Browse Definitions :

Browse Definitions by Alphabet

CUS - CYB

  • customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • Customer Analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • customer analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
  • customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
  • customer communications management (CCM) - Customer communications management (CCM) is the administration of outbound communications to customers that includes the creation, delivery and storage of all types of communications.
  • customer data analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer data integration - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
  • customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
  • Customer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
  • customer edge router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
  • customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
  • customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
  • customer experience (CX) automation - Customer experience (CX) automation is any technology that assists customers with common tasks, sometimes replacing the involvement of humans, to improve customer interactions.
  • customer experience management - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • customer feedback loop - A feedback loop, in customer relationship management (CRM), is a strategy for gathering information about a buyer’s perception of a product or service in order to determine future actions.
  • customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or cross-selling or up-selling strategies.
  • Customer Information Control System - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • customer intelligence - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer intelligence (CI) - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer interaction center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifetime value (CLV) - The customer lifetime value (CLV) is a metric that represents a customer's monetary worth to an organization.
  • customer loyalty - Customer loyalty is an adherence between a customer and a brand that causes the customer to make repeat purchases.
  • customer managed relationship - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • customer premises equipment - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • customer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
  • Customer Proprietary Network Information - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • customer proprietary network information (CPNI) - Customer proprietary network information (CPNI) in the United States is information that telecommunications services -- such as local, long-distance and wireless telephone companies -- acquire about their subscribers.
  • customer relationship analysis - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer relationship management - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
  • customer satisfaction - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
  • customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
  • customer scoring models - A customer scoring model is a component of customer relationship management (CRM) programs that refers to various metrics used to help companies predict the long term financial value of customers.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer self-service - Web self-service is a type of electronic support (e-support) that allows customers and employees to access information and perform routine tasks over the Internet, without requiring any interaction with a representative of an enterprise.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
  • customer service chat - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
  • customer success - Customer success is a strategy to assure that a company’s products are meeting the needs of the customer.
  • customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
  • customer-centric - Customer-centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
  • customer-managed relationship - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • CUT - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
  • CVC - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
  • CVE - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • CVO - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • CVO (Chief Visionary Officer) - The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the future.
  • CVS - CVS also is an abbreviation for Computer Vision Syndrome.
  • CVSS (Common Vulnerability Scoring System) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in software.
  • CVV - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • CWDM - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
  • CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • CWNP - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • cXML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • cyan magenta yellow key - CMYK is a scheme for combining primary pigments.
  • cyan, magenta, yellow, and black pigment model - CMYK is a scheme for combining primary pigments.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
  • cyber attack - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
  • cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
  • cyber espionage - Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.
  • cyber hijacking - Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
  • cyber hygiene - Cyber hygiene (or cybersecurity hygiene) is a cybersecurity practice that maintains the basic health and security of hardware and software.
  • Cyber Intelligence Act - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 (CISPA) - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
  • cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
  • cyber vigilantism - Cyber vigilantism is a rough approximation of law enforcement or an attempt at achieving justice or accomplishing something online through unauthorized channels.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybercommuting - Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.
  • cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
  • cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberextortionist - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberforensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • cyberheist - A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • Cyberoam - Cyberoam is a vendor for information security products and services.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is the division of the Department of Homeland Security (DHS) that is tasked with defending the infrastructure of the internet and improving its resilience and security.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close