Browse Definitions :

Browse Definitions by Alphabet

CON - CON

  • CONFIG.SYS - CONFIG.SYS is a text file containing DOS (Disk Operating System) commands that tell the operating system how the computer is initially set up.
  • configuration - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • configuration drift - Configuration drift occurs naturally in data center environments when changes to software and hardware are not recorded or tracked in a comprehensive and systematic fashion.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration item - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
  • configuration management - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
  • configuration management database - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
  • configuration management software - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • configuration profile (CP) - A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • configure - Generally, a configuration is the arrangement - or the process of making the arrangement - of the parts that make up a whole.
  • confirmation bias - Confirmation bias is a cognitive error in which information that supports a pre-existing belief is assigned more value than other information.
  • conformal coating - Conformal coating is the process of spraying a dielectric material onto a device component to protect it from moisture, fungus, dust, corrosion, abrasion, and other environmental stresses.
  • conformance - In information technology, a state or acts of adherence to a certain specification, standard, or guideline.
  • conformance testing - Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards.
  • conformed dimension - In data warehousing, a conformed dimension is a dimension that has the same meaning to every fact with which it relates.
  • confusion matrix - A confusion matrix is a table that outlines different predictions and test results and contrasts them with real world values.
  • conglomerate - A conglomerate is a company that comprises multiple different corporations.
  • conjunction - A conjunction is a word used to connect words, phrases and clauses.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connection broker - In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop.
  • connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
  • connectionless - In telecommunication, connectionless describes communication between two network end points in which a message can be sent from one end point to another without prior arrangement.
  • Connector ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Connector/ODBC - MySQL Connector/ODBC (sometimes called just Connector ODBC or MyODBC) is a driver for connecting to a MySQL database server through the Open Database Connectivity (ODBC) application program interface (API), which is the standard means of connecting to any database.
  • Conseil Europeen pour la Recherche Nucleaire - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • consensus algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • conservation of angular momentum - Conservation of angular momentum is a physical property of a spinning system such that its spin remains constant unless it is acted upon by an external torque; put another way, the speed of rotation is constant as long as net torque is zero.
  • consignment inventory - Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.
  • consistency - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • Consolidated Health Informatics - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • Consolidated Health Informatics (CHI) - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • const - The const (constant) keyword indicates that the associated variable cannot be changed.
  • Constellation - Constellation was the early name for the Communicator browser and related programs from Netscape Communications.
  • Constrained Application Protocol (CoAP) - Constrained Application Protocol (CoAP) is a protocol for low-power compute-constrained devices to operate in the internet of things (IoT).
  • constraint (project constraint) - A project constraint is any limit or restriction applied to a project.
  • construction accounting software - Construction accounting software is collection of programs, processes and information that serves all the essential job functions of general accounting software, such as accounts receivable, accounts payable and general ledger, with the addition of modules for construction-specific functions such as equipment service and usage tracking, time and material billing, and consolidated general ledgers.
  • construction estimating software - Construction estimating software is a collection of programs, processes and information used to calculate the total cost of a construction project.
  • construction project management software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction scheduling software - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction scheduling software (construction project management software) - Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used to manage a construction project.
  • construction software - Construction software is the collection of programs, processes and information used to perform various tasks within the building or assembling of a structure or infrastructure as a means of increasing productivity, efficiency, and competitiveness.
  • construction takeoff software - Construction takeoff software (sometimes spelled take-off or take off) is a collection of programs, processes and information used to perform a part of the cost estimating process in the construction industry.
  • consumer data - Consumer data is the information trail customers leave behind as a result of their Internet use.
  • Consumer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • consumer device - Consumer device is an industry term for Internet-capable mobile computers that are marketed to individuals, not businesses.
  • Consumer Digital Subscriber Line - Also see our Fast guide to DSL.
  • Consumer DSL - Also see our Fast guide to DSL.
  • consumer packaged goods (CPG) - Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.
  • consumer panel - A consumer panel is a group of individuals selected by a business or organization to provide input and opinion on products and services for research on consumer behavior.
  • Consumer Price Index (CPI) - The Consumer Price Index (CPI) is a measure of the weighted average change in the price that U.
  • consumer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • consumer privacy (customer privacy) - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • consumer surveillance - Consumer surveillance is the monitoring and recording of people’s activities and data, either online or in the physical environment, for commercial purposes.
  • consumerism - Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.
  • consumerization of IT - IT consumerization is the blending of personal and business use of technology devices and applications.
  • consumerization policy - A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization.
  • consumption-based pricing model - A consumption-based pricing model is a service provision and payment scheme in which the customer pays according to the resources used.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • contact center as a service (CCaS) - Contact center as a service (CCaaS) is a framework for contact center infrastructure management that combines the principles of contact center hosting and cloud-based contact center infrastructure.
  • contact center infrastructure - A contact center infrastructure is a framework composed of the physical and virtual resources that a call center facility needs to operate effectively.
  • contact center software - Contact center software is a technology tool that increases the effectiveness and efficiency of a contact center, with specific focus on interactions between customers and contact center agents.
  • Contact Center: Glossary - Browse through contact center vocabulary in a handy printable glossary.
  • contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • container (disambiguation) - This page explains how the term container is used in software development, storage, data center management and mobile device management.
  • container image - A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology (IT) infrastructure.
  • Container Linux by CoreOS - Container Linux by CoreOS, originally named CoreOS Linux, is an open source operating system (OS) that provides the functionality required to deploy and manage applications within containers.
  • container registry - A container registry is a collection of repositories made to store container images.
  • container repository - A container repository is a collection of related container images used to provide different versions of an application.
  • Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
  • content - Many people agree that on the World Wide Web, "content is King.
  • content addressed storage - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
  • content aggregator - A content aggregator is an individual or organization that gathers Web content (and/or sometimes applications) from different online sources for reuse or resale.
  • content analytics - Content analytics is the act of applying business intelligence (BI) and business analytics (BA) practices to digital content.
  • content as a service (CaaS) - Content as a service (CaaS) is a web-based service for the creation, storage, management and delivery of content such as text, audio, video or images.
  • content automation - Content automation is a digital marketing strategy that focuses on removing the need for human intervention in the content lifecycle.
  • content caching - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content curation - Content curation is the gathering, organizing and online presentation of content related to a particular theme or topic.
  • content delivery - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content delivery network - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
  • Content Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • content distribution - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content distribution delivery - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content farm - A content farm, also called a content mill, is a Web site whose content is written for search engine bots instead of human readers.
  • content farm (content mill) - A content farm, also called a content mill, is a Web site whose content is written for search engine bots instead of human readers.
  • content filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • content filtering (information filtering) - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • content gamification - Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.
  • content generation software - Content generation software is a type of computer program that produces content for publication.
  • content managemen - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
  • content management - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • content management (CM) - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • content management application - A content management application (CMA) is the front end component of a content management system (CMS).
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • Content Management Interoperability Services - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • Content Management Interoperability Services (CMIS) - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • content management system - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content marketing - Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close