Browse Definitions :

Browse Definitions by Alphabet

CCI - CER

  • CCITT or ITU-T (Telecommunication Standardization Sector of the International Telecommunications) - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
  • CCMP - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
  • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.
  • CCNA - Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.
  • CCNA certification - Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.
  • CCNP - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • CCO - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • CCoA - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • CCR - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
  • CCS - The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.
  • CCSP - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • CCTV - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • CCTV - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • CCTV (closed circuit television) - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • cd - The candela (abbreviation, cd) is the standard unit of luminous intensity in the International System of Units (SI).
  • CD - A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data in digital form.
  • CD-ROM - .
  • CD/DVD Fast Guide - Quick look-up for getting up to speed about CDs and DVDs.
  • CDA - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • CDAC - The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.
  • CDC - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • CDC - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • CDD - A contract delivery date (CDD) is the date of delivery required by a contract.
  • CDI - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • CDMA - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • CDMA (Code-Division Multiple Access) - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • CDN - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery.
  • CDN (content delivery network) - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers.
  • CDO - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
  • CDP - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • CDP - Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • CDR - Computed Dental Radiography (CDR) is a technology for capturing a computerized image or radiograph of your teeth and gums that requires 90% less radiation than conventional x-ray film.
  • CDR - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • CDROM - .
  • CDSS - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • CdTe photovoltaics - Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic (PV) cells that convert sunlight into DC (direct current) electricity.
  • CE router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • CE router (customer edge router) - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • CEEDA (Certified Energy-Efficient Datacenter Award) - CEEDA is a data center certification for the efficient use of energy.
  • Celeron - Celeron is the low-end (and low cost) member of the family of microprocessors from Intel that is based on its P6 architecture.
  • CELL - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
  • cell phone jammer - A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use.
  • cell phone spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • Cell processor - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
  • Cell processor (CELL) - The Cell processor (also called CELL) is a microprocessor chip with a multi-core, parallel processing architecture and floating-point design.
  • cell-Internet phone - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • cell-phone unlocking - An unlocked cell phone is a cellular telephone handset that can be used with more than one service provider, making it easy for a user to switch from one cellular network to another.
  • cellular automata - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
  • cellular automaton - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
  • cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.
  • Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
  • cellular-Internet phone - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • CEM - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • Center for Humane Technology - The Center for Humane Technology (CHT) is an organization dedicated to mitigating the negative effects of digital technology, which they refer to as human downgrading.
  • Center for Internet Security (CIS) - The Center for Internet Security (CIS) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response.
  • center of excellence (CoE) - A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide best practices for a particular area of interest.
  • Centers for Disease Control and Prevention - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Centers for Medicare & Medicaid Services - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • Centers for Medicare & Medicaid Services (CMS) - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • centimeter - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
  • centimeter (cm) - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
  • centimeter gram second - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • centimeter per second squared - The centimeter per second squared (symbolized cm/s 2 or cm/sec 2) is the unit of acceleration vector magnitude in the centimeter-gram-second (cgs) or small-unit metric system.
  • Central Identities Data Repository (CIDR) - Central Identities Data Repository (CIDR) is a government agency in India that stores and manages data for the country's Aadhaar project.
  • central office exchange service - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • centralized backup - Centralized backup is a process that involves automatically replicating data from remote sites and sending it over a network to a main (centralized) location for storage.
  • centrex - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • centrex (central office exchange service) - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • Centronics parallel interface - The Centronics parallel interface is an older and still widely-used standard I/O interface for connecting printers and certain other devices to computers.
  • centum call second - The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.
  • CenturyLink - CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.
  • CEO - The CEO, or chief executive officer, is the top position in an organization.
  • CEO (Chief Executive Officer) - The CEO, or chief executive officer, is the top position in an organization.
  • CEP - Complex event processing (CEP) is the use of technology to predict high-level events likely to result from specific sets of low-level factors.
  • Ceph - Ceph is open source software providing scalable object-, block- and file-based storage under a unified system.
  • Ceridian - Ceridian is a human capital management software (HCM) vendor and human resources (HR) services provider headquartered in Minneapolis, Minn.
  • CERN - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • CERN (Conseil Europeen pour la Recherche Nucleaire) - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • Cerner Corp. - Cerner Corp.
  • CERT - A Computer Emergency Response Team (CERT) is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
  • CERT In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • CERT-In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • certificate authority - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • Certificate of Competency - In defense contracting, a Certificate of Competency states that the holder is authorized to receive and perform on a specific government contract.
  • Certificate Revocation List - A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their actual or assigned expiration date.
  • certificate revocation list (CRL) - A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their actual or assigned expiration date.
  • certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
  • certified 8(a) - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8a - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • Certified Associate in Project Management (CAPM) - The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.
  • Certified Cloud Security Professional (CCSP) - The Certified Cloud Security Professional (CCSP) certification is intended for experienced IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of the six CCSP domains.
  • certified e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified in the Governance of Enterprise IT (CGEIT) - Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close