Browse Definitions :

Browse Definitions by Alphabet

CAN - CAS

  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • canary test (canary deployment) - In software development, a canary is an approach to progressive deployment in which code changes are rolled out to a small number of users who have not volunteered or opted-in for testing.
  • candela - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candela (cd) - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • candidate management system - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • candidate relationship management - Candidate relationship management is a structured approach to handling job candidates in a company's talent pipeline.
  • cannibalize - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • cannibalizing - In marketing, cannibalization is the decreased demand for an existing product that occurs when its vendor releases a new and similar product.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • canonicalisation - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonify - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canonize - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • canvas fingerprinting (CPF) - Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers.
  • CAP - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • cap and trade system - A cap and trade system is a market-based approach to controlling pollution that allows corporations or national governments to trade emissions allowances under an overall cap, or limit, on those emissions.
  • CAP theorem (Brewer's theorem) - The CAP theorem is the idea that a distributed computing system is not able to provide partition tolerance, consistency and availability at the same time.
  • Capability Maturity Model - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitance - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitive scanner - A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and store a digital image of a human fingerprint.
  • capacitive touch screen - A capacitive touch screen is a touch-sensitive control display that uses the conductive touch of a human finger or a specialized device for input.
  • capacitor - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken to ensure that a computing infrastructure has adequate resources to handle current data processing requirements as well as the capacity to accommodate future loads.
  • capacity on demand - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • capacity optimization - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized storage - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • capacity-optimized transport - Capacity optimization (CO) is a technique for getting more data on a storage medium by analyzing the data for unique repetitive patterns that can be stored as and reassembled from shorter symbols.
  • CAPEX - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • capital expenditure - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPP - Computer-aided process planning is a link between design and manufacturing in a computer-integrated manufacturing (CIM) environment.
  • CAPTCHA - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • capture board - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a standardized protocol that enables wireless LAN (WLAN) controllers to centrally manage a group of wireless access points (APs).
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon capture and reuse (CCR) - Carbon capture and reuse (CCR, also sometimes seen as carbon capture and utilization or CCU) is the collection of carbon dioxide (CO2) from a high-output source point or the environment and reuse of the carbon that is captured in that process.
  • carbon capture and storage (CCS) - Carbon capture and storage (CCS, also sometimes standing for carbon capture and sequestration) is the collection of CO2 for storage as a gas or as a different form of carbon after separating out the oxygen.
  • carbon copy - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • carbon dioxide - Carbon dioxide (CO2) is an odorless, non-flammable gas composed of one atom of carbon and two atoms of oxygen.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon nanotube computer - A carbon nanotube computer is one with a processor that uses carbon nanotubes as its semiconductor material.
  • carbon negative - Carbon negativity is the reduction of an entity’s carbon footprint to less than neutral, so that the entity in question has a net effect of removing carbon dioxide from the atmosphere rather than adding it.
  • carbon neutral - To be carbon neutral is to balance the amount of carbon dioxide released into the atmosphere by a particular activity, like flying, driving or operating a data center, with an equal amount of carbon sequestration or carbon offsets from a third party.
  • carbon offset - A carbon offset is a credit that an individual or organization can purchase to negate a carbon footprint.
  • Carbon Reduction Commitment - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • Carbon Reduction Commitment (CRC) - The Carbon Reduction Commitment (CRC) is a mandatory emissions-reduction standard in the UK.
  • carbon usage effectiveness (CUE) - Carbon usage effectiveness (CUE) is a metric developed by The Green Grid to help organizations measure the amount of carbon used -- or carbon footprint -- in the daily operations of their data centers.
  • carbon-negative data center - A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.
  • Carbonite - Carbonite Inc.
  • card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • card (or expansion card , board , or adapter) - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • Card Bus - CardBus is the trade name for an advanced PC Card (also known as PCMCIA card) specification.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
  • card verification value - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • card-not-present fraud (card-not-present transaction) - Card-not-present (CNP) fraud is the unauthorized use of a payment card to conduct a card-not-present transaction when the cardholder cannot or does not physically present the card at the time of the transaction.
  • cardholder data (CD) - Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data types: cardholder name, expiration date or service code (a three- or four-digit number coded onto the magnetic-stripe that specifies acceptance requirements and limitations for a magnetic-stripe-read transaction).
  • cardholder data environment (CDE) - A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or sensitive payment authentication data, as well as any component that directly connects to or supports this network.
  • Cardholder Information Security Program - Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • Cardholder Information Security Program Payment Card Industry Data Security Standard - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • cardinality - The term cardinality refers to the number of cardinal (basic) members in a set.
  • carding - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • Career horoscopes for Geeks - 2008 Career horoscopesOur own overview of what you need to focus on in 2008.
  • Career Learning Guides - We've gathered a collection of our learning guides and tutorials on Internet-related topics.
  • Career Quizzes - We've gathered a collection of our quizzes on learning and career-related topics.
  • Caringo Swarm - Swarm is software designed to store unstructured data on an object storage platform.
  • carrier cloud - A carrier cloud is a cloud computing system, or network of servers that store data in a way that it is easily accessible from multiple locations, that is owned and operated by a traditional telecommunications service provider.
  • carrier hotel - A carrier hotel, also called a colocation center, is a secure physical site or building where data communications media converge and are interconnected.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • Carrier Sense Multiple Access - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sense Multiple Access Collision Detect - Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.
  • Carrier Sense Multiple Access/Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Carrier Sensitive Routing (CSR) - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • carrier to noise - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • carrierless amplitude phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • carrierless amplitude phase modulation - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • carrierless amplitude/phase - Carrierless amplitude/phase (CAP) modulation was the original approach for modulation of a Digital Subscriber Line (DSL) signal.
  • cartel - A cartel is a body of independent producers that work together to decide production levels and prices.
  • Cartesian coordinates - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • cartonization - Cartonization is a process that uses algorithms to evaluate the items in an order to determine the number and size of each carton needed to ship the order.
  • cartridge - Magnetic tape is one of the oldest technologies for electronic data storage.
  • CAS - Content-addressed storage (CAS) is a method of providing fast access to fixed content (data that is not expected to be updated) by assigning it a permanent place on disk.
  • CAS - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close