Browse Definitions :

Browse Definitions by Alphabet

CHI - CIS

  • chief architect (chief IT architect) - In information technology (IT), a chief architect is a c-level executive whose job is to look closely at how IT functions can be centralized so that departments across the company can work together seamlessly.
  • Chief Complicance Officer - A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures.
  • chief customer officer - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • chief customer officer (CCO) - A chief customer officer, or customer experience officer, is generally responsible for customer research, communicating with company employees and taking charge of customer experience metrics.
  • chief data officer (CDO) - A chief data officer (CDO) is a C-level executive who is responsible for an organization's data use and data governance.
  • Chief Digital Officer (CDO) - A chief digital officer (CDO) is an executive enlisted to help businesses transform traditional IT policies and business processes to accommodate digital sectors such as mobile technology and applications and Web-based information management and marketing trends.
  • Chief Executive Officer - The CEO, or chief executive officer, is the top position in an organization.
  • chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
  • Chief Financial Officer - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • Chief Green Officer - A CGO is a Chief Green Officer.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • Chief Information Officer - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • Chief IoT Officer (Chief Internet of Things Officer) - A Chief Internet of Things Officer is an enterprise executive in charge of how smart products are developed and implemented to best support company objectives and goals.
  • Chief Knowledge Officer - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • chief learning officer (CLO) - A chief learning officer (CLO) is a senior-level executive who ensures that a company's corporate learning program and strategy supports its overall business goals.
  • chief marketing technologist (CMT) - A chief marketing technologist (CMT) is a C-level executive who sets a technology vision for the marketing team that aligns with business goals.
  • Chief Medical Information Officer - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • Chief Operating Officer (COO) - A Chief Operating Officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • Chief Process and Innovation Officer - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • Chief Process and Innovation Officer (CPIO) - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • chief procurement officer (CPO) - A chief procurement officer (CPO) is an executive title commonly given to the person responsible for the strategic acquisition of goods and services at an organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief reputation officer (CRO) - A chief reputation officer (CRO) is the C-level corporate executive charged with overseeing activities in all areas of an organization that could potentially have an impact on the public perception of that enterprise.
  • Chief Risk Officer - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • Chief Security Officer - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
  • Chief Social Scientist (Senior Social Scientist) - A Chief (or Senior) Social Scientist is a sociologist who provides advice to government officials or corporate executives concerning the roles of individuals and institutions in human society.
  • chief storyteller - A chief storyteller is an employee of an organization tasked with wording the company's mission, history and messages about their brand, also known as their story, as they want it to be heard internally and externally.
  • Chief Strategy Officer (CSO) - A chief strategy officer (CSO), or chief strategist, is an executive charged with helping formulate, facilitate and communicate the overarching strategy of an organization, usually a large corporation.
  • Chief Sustainability Officer - A CGO is a Chief Green Officer.
  • Chief Technology Officer (CTO) - The Chief Technology Officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • Chief Transformation Officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information and how it is protected.
  • chief visionary officer - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • child partition - A child partition is a logical hard drive division in the Microsoft Hyper-V environment that runs an isolated operating system.
  • Children's Online Privacy Protection Act - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
  • Childrens Online Privacy Protection Act - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
  • chiller - A data center chiller is a cooling system used in a data center to remove heat from one element and deposit it into another element.
  • chilling effect - The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.
  • CHIME - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • CHIME (College of Healthcare Information Management Executives) - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • Chinese wall - A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information.
  • Chinese wall method - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
  • Chip and PIN - Chip and PIN is a UK government-backed initiative to implement the EMV (Europay, Mastercard and Visa) standard for smart card payment authorization.
  • chip art - Microchip art is a microscopic non-functioning drawing impressed on the surface of the design mask used in the production of microchip s.
  • chip set - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • chipping rate - Megachips per second (Mcps) is a measure of the speed with which encoding elements, called chips (not to be confused with microchips), are generated in Direct Sequence Spread Spectrum (DSSS) signals.
  • chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • chmod - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • chorus - In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface (MIDI).
  • Chrome Remote Desktop - Chrome Remote Desktop is an extension of the Google Chrome browser that allows a user to remotely see and control another user's desktop through the browser window.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • CHTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • churn - In a general context, churn is a synonym for agitation or turnover.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CI - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • CI - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
  • CICS - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • CIDR - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • CIDR - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIM - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • cinema pulldown 3:2 - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinemagraph - A cinemagraph is an image that combines still photography with active video to create a picture that contains a small moving element while the rest is frozen.
  • cinematography (cinematographer) - Cinematography is a blend of science and art used to capture, manipulate and store moving images for the purpose of creating a motion picture.
  • CIO - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptology, the discipline concerned with the study of cryptographic algorithms, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • CipherCloud - CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • ciphertext feedback (CFB) - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • CIR - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
  • circuit - In electronics, a circuit is a path between two or more points along which an electrical current can be carried.
  • circuit bending - Circuit bending is the practice of modifying existing electronics items, most often toys, to create other items, usually musical instruments.
  • circuit breaker - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • circuit switched data - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
  • circuit-switched - Circuit-switched is a type of network in which a physical path is obtained for and dedicated to a single connection between two end-points in the network for the duration of the connection.
  • circular economy - A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • CISA - The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • CISC - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Cisco Catalyst Blade Switch 3020 - The Cisco Catalyst Blade Switch 3020 is a switch designed for the Hewlett-Packard (HP) BladeSystem c-Class of blade servers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close