot be predicted or controlled with complete accuracy.
  • complex event processing - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • complex instruction set - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computer - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex instruction set computing - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • complex number - A complex number is a quantity of the form v + iw, where  v and w are real numbers, and i represents the unit imaginary numbers equal to the positive square root of -1.
  • complex system - A complex system is an arrangement of a great number of related but various elements with intricate interconnections.
  • compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
  • compliance as a service (CaaS) - Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
  • compliance burden - Compliance burden, also called regulatory burden, is the administrative cost of a regulation in terms of dollars, time and complexity.
  • compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
  • compliance gaining (behavioral compliance gaining) - Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.
  • Compliance Quizzes - We've gathered quizzes to test your knowledge of compliance and related issues.
  • compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
  • compliance software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • compliance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • compliance validation - In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • Component Object Model - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • Component Object Model + - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
  • component video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • componentization (component-based development) - Componentization is an approach to software development that involves breaking software down into identifiable pieces that application developers independently write and deploy.
  • composable infrastructure - A composable infrastructure is a framework that decouples device resources in order to treat them as services.
  • composite video - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
  • compositing - Compositing used to create layered images and video in advertisements, memes and other content for print publications, websites and apps.
  • composition - Here is a list of the seven elementary rules of English usage and 11 elementary principles of composition from William Strunk, Jr.
  • compound - In chemistry, a compound is a substance that results from a combination of two or more different chemical elements, in such a way that the atoms of the different elements are held together by chemical bonds that are difficult to break.
  • compound document - In information technology, a compound document is an organized collection of user interfaces that form a single integrated perceptual environment.
  • compressed - Data compression is a reduction in the number of bits needed to represent data.
  • compressed air - Compressed air is a gas, or a combination of gases, that has been put under greater pressure than the air in the general environment.
  • compressed air energy storage - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
  • compressed air energy storage (CAES) - Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers.
  • CompTIA (Computing Technology Industry Association) - CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses.
  • CompTIA Cloud Essentials - CompTIA Cloud Essentials is an entry-level, vendor-neutral cloud certification.
  • CompTIA Network+ - The CompTIA Network+ is an IT certification exam that confirms an individual possesses the skills in networking required to develop a career in IT infrastructure.
  • CompTIA Project+ - CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.
  • CompTIA Security+ - CompTIA Security+ is a certification that demonstrates a person's competency with core security practices and functions that are carried out in IT security roles.
  • computational creativity (artificial creativity) - Computational creativity (artificial creativity), is the application of computer technologies to emulate, study, stimulate and enhance human creativity.
  • computational economics - Computational economics is a field of economic study at the intersection of computer science, economics and management science.
  • computational fluid dynamics (CFD) - Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.
  • computational grid - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • computational law - Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.
  • computational linguistics (CL) - Computational linguistics is the application of computer science to the analysis, synthesis, and comprehension of written and spoken language.
  • computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
  • computational photography - Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.
  • computational storage - Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.
  • Compute Card (Intel Compute Card) - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Compute Intensive Workload - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • Computed Dental Radiography - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • Computed Dental Radiography (CDR) - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • computer - A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
  • computer aided design - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • computer aided design - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • computer aided engineering - CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes.
  • computer aided manufacturing - CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices.
  • Computer aided process planning - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • computer aided software engineering - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • Computer Aided Test Tool - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
  • computer assisted coding system - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computer barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
  • computer based training - Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer.
  • computer cracker - A computer cracker is an outdated term used to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  • Computer Emergency Readiness Team - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • Computer Emergency Response Team (CERT) - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close