Browse Definitions :

Browse Definitions by Alphabet

COR - CRM

  • corporate virtual machine - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
  • corporate VM - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
  • corporate VM (corporate virtual machine) - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
  • corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
  • corporate wellness technology - Corporate wellness technology is software, and sometimes associated hardware, that human resources departments use to improve and manage workers' health and well-being.
  • corporation (C corporation, C corp) - A corporation is a large and complex organization that is owned by its shareholders and governed by a board of directors.
  • corportal - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • correlated subquery - A correlated subquery is a SQL query that depends on values executed by the outer query in order to complete.
  • correlation - Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in relation to each other.
  • correlation coefficient - A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another.
  • correlation engine - A correlation engine is a software application that programmatically understands relationships.
  • CoS - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • cosine wave - A cosine wave is a signal waveform with a shape identical to that of a sine wave, except each point on the cosine wave occurs exactly 1/4 cycle earlier than the corresponding point on the sine wave.
  • Cosmos - Cosmos is an open source, evolving, .
  • COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
  • COSO Framework - The COSO Framework is a system used to establish internal controls to be integrated into business processes.
  • cost benefit analysis - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
  • cost containment - Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.
  • cost management - Cost management is the process of planning and controlling the budget of a business.
  • cost of goods sold (COGS) - Cost of goods sold (COGS) is the total of the costs directly attributable to producing goods.
  • cost per engagement (CPE) - Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when users interact with their campaign in some way.
  • cost per impression - Cost per Impression (CPI) is a business efficiency measure common to advertising in paper and web-based media.
  • cost per like (CPL) - Cost per like (CPL) is the amount a company pays to receive a new fan for a Facebook page, through paid advertising and sometimes through earned media.
  • cost per sale (CPS) - The cost per sale (CPS), also known as the pay per sale, is a metric used by advertising teams to determine the amount of money paid for every sale generated by a specific advertisement.
  • cost price - A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.
  • cost-benefit analysis - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
  • cost-benefit analysis (CBA) - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
  • cost-benefit analysis software - Cost-benefit analysis software is a computer program or suite that assists personnel in the complex task of determining whether or not a proposed plan or project will pay off.
  • cost-plus pricing - Cost-plus pricing is a pricing model in which the price charged for a product is equal to its cost of production plus a specific mark up.
  • COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • CouchDB - CouchDB is an open source document-oriented database based on common web standards.
  • coulomb - The coulomb (symbolized C) is the standard unit of electric charge in the International System of Units (SI).
  • coulomb per centimeter squared - The coulomb per centimeter squared (symbolized C/cm 2) is a unit of electric flux density.
  • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
  • counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
  • counterintelligence - Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions.
  • countermeasure - A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.
  • countess of Lovelace - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • coupling - Coupling is the act of joining two things together.
  • courseware - Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.
  • courtesy copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • covert redirect - Covert redirect is a security flaw that allows attackers to exploit an open redirect vulnerability.
  • COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
  • cow power - Cow power is a term for the conversion of manure to usable energy.
  • cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CoX - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • cPanel (cPanel Control Panel) - cPanel is a Unix-based control panel that automates and simplifies the website hosting process.
  • CPCA - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • CPE - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • CPE credit - Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • CPIO - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • CPM - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
  • CPM - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • CPNI - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • CPOE - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
  • CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
  • CPT - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
  • CR - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • CRAC - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • cracking - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • CRAH - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • CRAM - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • Cray Inc. - Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.
  • CRC - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • CRC - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
  • CRC 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • CRC-4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • create read update delete - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • Creative Commons - Creative Commons is a nonprofit organization that offers copyright licenses for digital work.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • credential prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential stuffing - Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login.
  • credential/session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • crimeware kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
  • crisis management - Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event.
  • crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
  • critical infrastructure security - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical path - The critical path is the longest sequence of tasks in a project plan.
  • critical path method - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical path method (CPM) - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical success factors - Critical success factors are a limited number of key variables or conditions that have a tremendous impact on how successfully and effectively an organization meets its mission or the strategic goals or objectives of a program or project.
  • critical thinking - Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems.
  • CRL - A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their actual or assigned expiration date.
  • CRM - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close