Browse Definitions :

Browse Definitions by Alphabet

COU - CRO

  • countermeasure - A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.
  • counterthreat operations team - A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and long-term recommendations for improvements in software development as well as configuration and network management.
  • countess of Lovelace - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • coupling - Coupling is the act of joining two things together.
  • courseware - Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.
  • courtesy copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • covert redirect - Covert redirect is a security flaw that allows attackers to exploit an open redirect vulnerability.
  • COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
  • cow power - Cow power is a term for the conversion of manure to usable energy.
  • cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CoX - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • cPanel (cPanel Control Panel) - cPanel is a Unix-based control panel that automates and simplifies the website hosting process.
  • CPCA - The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state.
  • CPE - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • CPE credit - Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CPG - Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.
  • CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • CPIO - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • CPL - Computer pidgin language (CPL) is an artificial language designed to facilitate speech recognition between humans and computers.
  • CPM - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
  • CPM - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • CPNI - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • CPOE - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
  • CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
  • CPRM - Content Protection for Removable Media (CPRM) is a hardware-based technology designed to enforce copy protection restrictions through built-in mechanisms in storage media that would prevent unauthorized file copying.
  • CPS - Cps (cycles per second) is the measure of how frequently an alternating current changes direction.
  • CPT - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • CPU - CPU (central processing unit) is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.
  • CPW - CPW (Commercial Processing Workload) is a measure used in IBM's AS/400 and iSeries line of computers to compare computer system models in terms of how efficiently each system processes a typical workload of commercial applications involving frequent database access.
  • CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
  • CR - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • CRA - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • CRAC - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a network room or data center.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • cracking - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • CRAH - A computer room air handler (CRAH) is a device used frequently in data centers to deal with the heat produced by equipment.
  • CRAM - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • cramming - Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.
  • crapware - Definition - What is crapware?Crapware is an unflattering name for unwanted software or software that doesn't perform as expected.
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • Cray Inc. - Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.
  • CRC - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • CRC - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
  • CRC 4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • CRC-4 - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • create read update delete - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • Creative Commons - Creative Commons is a nonprofit organization that offers copyright licenses for digital work.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
  • credential prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • credential stuffing - Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through automated login.
  • credential/session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • Credit Card Accountability, Responsibility, and Disclosure Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
  • Credit CARD Act - The Credit CARD Act is legislation governing the behavior of credit card companies in the United States.
  • creeping featuritis - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
  • creepy whisper - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
  • crimeware kit - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • crisis communication - Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with the information they need to respond to the situation.
  • crisis management - Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event.
  • crisis management plan (CMP) - A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical infrastructure and key resources (CIKR) - Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.
  • critical infrastructure security - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • critical path - The critical path is the longest sequence of tasks in a project plan.
  • critical path method - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical path method (CPM) - The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects.
  • critical success factors - Critical success factors are a limited number of key variables or conditions that have a tremendous impact on how successfully and effectively an organization meets its mission or the strategic goals or objectives of a program or project.
  • critical thinking - Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems.
  • CRL - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • CRM - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • CRM chat - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
  • CRM Quizzes - We've gathered quizzes to test your knowledge of customer relationship management and related issues.
  • CRM Real-time Analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • CRO - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • CRON script - A CRON script is a list of one or more commands to a computer operating system or application server that are to be executed at a specified time.
  • crontab - crontab is a UNIX command that creates a table or list of commands, each of which is to be executed by the operating system at a specified time.
  • crop insurance - Crop insurance is a type of protection policy that covers agricultural producers against unexpected loss of projected crop yields or profits from produce sales at market.
  • cross engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
  • cross site scripting - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • cross site tracing - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
  • cross-bar switch - In a network, a cross-bar switch is a device that is capable of channeling data between any two devices that are attached to it up to its maximum number of ports.
  • cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
  • cross-channel analytics - Cross-channel analytics is a strategy used by marketing professionals to study the methods by which customers are influenced to buy a product or service, especially when those methods are combined.
  • cross-docking - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
  • cross-engineering - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
  • cross-functional team - A cross-functional team is a workgroup made up of employees from different functional areas within an organization who collaborate to reach a stated objective.
  • cross-media ownership - Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-site request forgery - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
  • cross-site request forgery (XSRF or CSRF) - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close