Browse Definitions by Alphabet

  • What is computer numerical control (CNC)? - Computer numerical control (CNC) is a manufacturing method that automates the control, movement and precision of machine tools through the use of preprogrammed computer software, which is embedded inside the tools.
  • What is computer room air conditioning (CRAC)? CRAC vs. CRAH unit differences? - A computer room air conditioning (CRAC) unit is a device that monitors and maintains the temperature, air distribution and humidity in a data center, network or server room.
  • What is computer-aided diagnosis? - Computer-aided diagnosis is the use of sophisticated machine learning and deep learning techniques to help healthcare providers recognize and diagnose medical conditions in medical image data.
  • What is computer-aided software engineering (CASE)? - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools and methods used in software development and business process modeling.
  • What is computerized physician order entry (CPOE)? - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional using a computer application to electronically enter and send medication orders.
  • What is COMSEC (communications security)? - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred.
  • What is conduct risk? - Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.
  • What is confidential computing? - Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use.
  • What is configuration management? A comprehensive guide - Configuration management, or CM, is a governance and systems engineering process used to track and control IT resources, services and applications across an enterprise.
  • What is contact center as a service (CCaaS)? - Contact center as a service (CCaaS) is a framework that combines contact center hosting principles and cloud-based contact center infrastructure.
  • What is contact center infrastructure? - A contact center infrastructure (CCI) is a framework composed of the physical and virtual resources that a contact or call center facility needs to operate effectively.
  • What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
  • What is continuous data protection (CDP)? - Continuous data protection (CDP), also known as 'continuous backup,' is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • What is continuous deployment (CD)? - Continuous deployment (CD) is a strategy for software development and releases in which every code change is automatically run through a pipeline of tests and inspections before being pushed into production.
  • What is continuous integration (CI)? - Continuous integration (CI) is a software development practice in which frequent and incremental changes are routinely added (integrated) to the complete codebase immediately after the changes and additions are tested and validated.
  • What is continuous intelligence? - Continuous intelligence (CI) is a data analysis process that delivers real-time analytics and insights as a part of ongoing business operations.
  • What is continuous learning, and what are its benefits? - Continuous learning is the ongoing expansion of knowledge and skill sets.
  • What is continuous modeling (data center continuous modeling)? - Continuous modeling is an approach to data center management that supplements infrastructure management (DCIM) tools with engineering simulation tools.
  • What is continuous monitoring? - Continuous monitoring constantly observes the performance and operation of IT assets to help reduce risk and improve uptime instead of taking a point-in-time snapshot of a device, network or application.
  • What is contract lifecycle management? - Contract lifecycle management (CLM) is a systematic approach to managing a business contract at each stage.
  • What is conversational AI (conversational artificial intelligence)? - Conversational AI, also known as conversational artificial intelligence, is a type of AI that enables computers to understand, process and generate human language.
  • What is conversational commerce? - Conversational commerce integrates messaging and communication tools into the online buying process.
  • What is COPE (corporate-owned, personally enabled)? - COPE (corporate-owned, personally enabled) is a mobile device management model that allows employees to use corporate-owned mobile devices for specific types of personal use.
  • What is core HR (core human resources)? - Core HR (core human resources) is an umbrella term that refers to the essential, mandatory and fundamental tasks and functions of an organization's HR department as it manages the employee lifecycle and develops human capital.
  • What is corporate governance? - Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.
  • What is corporate performance management (CPM)? - Corporate performance management (CPM) encompasses the processes and methodologies used to align an organization's strategies and goals to its plans and actions as a business.
  • What is corporate social responsibility (CSR)? - Corporate social responsibility (CSR) is a strategy undertaken by companies to not just grow profits, but also to take an active and positive social role in the world around them.
  • What is cost management? Definition, steps and benefits - Cost management is the process of planning and controlling a business budget.
  • What is cost of goods sold (COGS)? - Cost of goods sold (COGS) is the total of the costs directly attributable to producing things that can be sold.
  • What is cost per sale (pay per sale)? - Cost per sale (CPS), also known as pay per sale (PPS), is a performance-based marketing metric that calculates the cost a business incurs for each successful sale generated.
  • What is counterintelligence? - Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary's knowledge collection activities or attempts to cause harm through sabotage or other actions.
  • What is CPQ software (configure price quote software)? - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
  • What is crisis communication? - Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event.
  • What is CRM (customer relationship management)? - CRM (customer relationship management) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • What is cross-docking? - Cross-docking is the practice of unloading goods from inbound delivery vehicles and loading them directly onto outbound vehicles.
  • What is crowdsourcing? - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • What is crypto ransomware? - Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them.
  • What is crypto-agility? - Crypto-agility, or cryptographic agility, is the ability of an organization to efficiently and rapidly change cryptographic algorithms, protocols or primitives in response to emerging threats, vulnerabilities or regulatory requirements.
  • What is cryptography? - Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is intended can read and process it.
  • What is cryptology? - Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.
  • What is Current Procedural Terminology (CPT) code? - Current Procedural Terminology (CPT) is a medical code set that enables physicians and other healthcare providers to describe and report the medical, surgical, and diagnostic procedures and services they perform to government and private payers, researchers and other interested parties.
  • What is customer data integration (CDI)? - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • What is customer experience (CX) and why is it important? - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
  • What is customer experience management (CXM)? Ultimate guide - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • What is customer insight (consumer insight)? - Customer insight, or consumer insight, is the understanding and interpretation of customer data, behaviors and feedback into conclusions that can be used to drive actions that improve product development and customer support.
  • What is customer intelligence (CI) and how does it help business? - Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources to gain insights about customer needs, motivations and behaviors.
  • What is customer profiling? - Customer profiling is the detailed, systematic process of constructing a clear portrait of a company's ideal customer by gathering and analyzing information about their demographic, psychographic and behavioral attributes.
  • What is customer segmentation? - Customer segmentation is the practice of dividing a customer base into groups of individuals that have similar characteristics relevant to marketing, such as age, gender, interests and spending habits.
  • What is customer self-service? - Customer self-service is digital support that lets end users access information and perform routine tasks without requiring the assistance of live agents or representatives.
  • What is cyber attribution? - Cyber attribution is the process of tracking and identifying the perpetrator of a cyberattack or other cyber operation.
  • What is cyber extortion? - Cyber extortion is a crime involving an attack or threat of an attack, coupled with a demand for money or some other response, in return for stopping an attack or preventing one from happening.
  • What is cyber hijacking? - Cyber hijacking, or computer hijacking, is a type of network security attack in which the threat actor takes control of computer systems, software programs and network communications.
  • What is cyber hygiene and why is it important? - Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the health and security of users, devices, networks and data.
  • What is cyber insurance, and why is it important? - Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract a business or other organization can purchase to reduce the financial risks associated with doing business online.
  • What is cyber resilience? - Cyber resilience is the ability of a computing system to identify, respond to and recover quickly from a security incident.
  • What is cybercrime and how can you prevent it? - Cybercrime is any criminal activity that involves a computer, network or networked device.
  • What is cybersecurity? - Cybersecurity is the practice of protecting systems, networks and data from digital threats.
  • What is cyberstalking and how to prevent it? - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • What is the Centers for Disease Control and Prevention (CDC)? - The Centers for Disease Control and Prevention (CDC) is the United States' national public health agency.
  • What is the CIA triad (confidentiality, integrity and availability)? - The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization.
  • What is the Coalition for Content Provenance and Authenticity (C2PA)? - The Coalition for Content Provenance and Authenticity (C2PA) is a project formed in 2021 as a response to legitimate societal questions about media origins and digital misinformation.
  • What is the Coalition for Secure AI (CoSAI)? - Coalition for Secure AI (CoSAI) is an open source initiative to enhance artificial intelligence's security.
  • What is the Common Information Model (CIM)? - The Common Information Model (CIM) is a computer industry standard that defines device and application characteristics so system administrators and management programs can control devices and applications from different manufacturers.
  • What is the consumerization of IT (IT consumerization)? - The consumerization of IT refers to how software and hardware products designed for personal use have migrated into the enterprise and are used for work purposes.
  • What is the Cybersecurity Information Sharing Act (CISA)? - The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.