Browse Definitions :

Browse Definitions by Alphabet

CHI - CIT

  • chipping rate - Megachips per second (Mcps) is a measure of the speed with which encoding elements, called chips (not to be confused with microchips), are generated in Direct Sequence Spread Spectrum (DSSS) signals.
  • chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • chiral fiber - Chiral fiber is a specialized optical fiber medium with its core twisted into a helical shape.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • chmod - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • chmod (change mode) - In a UNIX-based operating system, chmod (change mode) is a command used by a file owner or administrator to change the definition of access permissions to a file or set of files.
  • choreography - Choreography, in a Web services context, refers to specifications for how messages should flow among diverse, interconnected components and applications to ensure optimum interoperability.
  • chorus - In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface (MIDI).
  • Chrome Remote Desktop - Chrome Remote Desktop is an extension of the Google Chrome browser that allows a user to remotely see and control another user's desktop through the browser window.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • CHTML - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • chucking - In computer and telephone use, chucking is the process of discarding a small piece of hardware by violent means, such as hurling it out a window, against a wall, or into a body of water.
  • churn - In a general context, churn is a synonym for agitation or turnover.
  • churn (agitation or turnover) - In a general context, churn is a synonym for agitation or turnover.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CI - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
  • CI - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • CICS - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • CIDR - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • CIDR - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • CIFT - CIFT (Center for Innovative Financial Technology) is a research facility dedicated to the study of new technologies in the financial services sector.
  • CIM - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • cinema pulldown 3:2 - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • cinemagraph - A cinemagraph is an image that combines still photography with active video to create a picture that contains a small moving element while the rest is frozen.
  • cinematography (cinematographer) - Cinematography is a blend of science and art used to capture, manipulate and store moving images for the purpose of creating a motion picture.
  • CIO - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptology, the discipline concerned with the study of cryptographic algorithms, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining - Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).
  • CipherCloud - CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • ciphertext feedback (CFB) - Ciphertext feedback (CFB) is a mode of operation for a block cipher.
  • CIR - committed information rate.
  • circuit - In electronics, a circuit is a path between two or more points along which an electrical current can be carried.
  • circuit bending - Circuit bending is the practice of modifying existing electronics items, most often toys, to create other items, usually musical instruments.
  • circuit breaker - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • circuit switched data - Circuit switched data (CSD) was the original form of data transmission developed for TDMA-based networks, typically obtaining speeds up to 9.
  • circuit-switched - Circuit-switched is a type of network in which a physical path is obtained for and dedicated to a single connection between two end-points in the network for the duration of the connection.
  • circular economy - A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • circular mil - The circular mil is a unit of area used especially when denoting the cross-sectional size of a wire or cable.
  • CISA - Certified Information Systems Auditor is a credential that demonstrates an IT professional's ability to assess risk and institute technology controls.
  • CISC - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • CISC (complex instruction set computer or computing) - The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way.
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Carrier Sensitive Routing - Carrier Sensitive Routing (CSR) is a network solution that allows Voice over Internet Protocol (VoIP) subscribers to determine and manipulate the routing of individual calls.
  • Cisco Catalyst Blade Switch 3020 - The Cisco Catalyst Blade Switch 3020 is a switch designed for the Hewlett-Packard (HP) BladeSystem c-Class of blade servers.
  • Cisco Certified Internetwork Expert - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Associate - Cisco Certified Network Associaten (CCNA) is an entry-level certification for the Cisco certified professional program.
  • Cisco Certified Network Professional - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Certified Security Professional - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • Cisco Certified Security Professional (CCSP) - A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management.
  • Cisco Cloud Builder - Cisco Cloud Builder is one of three tracks within the Cisco Cloud Partner Program.
  • Cisco Cloud Partner Program - The Cisco Cloud Partner Program is an initiative by Cisco to help its channel partners enter the cloud computing marketplace.
  • Cisco Discovery Protocol - The Cisco Discovery Protocol is a Layer-2 protocol used to share data about other Cisco equipment that is directly connected nearby.
  • Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • Cisco Identity Services Engine - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • Cisco Information Security Specialist - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • Cisco Information Security Specialist (CISS) - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • Cisco Integrated Service Routers Generation 2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • Cisco Integrated Service Routers Generation 2 (ISR G2) - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on most Cisco Systems routers and switches.
  • Cisco Jasper - Cisco Jasper is a branch of the networking company that provides a cloud-based software platform for businesses looking to provide cloud services.
  • Cisco LISP (Location Identifier Separation Protocol) - LISP (Location Identifier Separation Protocol) is a routing and addressing architecture developed by Cisco Systems.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a cloud-based collaboration suite comprised of Webex Meetings, Webex Teams and Webex Devices.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISP PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • CISP-PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • CISP-PCI (Cardholder Information Security Program - Payment Card Industry Data Security Standard) - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • CISPA - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • CISS - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • CISSP - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • citizen data scientist - A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational background in data analytics (DA) or business intelligence (BI).
  • citizen development - Citizen development is a business trend that encourages employees to experiment with low-code no-code (LCNC) software development platforms.
  • citizen journalist - A citizen journalist is an amateur journalist who usually publishes online by using a blog or community Web site.
  • citizen relationship management - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • Citizen's Band Radio - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citizen's Band Radio (CB) - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citrix - Citrix is an American corporation that produces software designed to facilitate secure access to applications and content.
  • Citrix App Layering (formerly Citrix AppDisk) - Citrix App Layering, formerly Citrix AppDisk, is a tool that delivers applications in layers independently from the virtual desktop operating system.
  • Citrix AppDNA - Citrix AppDNA is an application testing and management technology for XenApp and XenDesktop that analyzes virtual applications' compatibility with specific operating systems and configurations.
  • Citrix certfication - Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.
  • Citrix Cloud - Citrix Cloud is a workspace management tool IT can use to deliver resources, including virtual desktops and apps, to users from a public or private cloud, on-premises deployment, or all three.
  • Citrix Cloud Provider Program - The Citrix Cloud Provider Program is an invitation-only partner program for cloud computing service providers.
  • Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
  • Citrix Director - Citrix Director is a management console in XenDesktop and XenApp that allows IT administrators to monitor virtual desktop and application deployments, including user and infrastructure tracking.
  • Citrix FlexCast - Citrix FlexCast is a delivery technology that allows an IT administrator to personalize virtual desktops to meet the performance, security and flexibility requirements of end users.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close