Browse Definitions :

Browse Definitions by Alphabet

CHI - CIS

  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • Chief Information Officer - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • Chief IoT Officer (Chief Internet of Things Officer) - A Chief Internet of Things Officer is an enterprise executive in charge of how smart products are developed and implemented to best support company objectives and goals.
  • Chief Knowledge Officer - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • chief learning officer (CLO) - A chief learning officer (CLO) is a senior-level executive who ensures that a company's corporate learning program and strategy supports its overall business goals.
  • chief marketing technologist (CMT) - A chief marketing technologist (CMT) is a C-level executive who sets a technology vision for the marketing team that aligns with business goals.
  • Chief Medical Information Officer - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • Chief Operating Officer (COO) - A Chief Operating Officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • Chief Process and Innovation Officer - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • Chief Process and Innovation Officer (CPIO) - Chief Process and Innovation Officer (CPIO) or sometimes just Chief Process Officer (CPO) is a corporate C-level position that calls for a leader who is able to identify which parts of a company's business processes could be improved and identify specific ways to make them work better.
  • chief procurement officer (CPO) - A chief procurement officer (CPO) is an executive title commonly given to the person responsible for the strategic acquisition of goods and services at an organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief reputation officer (CRO) - A chief reputation officer (CRO) is the C-level corporate executive charged with overseeing activities in all areas of an organization that could potentially have an impact on the public perception of that enterprise.
  • Chief Risk Officer - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • Chief Security Officer - A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.
  • Chief Social Scientist (Senior Social Scientist) - A Chief (or Senior) Social Scientist is a sociologist who provides advice to government officials or corporate executives concerning the roles of individuals and institutions in human society.
  • chief storyteller - A chief storyteller is an employee of an organization tasked with wording the company's mission, history and messages about their brand, also known as their story, as they want it to be heard internally and externally.
  • Chief Strategy Officer (CSO) - A chief strategy officer (CSO), or chief strategist, is an executive charged with helping formulate, facilitate and communicate the overarching strategy of an organization, usually a large corporation.
  • Chief Sustainability Officer - A CGO is a Chief Green Officer.
  • Chief Technology Officer (CTO) - The Chief Technology Officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • Chief Transformation Officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
  • chief visionary officer - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • child partition - A child partition is a logical hard drive division in the Microsoft Hyper-V environment that runs an isolated operating system.
  • Children's Online Privacy Protection Act - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
  • Childrens Online Privacy Protection Act - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
  • chiller - A data center chiller is a cooling system used in a data center to remove heat from one element and deposit it into another element.
  • chilling effect - The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.
  • CHIME - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • CHIME (College of Healthcare Information Management Executives) - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • Chinese wall - A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information.
  • Chinese wall method - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
  • chip art - Microchip art is a microscopic non-functioning drawing impressed on the surface of the design mask used in the production of microchip s.
  • chip set - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • chipping rate - Megachips per second (Mcps) is a measure of the speed with which encoding elements, called chips (not to be confused with microchips), are generated in Direct Sequence Spread Spectrum (DSSS) signals.
  • chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • chmod - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • chorus - In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface (MIDI).
  • Chrome Remote Desktop - Chrome Remote Desktop is an extension of the Google Chrome browser that allows a user to remotely see and control another user's desktop through the browser window.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • CHTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • churn - In a general context, churn is a synonym for agitation or turnover.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CI - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • CI - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
  • CICS - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • CIDR - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • CIDR - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIM - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • cinema pulldown 3:2 - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinemagraph - A cinemagraph is an image that combines still photography with active video to create a picture that contains a small moving element while the rest is frozen.
  • cinematography (cinematographer) - Cinematography is a blend of science and art used to capture, manipulate and store moving images for the purpose of creating a motion picture.
  • CIO - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • CipherCloud - CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
  • CIR - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
  • circuit - In electronics, a circuit is a path between two or more points along which an electrical current can be carried.
  • circuit breaker - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • circuit switched data - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
  • circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
  • circular economy - A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • CISA - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • CISC - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Cisco Catalyst Blade Switch 3020 - The Cisco Catalyst Blade Switch 3020 is a switch designed for the Hewlett-Packard (HP) BladeSystem c-Class of blade servers.
  • Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
  • Cisco Certified Internetwork Expert - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Associate - Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.
  • Cisco Certified Network Professional - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Certified Security Professional - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • Cisco Certified Security Professional (CCSP) - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • Cisco Cloud Builder - Cisco Cloud Builder is one of three tracks within the Cisco Cloud Partner Program.
  • Cisco Cloud Partner Program - The Cisco Cloud Partner Program is an initiative by Cisco to help its channel partners enter the cloud computing marketplace.
  • Cisco Discovery Protocol - The Cisco Discovery Protocol is a Layer-2 protocol used to share data about other Cisco equipment that is directly connected nearby.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close