Browse Definitions :

Browse Definitions by Alphabet

CER - CHI

  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Auditor (CISA) - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Risk and Compliance Professional (CISRCP) - A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).
  • Certified Information Systems Security Professional - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Internet Webmaster - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified Internet Webmaster (CIW) - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified OpenStack Administrator - Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • Certified Wireless Networking Professional - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • Certified Wireless Networking Professional (CWNP) - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • CES (Consumer Electronics Show) - CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.
  • CF card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CFAA - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • CFB - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • cfl - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • CFO - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • CGI - Also see FastCGI.
  • CGI (computer-generated imagery) - CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (AR) and virtual reality (VR) applications.
  • CGI scanner - A CGI (common gateway interface) scanner is a program that searches for known vulnerabilities in Web servers and application programs by testing HTTP requests against known CGI strings.
  • CGO - A CGO is a Chief Green Officer.
  • CGO (Chief Green Officer) - A CGO is a Chief Green Officer.
  • cgs - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • cgs system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • chalcogenide RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Challenge Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • challenge response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • Challenge-Handshake Authentication Procedure - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • Challenge-Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • challenge-response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change data capture - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change data capture (CDC) - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change fatigue - Change fatigue is an organizational affliction that results from management-led change initiatives.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • change log - A change log is a record of requests for change (RFCs) submitted for all changes in a service.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • change management strategy - A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
  • channel - In telecommunications in general, a channel is a separate path through which signals can flow.
  • channel bonding - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • channel captain - A channel captain is the individual or organization responsible for managing a particular distribution channel and overseeing channel partnerships.
  • channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
  • Channel Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • Channel Service Unit/Data Service Unit - A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
  • channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • chaos theory - Chaos theory is the study of nonlinear dynamics, in which seemingly random events are actually predictable from simple deterministic equations.
  • CHAP - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • character - In information technology, a character is a printable symbol having phonetic or pictographic meaning and usually forming part of a word of text, depicting a numeral, or expressing grammatical punctuation.
  • characteristic impedance of free space - The characteristic impedance of free space, also called the Z o of free space, is an expression of the relationship between the electric-field and magnetic-field intensities in an electromagnetic field (EM field) propagating through a vacuum.
  • characters per inch - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • charge - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • charge cycle - The number of charge cycles a rechargeable battery can withstand before performance degrades is the accepted method of measurement for rating rechargeables’ charge cycles.
  • charge quantity - Charge quantity is an expression of the extent to which an object is electrically charged.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • charm offensive - A charm offensive is an intense and carefully plotted campaign to win over someone who may not be favorably disposed toward the campaigner.
  • chart of accounts - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
  • chart of accounts (COA) - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
  • chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
  • chat acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • chat channels - Chat channels are technologies enabling companies to engage with customers in live conversations.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • chat terms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • chatbot - A chatbot is a software or computer program that simulates the human conversation or "chatter" through text or voice interactions.
  • ChatOps - ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed.
  • Chatter (Salesforce Chatter) - Chatter is an enterprise collaboration platform from Salesforce, a cloud-based customer relationship management (CRM) vendor.
  • chatting - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • CHDR - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • Cheapernet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • Cheat Sheet - Characters and quotes from The Phoenix Project - Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot.
  • Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project' - Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.
  • check digit - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
  • check digit (checksum character) - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
  • checkpoint - A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine.
  • checksum - A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions.
  • checksum character - A check digit, also known as a checksum character, is the number located on the far right side of a bar code.
  • Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
  • Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
  • CHI - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • chief analytics officer - The chief analytics officer is a C-level position responsible for data analysis within an organization.
  • chief architect (chief IT architect) - In information technology (IT), a chief architect is a c-level executive whose job is to look closely at how IT functions can be centralized so that departments across the company can work together seamlessly.
  • chief customer officer - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • chief customer officer (CCO) - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • chief data officer (CDO) - A chief data officer (CDO) is a C-level executive who is responsible for an organization's data use and data governance.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

  • click fraud (pay-per-click fraud)

    Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close