Browse Definitions :

Browse Definitions by Alphabet

CLO - COM

  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud uptime - Cloud uptime is the amount of time that cloud systems and cloud services hosted by a cloud provider are up and accessible by end users.
  • cloud washing - Cloud washing (also spelled cloudwashing) is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by associating the buzzword 'cloud' with it.
  • cloud-in-a-can (cloud in a box) - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
  • cloud-integrated storage (CIS) - Cloud-integrated storage (CIS) is a term that refers to a conventional storage-area network (SAN), network-attached storage (NAS) or unified storage system that tiers and/or caches data to cloud-based storage and treats the cloud storage as if it were part of the primary storage system.
  • cloud-oriented architecture (COA) - A cloud-oriented architecture (COA) is a conceptual model encompassing all elements in a cloud environment.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudBees - CloudBees is a former platform as a service cloud provider that now focuses on open source continuous integration.
  • cloudbook - A cloudbook is a thin client notebook computer with a browser operating system (OS) and interface.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • Cloudflare - Cloudflare is a content distribution network (CDN) for the delivery of website and app content to users around the globe.
  • CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
  • Cloudify - Cloudify is an open source cloud and network functions virtualization (NFV) orchestration platform.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • CloudTrust Protocol (CTP) - The CloudTrust Protocol or CTP is a mechanism that helps cloud service customers request and retrieve standardized inquiries about cloud provider transparency.
  • cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • cluster computing - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • cluster name object (CNO) - A cluster name object (CNO) is an Active Directory computer object linked with the network resource Cluster Name.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • clustered network-attached storage (NAS) system - A clustered network-attached storage (NAS) system is a scale-out storage platform made up of multiple NAS nodes networked together into a single cluster.
  • clustered storage - Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMO (chief marketing officer) - A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • co-selling - Co-selling is an approach to product and service distribution in which channel partners are the primary route to market.
  • coalition loyalty program - A coalition loyalty program is a loyalty card system that offers incentives to customers of two or more businesses in return for allowing those businesses to collect user data.
  • coaxial antenna - A coaxial antenna is a variant of the dipole antenna, designed for use with an unbalanced feed line.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBIT 5 - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • code review - Code review is a phase in the computer program development process in which the authors of code, peer reviewers, and perhaps quality assurance reviewers get together to review code, line by line.
  • codebase (code base) - A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coefficient - In a mathematical equation, a coefficient is a constant by which a variable is multiplied.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive architecture - Cognitive architecture is the theory about the structures of the human mind and how they work together to manage intelligent behavior in any complex environment.
  • cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
  • cognitive bias - Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences.
  • cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
  • cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers may be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently.
  • cognitive hacking - Cognitive hacking is a cyberattack that seeks to manipulate the perception of people by exploiting their psychological vulnerabilities.
  • cognitive load theory (CLT) - Cognitive load theory (CLT) is based on the premise that instructional materials should be presented at a pace and level of difficulty that corresponds to how humans process information.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive robotics - Cognitive robotics is a field of technology involving robots that can learn from experience, from human teachers, and even on their own, thereby developing the ability to effectively deal with their environment.
  • cognitive search - Cognitive search is a new generation of enterprise search that uses artificial intelligence technologies to improve users' search queries and extract relevant information from multiple, diverse data sets.
  • cognitive security - Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.
  • cohort - A cohort is a group of people that have some demographic or statistical characteristic in common.
  • CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • COLD (Computer Output to Laser Disk) - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • cold boot attack - A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system.
  • cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
  • cold storage - Cold storage is a computer system or mode of operation designed for the retention of inactive data.
  • cold/warm/hot server - In the backup and recovery of a computer server, a cold server is a backup server whose purpose is solely to be there in case the main server is lost.
  • collaboration - Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project.
  • collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • collaboration specialist - A collaboration specialist is an individual in charge of managing customer experience and implementing a collaborative platform across the enterprise in order to enhance the user experience and employee productivity, and collectively accomplish tasks.
  • collaborative BI (collaborative business intelligence) - Collaborative BI (collaborative business intelligence) is the merging of business intelligence software with collaboration tools, including social and Web 2.
  • collaborative computing - Collaborative computing is a diverse collection of information technologies designed to support work between individuals.
  • collaborative consumption - Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.
  • collaborative filtering - Collaborative filtering is the predictive process behind recommendation engines.
  • collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • collision sensor - A collision sensor is a piece of electronic equipment that detects an impact.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • column database management system (CDBMS) - There are different types of CDBMS offerings, with the common defining feature being that data is stored by column (or column families) instead of as rows.
  • column-level encryption - Column-level encryption is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.
  • columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
  • COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
  • command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
  • command interpreter - A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
  • command-and-control server (C&C server) - A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • command-line interface (CLI) - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
SearchCIO
SearchHRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.

  • recruitment management system

    A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.

  • applicant tracking system (ATS)

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close