Browse Definitions :

Browse Definitions by Alphabet

CIS - CLI

  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco HyperFlex - HyperFlex systems combine software-defined storage and data services software with Cisco UCS (unified computing system), a converged infrastructure system that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • Cisco Identity Services Engine - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • Cisco Information Security Specialist - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • Cisco Integrated Service Routers Generation 2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches.
  • Cisco Jasper - Cisco Jasper is a branch of the networking company that provides a cloud-based software platform for businesses looking to provide cloud services.
  • Cisco LISP (Location Identifier Separation Protocol) - LISP (Location Identifier Separation Protocol) is a routing and addressing architecture developed by Cisco Systems.
  • Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
  • CISP PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • CISP-PCI - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • CISPA - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • CISS - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • CISSP - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • citizen data scientist - A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational background in data analytics (DA) or business intelligence (BI).
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • citizen relationship management - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • Citizen's Band Radio - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citizen's Band Radio (CB) - The Citizen's Band (CB) Radio Service, also known simply as CB, is a public, two-way personal radio service.
  • Citrix - Citrix is an American corporation that produces software designed to facilitate secure access to applications and content.
  • Citrix App Layering (formerly Citrix AppDisk) - Citrix App Layering, formerly Citrix AppDisk, is a tool that delivers applications in layers independently from the virtual desktop operating system.
  • Citrix AppDNA - Citrix AppDNA is an application testing and management technology for XenApp and XenDesktop that analyzes virtual applications' compatibility with specific operating systems and configurations.
  • Citrix certfication - Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.
  • Citrix Cloud - Citrix Cloud is a workspace management tool IT can use to deliver resources, including virtual desktops and apps, to users from a public or private cloud, on-premises deployment, or all three.
  • Citrix Cloud Provider Program - The Citrix Cloud Provider Program is an invitation-only partner program for cloud computing service providers.
  • Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
  • Citrix Director - Citrix Director is a management console in XenDesktop and XenApp that allows IT administrators to monitor virtual desktop and application deployments, including user and infrastructure tracking.
  • Citrix FlexCast - Citrix FlexCast is a delivery technology that allows an IT administrator to personalize virtual desktops to meet the performance, security and flexibility requirements of end users.
  • Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of graphics acceleration technologies that help optimize the delivery of resource-intensive virtual applications on a company's XenDesktop and XenApp platforms.
  • Citrix Machine Creation Services (Citrix MCS) - Citrix Machine Creation Services is a desktop image delivery feature in XenDesktop used to configure and distribute virtual desktops to end users.
  • Citrix Provisioning Services (Citrix PVS) - Citrix Provisioning Services (Citrix PVS) is a software-streaming technology that allows administrators to patch or reconfigure an entire deployment of virtual desktops from one shared master image.
  • Citrix Receiver - Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.
  • Citrix Secure Browser - Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.
  • Citrix Solution Advisor - Citrix Solution Advisor is Citrix Systems Inc.
  • Citrix StoreFront - Citrix StoreFront is an enterprise application store that acts as a central location for users to access XenDesktop and XenApp virtual desktops and applications from their mobile devices, laptops, Windows PCs or Macs.
  • Citrix User Profile Management - Citrix User Profile Management is a tool in the company's XenDesktop and XenApp desktop virtualization platform that allows IT administrators to deliver employees' personal data and settings to physical and virtual endpoints.
  • Citrix VDI-in-a-Box - Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-sized businesses.
  • Citrix Workflow Studio - Citrix Workflow Studio is a workflow automation software product.
  • Citrix Workspace Suite - Citrix Workspace Suite combines Citrix products including XenApp, XenDesktop, XenMobile, ShareFile Enterprise and NetScaler Gateway into a single platform IT administrators can use to deliver desktops, data, applications and services to users.
  • Citrix WorkspacePod - Citrix WorkspacePod is a converged infrastructure product that de-centralizes storage to provide scalable and consistent mobile workspace and application delivery.
  • Citrix Worx - Citrix Worx is a line of certified mobile applications for the enterprise.
  • Citrix X1 Mouse - The Citrix X1 Mouse is a small Bluetooth device that allows users to navigate Windows virtual desktops and applications on mobile devices.
  • Citrix XenApp - Citrix XenApp, now part of Citrix Virtual Apps and Desktops, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
  • Citrix XenClient - Citrix XenClient is a Type 1 (or bare metal) client hypervisor from software provider Citrix Systems.
  • Citrix XenDesktop - Citrix XenDesktop is a desktop virtualization product from software vendor Citrix Systems.
  • Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
  • Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
  • CIW - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • CIW - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • CKO - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • clan culture - A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values.
  • Clarus - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • Class of Service - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
  • classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
  • classification of data - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • classless inter domain routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • Classless Inter-Domain Routing - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • Classless Inter-Domain Routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • classless interdomain routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CLC - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean desk policy - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity is electrical power that is free from voltage spikes and drops.
  • clean install - A clean install is a software installation in which any previous version is removed.
  • clean room - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • clean room design - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean room technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean tech - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology (clean tech) - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • cleanroom - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • cleanroom technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clear 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear box - White box testing is a software testing methodology in which the code structure is known and understood by the tester.
  • clear channel - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • CLEC - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLI - Part of Microsoft's .
  • CLI - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • Click Fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close