Browse Definitions :

Browse Definitions by Alphabet

CSM - CUS

  • CSMA/CA - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • CSMA/CD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • CSMACD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • CSO - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
  • CSO (Chief Security Officer) - A Chief Security Officer (CSO) is a C-suite executive responsible for a company's physical and digital security.
  • CSR - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • CSR - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
  • CSR (Certificate Signing Request) - A Certificate Signing Request or CSR is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) validating the information required by the CA in order for it to issue a certificate.
  • CSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
  • CSS - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • CSS - Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.
  • CSS - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • CSS (cascading style sheets) - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • CSS1 - CSS1 (Cascading Style Sheet, level is the recommendation from the World Wide Web Consortium (W3C) for a standard cascading style sheet specification.
  • CSSL1 - CSS1 (Cascading Style Sheet, level is the recommendation from the World Wide Web Consortium (W3C) for a standard cascading style sheet specification.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • CSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSU DSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSU/DSU (Channel Service Unit/Data Service Unit) - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSV - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
  • CSV file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • CT scan - A computerized tomography (CT scan) is a form of computer-assisted imaging, that is assembled from many xrays.
  • CTC - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • CTC - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • CTCI - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • CTCI (Computer-to-computer interface) - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • CTD - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • CTI - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • CTOps team - A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and long-term recommendations for improvements in software development as well as configuration and network management.
  • CTP - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • CTR - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
  • Ctrl-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • CubeSat - A CubeSat is a small, low-cost, cube-shaped research satellite.
  • cubic foot - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
  • cubic meter - The cubic meter is the unit of volume in the International System of Units.
  • cubic meter (meter cubed) - The cubic meter is the unit of volume in the International System of Units.
  • cubicle - An idea that is now over 40 years old, the office cubicle is a somewhat partitioned space for one or several workers in what is otherwise an unpartitioned and open building space for offices.
  • CUL - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • cultural fit - Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.
  • culture hacking - Culture hacking is the gradual process of implementing numerous small, positive changes in an organization.
  • culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
  • cumulative trauma disorder - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • cumulative trauma disorder (CTD) - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
  • curiosity artificial intelligence (curiosity AI) - Curiosity artificial intelligence (curiosity AI) is the simulation of human curiosity in artificial intelligence.
  • curiosity gap - The curiosity gap is the detection that new and valuable information is available, sparking people’s desire to access it.
  • currency - Currency is anything that is generally accepted to have value as a medium of exchange so that it can be traded for goods and services.
  • current - Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.
  • Current Procedural Terminology - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • CUSeeMe - CUseeMe is a low-cost product for Internet videoconferencing.
  • custom domain name suffix - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom factory integration - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • custom TLD - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
  • customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • Customer Analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • customer analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
  • customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
  • customer communications management (CCM) - Customer communications management (CCM) is the administration of outbound communications to customers that includes the creation, delivery and storage of all types of communications.
  • customer data analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer data integration - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
  • customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
  • Customer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
  • customer edge router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
  • customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
  • customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
  • customer experience (CX) automation - Customer experience (CX) automation is any technology that assists customers with common tasks, sometimes replacing the involvement of humans, to improve customer interactions.
  • customer experience management - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • customer feedback loop - A feedback loop, in customer relationship management (CRM), is a strategy for gathering information about a buyer’s perception of a product or service in order to determine future actions.
  • customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or cross-selling or up-selling strategies.
  • Customer Information Control System - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • customer intelligence - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer intelligence (CI) - Customer intelligence (CI) is the process of gathering and analyzing information derived from customer data that an organization collects from both internal and external sources.
  • customer interaction center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifetime value (CLV) - The customer lifetime value (CLV) is a metric that represents a customer's monetary worth to an organization.
  • customer loyalty - Customer loyalty is an adherence between a customer and a brand that causes the customer to make repeat purchases.
  • customer managed relationship - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • customer premises equipment - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • customer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
  • Customer Proprietary Network Information - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • customer proprietary network information (CPNI) - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • customer relationship analysis - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer relationship management - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close