Browse Definitions :

Browse Definitions by Alphabet

CEN - CHA

  • Centre for the Protection of National Infrastructure - The Centre for the Protection of National Infrastructure (CPNI) is the agency charged with providing advice to any entity within the United Kingdom that owns or operates services or property critical to commerce, public health or security.
  • centrex - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • centrex (central office exchange service) - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • Centrino - Centrino is a technology package from Intel that provides built-in wireless support for laptop computers while making it possible to run a laptop all day (up to seven hours) without a battery recharge.
  • Centronics parallel interface - The Centronics parallel interface is an older and still widely-used standard I/O interface for connecting printers and certain other devices to computers.
  • centum call second - The hundred call second -- also known as the centum call second (CCS) -- is a unit of telecommunications traffic density that is the equivalent of one call (including call attempts and holding time) in a specific channel for 100 seconds in an hour.
  • CenturyLink - CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.
  • CEO - The CEO, or chief executive officer, is the top position in an organization.
  • CEO (Chief Executive Officer) - The CEO, or chief executive officer, is the top position in an organization.
  • Ceph - Ceph is open source software providing scalable object-, block- and file-based storage under a unified system.
  • Ceridian - Ceridian is a human capital management software (HCM) vendor and human resources (HR) services provider headquartered in Minneapolis, Minn.
  • CERN - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • CERN (Conseil Europeen pour la Recherche Nucleaire) - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • Cerner Corp. - Cerner Corp.
  • CERT - CERT (pronounced SUHRT), officially called the CERT Coordination Center, is the Internet's official emergency team.
  • CERT In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • CERT-In - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • certificate authority - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically link an entity with a public key.
  • Certificate of Competency - In defense contracting, a Certificate of Competency states that the holder is authorized to receive and perform on a specific government contract.
  • Certificate Revocation List - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • Certificate Revocation List (CRL) - A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted.
  • certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
  • certified 8(a) - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • certified 8a - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • Certified Associate in Project Management (CAPM) - Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification for individuals interested in entering the project management (PM) field.
  • Certified Cloud Security Professional (CCSP) - The Certified Cloud Security Professional (CCSP) certification is intended for experienced IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of the six CCSP domains.
  • certified e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • certified email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified in the Governance of Enterprise IT (CGEIT) - Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance.
  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor - Certified Information Systems Auditor is a credential that demonstrates an IT professional's ability to assess risk and institute technology controls.
  • Certified Information Systems Auditor (CISA) - Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.
  • Certified Information Systems Risk and Compliance Professional (CISRCP) - A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).
  • Certified Information Systems Security Professional - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified Internet Webmaster - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified Internet Webmaster (CIW) - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • Certified OpenStack Administrator - Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of its principles and values as well as guidance on how to implement and apply them.
  • Certified Wireless Networking Professional - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • Certified Wireless Networking Professional (CWNP) - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • CES (Consumer Electronics Show) - CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.
  • CESG - CESG is the UK government's national technical authority for information assurance (IA).
  • CESG Good Practice Guides (GPG) - Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.
  • CF card - A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store data on a very small portable device.
  • CFAA - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • CFB - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • CFI - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • cfl - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • CFML - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • CFML (ColdFusion Markup Language) - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • CFO - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • CFR - The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through.
  • CGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • CGI - Also see FastCGI.
  • CGI (computer-generated imagery) - CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (AR) and virtual reality (VR) applications.
  • CGI scanner - A CGI (common gateway interface) scanner is a program that searches for known vulnerabilities in Web servers and application programs by testing HTTP requests against known CGI strings.
  • CGO - A CGO is a Chief Green Officer.
  • CGO (Chief Green Officer) - A CGO is a Chief Green Officer.
  • cgs - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • cgs system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
  • chaffing - Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.
  • chaffing and winnowing - Chaffing and winnowing are dual components of a privacy-enhancement scheme that does not require encryption.
  • chalcogenide RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Challenge Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • challenge response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • Challenge-Handshake Authentication Procedure - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • Challenge-Handshake Authentication Protocol - CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).
  • challenge-response authentication - In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, and another entity provides a valid response to be authenticated.
  • challenge-response authentication mechanism - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • Chameleon Card - The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned.
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change data capture - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change data capture (CDC) - Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.
  • change fatigue - Change fatigue is an organizational affliction that results from management-led change initiatives.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • change log - A change log is a record of requests for change (RFCs) submitted for all changes in a service.
  • change management - Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.
  • change management strategy - A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.
  • change mode - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Changed Block Tracking (CBT) - VMware Changed Block Tracking is an incremental backup technology for virtual machines (VMs), comparable to snapshot differential or backup delta block.
  • channel - In telecommunications in general, a channel is a separate path through which signals can flow.
  • channel 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • channel associated signaling - Channel-associated signaling (CAS) is signaling (for example, in a T-carrier system line) in which control signals, such as those for synchronizing and bounding frames, are carried in the same channels as voice and data signals.
  • channel bank - A channel bank is a device at a telephone company central office (public exchange) that converts analog signals from home and business users into digital signals to be carried over higher-speed lines between the central office and other exchanges.
  • channel bonding - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • channel captain - A channel captain is the individual or organization responsible for managing a particular distribution channel and overseeing channel partnerships.
  • channel conflict - Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.
  • Channel Definition Format (CDF) - The Channel Definition Format (CDF) is a file format from Microsoft that lets you create a file that defines a Web "channel," which is a preselected Web site or group of related Web sites.
  • channel extender - A channel extender is a device used with IBM's S/390 line of computers to increase the maximum communication distances between the S/390 channel-connected mainframe computers, or between an S/390 and peripheral devices such as workstations, printers, and storage devices.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close