Browse Definitions :

Browse Definitions by Alphabet

CAM - CAR

  • campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university, or similar organization.
  • CAN - A corporate area network (CAN) is a separate, protected portion of a corporation's intranet.
  • Can Spam - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • can you hear me? (telephone voice signature scam) - "Can you hear me?" is a telephone scam in which a perpetrator creates an audio recording of the victim saying the word "yes" by asking a question that will most likely be answered affirmatively.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • canary test (canary deployment) - In software development, a canary is an approach to progressive deployment in which code changes are rolled out to a small number of users who have not volunteered or opted-in for testing.
  • candela - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • candidate management system - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • candidate relationship management - Candidate relationship management is a structured approach to handling job candidates in a company's talent pipeline.
  • cannibalization - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • cannibalize - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • cannibalizing - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • canonicalisation - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonify - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonize - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canvas fingerprinting (CPF) - Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.
  • CAP - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • cap and trade system - A cap and trade system is a market-based approach to controlling pollution that allows corporations or national governments to trade emissions allowances under an overall cap, or limit, on those emissions.
  • CAP theorem (Brewer's theorem) - The CAP theorem is the idea that a distributed computing system is not able to provide partition tolerance, consistency and availability at the same time.
  • Capability Maturity Model - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitance - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitive scanner - A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and store a digital image of a human fingerprint.
  • capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
  • capacitor - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken to ensure that a computing infrastructure has adequate resources to handle current data processing requirements as well as the capacity to accommodate future loads.
  • capacity on demand - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity optimization - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity optimization (CO) - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized storage - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized transport - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • CAPEX - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • capital expenditure - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPP - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • CAPTCHA - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • capture board - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon capture and reuse (CCR) - Carbon capture and reuse (CCR, also sometimes seen as carbon capture and utilization or CCU) is the collection of carbon dioxide (CO2) from a high-output source point or the environment and reuse of the carbon that is captured in that process.
  • carbon capture and storage (CCS) - Carbon capture and storage (CCS, also sometimes standing for carbon capture and sequestration) is the collection of CO2 for storage as a gas or as a different form of carbon after separating out the oxygen.
  • carbon copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon dioxide - Carbon dioxide (CO2) is an odorless, non-flammable gas composed of one atom of carbon and two atoms of oxygen.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon nanotube computer - A carbon nanotube computer is one with a processor that uses carbon nanotubes as its semiconductor material.
  • carbon negative - Carbon negativity is the reduction of an entity’s carbon footprint to less than neutral, so that the entity in question has a net effect of removing carbon dioxide from the atmosphere rather than adding it.
  • carbon neutral - To be carbon neutral is to balance the amount of carbon dioxide released into the atmosphere by a particular activity, like flying, driving or operating a data center, with an equal amount of carbon sequestration or carbon offsets from a third party.
  • carbon offset - A carbon offset is a credit that an individual or organization can purchase to negate a carbon footprint.
  • Carbon Reduction Commitment - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • Carbon Reduction Commitment (CRC) - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • carbon usage effectiveness (CUE) - Carbon usage effectiveness (CUE) is a metric developed by The Green Grid to help organizations measure the amount of carbon used -- or carbon footprint -- in the daily operations of their data centers.
  • carbon-negative data center - A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.
  • Carbonite - Carbonite Inc.
  • card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • card (or expansion card , board , or adapter) - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • Card Bus - CardBus is the trade name for an advanced PC Card (also known as PCMCIA card) specification.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
  • card verification value - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card-not-present fraud (card-not-present transaction) - Card-not-present (CNP) fraud is the unauthorized use of a payment card to conduct a card-not-present transaction when the cardholder cannot or does not physically present the card at the time of the transaction.
  • cardholder data (CD) - Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data types: cardholder name, expiration date or service code (a three- or four-digit number coded onto the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe-read transaction).
  • cardholder data environment (CDE) - A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data, as well as any component that directly connects to or supports this network.
  • Cardholder Information Security Program - Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • Cardholder Information Security Program Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • cardinality - The term cardinality refers to the number of cardinal (basic) members in a set.
  • carding - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • Career horoscopes for Geeks - 2008 Career horoscopesOur own overview of what you need to focus on in 2008.
  • Career Learning Guides - We've gathered a collection of our learning guides and tutorials on Internet-related topics.
  • Career Quizzes - We've gathered a collection of our quizzes on learning and career-related topics.
  • Caringo Swarm - Swarm is software designed to store unstructured data on an object storage platform.
  • carrier cloud - A carrier cloud is a cloud computing system, or network of servers that store data in a way that it is easily accessible from multiple locations, that is owned and operated by a traditional telecommunications service provider.
  • carrier detect - Carrier detect (see modem lights) is a control signal between a modem and a computer that indicates that the modem detects a "live" carrier that can be used for sending and receiving information.
  • Carrier Ethernet - Carrier Ethernet is the use of high-bandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks (LANs).
  • carrier hotel - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • carrier hotel (colocation center) - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • Carrier Sense Multiple Access - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sense Multiple Access - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access Collision Detect - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access/Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Carrier Sensitive Routing (CSR) - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • carrier signal - A carrier signal is a transmitted electromagnetic pulse or wave at a steady base frequency of alternation on which information can be imposed by increasing signal strength, varying the base frequency, varying the wave phase, or other means.
  • carrier to noise - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close