Browse Definitions :

Browse Definitions by Alphabet

CAN - CAS

  • canary test (canary deployment) - In software development, a canary is an approach to progressive deployment in which code changes are rolled out to a small number of users who have not volunteered or opted-in for testing.
  • candela - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • candidate management system - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • candidate relationship management - Candidate relationship management is a structured approach to handling job candidates in a company's talent pipeline.
  • cannibalize - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • cannibalizing - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • canonicalisation - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonify - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonize - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canvas fingerprinting (CPF) - Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.
  • CAP - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • CAP theorem (Brewer's theorem) - The CAP theorem is the idea that a distributed computing system is not able to provide partition tolerance, consistency and availability at the same time.
  • Capability Maturity Model - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitance - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
  • capacitor - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken to ensure that a computing infrastructure has adequate resources to handle current data processing requirements as well as the capacity to accommodate future loads.
  • capacity on demand - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity optimization - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized storage - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized transport - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • CAPEX - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • capital expenditure - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPP - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • CAPTCHA - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • capture board - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon capture and reuse (CCR) - Carbon capture and reuse (CCR, also sometimes seen as carbon capture and utilization or CCU) is the collection of carbon dioxide (CO2) from a high-output source point or the environment and reuse of the carbon that is captured in that process.
  • carbon capture and storage (CCS) - Carbon capture and storage (CCS, also sometimes standing for carbon capture and sequestration) is the collection of CO2 for storage as a gas or as a different form of carbon after separating out the oxygen.
  • carbon copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon dioxide - Carbon dioxide (CO2) is an odorless, non-flammable gas composed of one atom of carbon and two atoms of oxygen.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon nanotube computer - A carbon nanotube computer is one with a processor that uses carbon nanotubes as its semiconductor material.
  • carbon negative - Carbon negativity is the reduction of an entity’s carbon footprint to less than neutral, so that the entity in question has a net effect of removing carbon dioxide from the atmosphere rather than adding it.
  • carbon offset - A carbon offset is a credit that an individual or organization can purchase to negate a carbon footprint.
  • Carbon Reduction Commitment - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • Carbon Reduction Commitment (CRC) - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • carbon usage effectiveness (CUE) - Carbon usage effectiveness (CUE) is a metric developed by The Green Grid to help organizations measure the amount of carbon used -- or carbon footprint -- in the daily operations of their data centers.
  • carbon-negative data center - A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.
  • Carbonite - Carbonite Inc.
  • card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • card (or expansion card , board , or adapter) - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • Card Bus - CardBus is the trade name for an advanced PC Card (also known as PCMCIA card) specification.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
  • card verification value - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card-not-present fraud (card-not-present transaction) - Card-not-present (CNP) fraud is the unauthorized use of a payment card to conduct a card-not-present transaction when the cardholder cannot or does not physically present the card at the time of the transaction.
  • cardholder data (CD) - Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data types: cardholder name, expiration date or service code (a three- or four-digit number coded onto the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe-read transaction).
  • cardholder data environment (CDE) - A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data, as well as any component that directly connects to or supports this network.
  • Cardholder Information Security Program - Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • Cardholder Information Security Program Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • cardinality - The term cardinality refers to the number of cardinal (basic) members in a set.
  • carding - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • Career Learning Guides - We've gathered a collection of our learning guides and tutorials on Internet-related topics.
  • Career Quizzes - We've gathered a collection of our quizzes on learning and career-related topics.
  • Caringo Swarm - Swarm is software designed to store unstructured data on an object storage platform.
  • carrier cloud - A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.
  • carrier hotel - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • Carrier Sense Multiple Access - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sense Multiple Access Collision Detect - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access/Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Carrier Sensitive Routing (CSR) - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • carrier to noise - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrierless amplitude phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • carrierless amplitude phase modulation - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • carrierless amplitude/phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • cartel - A cartel is a body of independent producers that work together to decide production levels and prices.
  • Cartesian coordinates - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • cartonization - Cartonization is a process that uses algorithms to evaluate the items in an order to determine the number and size of each carton needed to ship the order.
  • cartridge - Magnetic tape is one of the oldest technologies for electronic data storage.
  • CAS - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
  • CAS - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
  • cascading style sheet - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • Cascading Style Sheet - CSS1 (Cascading Style Sheet, level is the recommendation from the World Wide Web Consortium (W3C) for a standard cascading style sheet specification.
  • case - A case is a particular instance of something.
  • CASE - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • case study - In a business context, a case study is a documented implementation of something, such as a practice, a product or a service.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close