Browse Definitions :

Browse Definitions by Alphabet

CON - CON

  • concentrated solar power (CSP) - Concentrated solar power (CSP) is an approach to generating electricity in which mirrors are used to reflect, concentrate and focus sunlight onto a specific point.
  • concentration - Amount of substance concentration, often called simply concentration, is a quantitative measure of the number of atoms per unit volume in a sample of a matter.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • concept map - A concept map is a graphical tool for organizing and representing knowledge.
  • concept mining - Concept mining is the process of searching documents or unstructured text for ideas and topics.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System - CVS also is an abbreviation for Computer Vision Syndrome.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conditional access - Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.
  • conduct risk - Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's administrators and employees.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • conductive metal oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide (CMOx) technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductive metal-oxide technology - Conductive metal-oxide (CMOx) technology is a nonvolatile storage technology that works by moving oxygen ions between conductive and insulating metal-oxide layers within a single chip.
  • conductor - ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage.
  • Conduit browser hijacker - Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download.
  • cone of uncertainty - The cone of uncertainty is a project management tool that explains why estimates become more accurate over the span of a project's lifecycle.
  • conferencing over Internet Protocol - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • confidential computing - Confidential computing is a concept that prioritizes software and hardware-based security -- specifically pertaining to data in the cloud.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • confidentiality, integrity and availability (CIA triad) - Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
  • CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration item - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • configuration management database - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • configure - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
  • conformance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
  • confusion matrix - A confusion matrix is a table that outlines different predictions and test results and contrasts them with real world values.
  • conglomerate - A conglomerate is a company that comprises multiple different corporations.
  • conjunction - A conjunction is a word used to connect words, phrases and clauses.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connection broker - In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop.
  • connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • Connector ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Connector/ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Conseil Europeen pour la Recherche Nucleaire - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • consensus algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • conservation of angular momentum - Conservation of angular momentum is a physical property of a spinning system such that its spin remains constant unless it is acted upon by an external torque; put another way, the speed of rotation is constant as long as net torque is zero.
  • consignment inventory - Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.
  • consistency - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • Consolidated Health Informatics - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • Consolidated Health Informatics (CHI) - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • const - The const (constant) keyword indicates that the associated variable cannot be changed.
  • Constrained Application Protocol (CoAP) - Constrained Application Protocol (CoAP) is a protocol for low-power compute-constrained devices to operate in the internet of things (IoT).
  • constraint (project constraint) - A project constraint is any limit or restriction applied to a project.
  • construction accounting software - Construction accounting software is collection of programs, processes and information that serves all the essential job functions of general accounting software, such as accounts receivable, accounts payable and general ledger, with the addition of modules for construction-specific functions such as equipment service and usage tracking, time and material billing, and consolidated general ledgers.
  • construction estimating software - Construction estimating software is a collection of programs, processes and information used to calculate the total cost of a construction project.
  • construction project management software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction scheduling software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction scheduling software (construction project management software) - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction software - Construction software is the collection of programs, processes and information used to perform various tasks within the building or assembling of a structure or infrastructure as a means of increasing productivity, efficiency, and competitiveness.
  • construction takeoff software - Construction takeoff software (sometimes spelled take-off or take off) is a collection of programs, processes and information used to perform a part of the cost estimating process in the construction industry.
  • consumer data - Consumer data is the information trail customers leave behind as a result of their Internet use.
  • Consumer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • consumer device - Consumer device is an industry term for Internet-capable mobile computers that are marketed to individuals, not businesses.
  • Consumer Digital Subscriber Line - Also see our Fast guide to DSL.
  • Consumer DSL - Also see our Fast guide to DSL.
  • consumer packaged goods - Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.
  • consumer panel - A consumer panel is a group of individuals selected by a business or organization to provide input and opinion on products and services for research on consumer behavior.
  • Consumer Price Index (CPI) - The Consumer Price Index (CPI) is a measure of the weighted average change in the price that U.
  • consumer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • consumer privacy (customer privacy) - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • consumer surveillance - Consumer surveillance is the monitoring and recording of people’s activities and data, either online or in the physical environment, for commercial purposes.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • consumerization of IT - IT consumerization is the blending of personal and business use of technology devices and applications.
  • consumerization policy - A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization.
  • consumption-based pricing model - A consumption-based pricing model is a service provision and payment scheme in which the customer pays according to the resources used.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • contact center as a service (CCaS) - Contact center as a service (CCaaS) is a framework for contact center infrastructure management that combines the principles of contact center hosting and cloud-based contact center infrastructure.
  • contact center infrastructure - A contact center infrastructure is a framework composed of the physical and virtual resources that a call center facility needs to operate effectively.
  • contact center software - Contact center software is a technology tool that increases the effectiveness and efficiency of a contact center, with specific focus on interactions between customers and contact center agents.
  • contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • contactless payment - A contactless payment is a wireless financial transaction in which the customer authorizes monetary compensation for a purchase by moving a security token in close proximity to the vendor's point of sale (PoS) reader.
  • container (disambiguation) - This page explains how the term container is used in software development, storage, data center management and mobile device management.
  • container image - A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology (IT) infrastructure.
  • Container Linux by CoreOS - Container Linux by CoreOS, originally named CoreOS Linux, is an open source operating system (OS) that provides the functionality required to deploy and manage applications within containers.
  • container registry - A container registry is a collection of repositories made to store container images.
  • container repository - A container repository is a collection of related container images used to provide different versions of an application.
  • Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
  • content - Many people agree that on the World Wide Web, "content is King.
  • content addressed storage - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
  • content aggregator - A content aggregator is an individual or organization that gathers Web content (and/or sometimes applications) from different online sources for reuse or resale.
  • content analytics - Content analytics is the act of applying business intelligence (BI) and business analytics (BA) practices to digital content.
  • content as a service (CaaS) - Content as a service (CaaS) is a web-based service for the creation, storage, management and delivery of content such as text, audio, video or images.
  • content automation - Content automation is a digital marketing strategy that focuses on removing the need for human intervention in the content lifecycle.
  • content caching - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content curation - Content curation is the gathering, organizing and online presentation of content related to a particular theme or topic.
  • content delivery - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content delivery network - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close