Browse Definitions :

Browse Definitions by Alphabet

CRO - CUS

  • crosstalk - Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit.
  • crowdcasting - Crowdcasting is a problem-solving and idea-generating tactic in which a corporation disseminates details of a specific problem or situation to a carefully chosen group of people for possible solutions.
  • crowdfunding - Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals.
  • crowdsource testing - Crowdsource testing is the practice of sending out prototype software and products to broad groups of people for testing rather than having testing performed internally.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • CRT - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
  • CRUD cycle - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • CRUD cycle (Create, Read, Update and Delete Cycle) - The CRUD cycle describes the elemental functions of a persistent database in a computer.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • crumb - In computers, crumb is jargon for two bits (that is, two binary digits).
  • CRUSH (Controlled Replication Under Scalable Hashing) - CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.
  • Crusoe - Crusoe is a family of "smart" microprocessors from Transmeta that combines a relatively simple, low-powered hardware processor with software that makes the hardware processor look like an x86 Intel processor (such as a Pentium III).
  • cryogenics - Cryogenics is the study of material sciences at extremely low temperatures.
  • cryptanalysis - Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.
  • crypto - Depending on its usage, crypto can be a short form for cryptography or for encryption.
  • crypto-agility - Crypto-agility, or cryptographic agility, is a data encryption practice used by organizations to ensure a rapid response to a cryptographic threat.
  • cryptocurrency - A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.
  • cryptogram - A cryptogram is a word puzzle featuring encrypted text that the user decrypts to reveal a message of some sort.
  • cryptographic checksum - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • cryptography - Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
  • cryptojacking - Cryptojacking is the surreptitious and unauthorized use of a computer for the resource and power-demanding requirements of cryptocurrency mining.
  • cryptology - Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.
  • cryptomining malware - Cryptomining malware is a form of malware that takes over a computer or mobile device's resources and uses them to perform cryptocurrency mining, a process of verifying cryptocurrency transactions using complex mathematical formulas also known as cryptojacking.
  • cryptoperiod - A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.
  • cryptoperiod (key lifetime or a validity period) - A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.
  • cryptosystem - A cryptosystem is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely.
  • cryptotrojan - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • cryptovirus - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • cryptovirus cryptoworm - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • cryptoworm - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • Crypzip - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSA - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • CSAT - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
  • CSC - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • CSC - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • CSD - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
  • CSD (circuit switched data) - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
  • CSMA CD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • CSMA/CA - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • CSMA/CD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • CSMACD - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • CSO - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
  • CSO (Chief Security Officer) - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
  • CSR - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • CSR - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
  • CSR (Certificate Signing Request) - A Certificate Signing Request or CSR is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) validating the information required by the CA in order for it to issue a certificate.
  • CSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
  • CSS - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • CSS - Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.
  • CSS (cascading style sheets) - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • CSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSU DSU - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSU/DSU (Channel Service Unit/Data Service Unit) - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • CSV - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • CSV (Cluster Shared Volumes) - CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster.
  • CSV file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • CT scan - A computerized tomography (CT scan) is a form of computer-assisted imaging, that is assembled from many xrays.
  • CTC - A community technology center (CTC) is a facility that provides free or low-cost computer access, and sometimes training, to people lacking the resources to have a computer in their home.
  • CTC - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • CTCI - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • CTCI (Computer-to-computer interface) - Computer-to-computer interface (CTCI) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • CTD - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • CTFT - Color thin film transistor (CTFT) displays are Thin Film Transistor displays with color.
  • CTI - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • CTI (computer-telephony integration) - CTI (computer-telephony integration), or sometimes simply "computer telephony," is the use of computers to manage telephone calls.
  • CTOps team - A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and long-term recommendations for improvements in software development as well as configuration and network management.
  • CTP - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • Ctrl-Alt-Delete - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • CubeSat - A CubeSat is a small, low-cost, cube-shaped research satellite.
  • cubic foot - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
  • cubic meter - The cubic meter is the unit of volume in the International System of Units.
  • cubic meter (meter cubed) - The cubic meter is the unit of volume in the International System of Units.
  • cubicle - An idea that is now over 40 years old, the office cubicle is a somewhat partitioned space for one or several workers in what is otherwise an unpartitioned and open building space for offices.
  • cuckoo egg - A cuckoo egg is an MP3 file that typically contains 30 seconds of the original song with the remainder of the song overwritten with cuckoo clock noises, white noise, and/or voice messages such as, "Congratulations, you must've goofed up somewhere.
  • cultural fit - Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.
  • culture hacking - Culture hacking is the gradual process of implementing numerous small, positive changes in an organization.
  • culture of failure (blameless culture) - A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation.
  • CULV - CULV (consumer ultra-low voltage) is a line of Intel processors for ultra-light notebook computers.
  • cumulative trauma disorder - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • cumulative trauma disorder (CTD) - In information technology, cumulative trauma disorder (CTD) refers to any of several physical problems that can result from improper or excessive use of a computer display or terminal.
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
  • curie - The curie is a unit of ionizing radiation (radioactivity), symbolized Ci and equal to 3.
  • curiosity gap - The curiosity gap is the detection that new and valuable information is available, sparking people’s desire to access it.
  • curious AI - Curious AI is the simulation of the human capacity for curiosity in artificial intelligence.
  • Curl - Curl is an object-oriented programming language designed to replace HTML, JavaScript, and related tools as a means for creating interactive Web pages.
  • currency - Currency is anything that is generally accepted to have value as a medium of exchange so that it can be traded for goods and services.
  • current - Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.
  • Current Procedural Terminology - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • custom domain name suffix - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom factory integration - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • custom factory integration (CFI) - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • custom TLD - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close