Browse Definitions :

Browse Definitions by Alphabet

CON - CRE

  • control network - A control network is a network of nodes that collectively monitor, sense, and control or enable control of an environment for a particular purpose.
  • control plane (CP) - The control plane is the part of a network that carries signaling traffic and is responsible for routing.
  • control system - A control system is a set of mechanical or electronic devices that regulates other devices or systems by way of control loops.
  • controller - A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities.
  • ControlUp - ControlUp is a monitoring software company that sells tools IT professionals can use to manage, monitor and analyze virtual desktop and application performance.
  • CONUS (continental United States) - Refers to the continental United States.
  • conventional memory - DOS memory, sometimes referred to as conventional memory, refers to the memory -addressing scheme used in the original IBM and compatible PCs.
  • converged data center - A converged data center pre-integrates server, storage and networking hardware with management, hypervisor and operating system platforms, as well as applications and services.
  • converged infrastructure - Converged infrastructure is an approach to data center management that packages compute, networking, servers, storage and virtualization tools on a prequalified turnkey appliance.
  • converged network adapter (CNA) - A converged network adapter (CNA) is a single network interface device that provides the functionality of both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet network interface card (NIC).
  • conversational AI - Conversational AI is a type of artificial intelligence that enables consumers to interact with computer applications the way they would with other humans.
  • conversational commerce (voice commerce) - Conversational commerce is the process of interacting with a brand or making a purchase through a voice assistant or chat application.
  • conversion rate optimization - In online marketing, conversion rate optimization (CRO) is a strategic approach to increasing the percentage of website visitors who follow a desired call to action.
  • convolutional neural network - A convolutional neural network (CNN) is a type of artificial neural network used in image recognition and processing that is specifically designed to process pixel data.
  • Conway's law - Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.
  • cook-off test - A cook-off test is a controlled experiment conducted to determine if or how soon a component, device or system will malfunction because of internally generated heat.
  • cooked data - Cooked data is raw data after it has been processed - that is, extracted, organized, and perhaps analyzed and presented - for further use.
  • cookie - A cookie is information that a website puts on a user's computer.
  • cookie poisoning - Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain unauthorized access to a user's account, open a new account in the user's name or steal the user's information for purposes such as identity theft.
  • cooperative (co-op) - A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members.
  • cooperative games - Cooperative games are games where players work with one and other in order to achieve a common objective.
  • coopetition (co-opetition) - Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.
  • Coordinated Universal Time (UTC, GMT, CUT) - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
  • coordinates - Coordinates are distances or angles, represented by numbers, that uniquely identify points on surfaces of two dimensions (2D) or in space of three dimensions (3D).
  • COPE (corporate-owned, personally enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • COPPA (Children's Online Privacy Protection Act ) - The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that imposes specific requirements on operators of websites and online services to protect the privacy of children under 13.
  • coprocessor - A coprocessor is a special set of circuits in a microprocessor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits could perform the same task.
  • copy data - Copy data is the electronic data that is created as a result of data protection functions like backups, snapshots and disaster recovery.
  • copy data management (CDM) - Copy data management (CDM) is an approach to reducing storage consumption that involves eliminating the unnecessary duplication of production data.
  • copyleft - Copyleft is the idea and the specific stipulation when distributing software that the user will be able to copy it freely, examine and modify the source code, and redistribute the software to others (free or priced) as long as the redistributed software is also passed along with the copyleft stipulation.
  • copypasta - Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.
  • copyright - Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.
  • cord cutting - Cord cutting, in a telecommunications context, is the practice of stopping a cable or  satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) service.
  • core banking system - A core banking system is the software used to support a bank’s most common transactions.
  • core competency (core competencies) - For any organization, its core competency refers to the capabilities, knowledge, skills and resources that constitute its 'defining strength.
  • core dump - A core dump is the printing or the copying to a more permanent medium (such as a hard disk) the contents of random access memory (RAM) at one moment in time.
  • core HR (core human resources) - Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and the software used to manage basic HR processes.
  • CoreOS rkt - CoreOS rkt (pronounced rocket) is a containerization engine to run application workloads in isolation from the underlying infrastructure.
  • Cornerstone OnDemand - Cornerstone OnDemand is a vendor of cloud-based learning and talent management software.
  • corollary - A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.
  • corporate account manager (CAM) - In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR.
  • corporate activism - Corporate activism is a public stance taken by a large enterprise to positively impact social change or legislation.
  • corporate culture - Corporate culture is the collection of values, beliefs, ethics and attitudes that characterize an organization and guide its practices.
  • corporate culture model - A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.
  • corporate division - A corporate division, also known as a business division, is a discrete part of a company that may operate under the same name and legal responsibility or as a separate corporate and legal entity under another business name.
  • corporate email policy - A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment.
  • corporate executive board - A corporate executive board, or board of directors, oversees activities and strategic planning and decision making in an organization.
  • corporate governance - Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.
  • corporate mobility policy - A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network.
  • corporate performance - Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.
  • corporate performance management (CPM) - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
  • corporate social responsibility (CSR) - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
  • corporate VM (corporate virtual machine) - A corporate VM (corporate virtual machine) is a virtual computing environment (VM) that is allocated to an end user for business use.
  • corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
  • corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • correlated subquery - A correlated subquery is a SQL query that depends on values executed by the outer query in order to complete.
  • correlation - Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in relation to each other.
  • correlation coefficient - A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another.
  • correlation engine - A correlation engine is a software application that programmatically understands relationships.
  • cosine wave - A cosine wave is a signal waveform with a shape identical to that of a sine wave, except each point on the cosine wave occurs exactly 1/4 cycle earlier than the corresponding point on the sine wave.
  • Cosmos - Cosmos is an open source, evolving, .
  • COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
  • COSO Framework - The COSO Framework is a system used to establish internal controls to be integrated into business processes.
  • cost containment - Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.
  • cost management - Cost management is the process of planning and controlling the budget of a business.
  • cost of goods sold (COGS) - Cost of goods sold (COGS) is the total of the costs directly attributable to producing goods.
  • cost per engagement (CPE) - Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when users interact with their campaign in some way.
  • cost per impression - Cost per Impression (CPI) is a business efficiency measure common to advertising in paper and web-based media.
  • cost per like (CPL) - Cost per like (CPL) is the amount a company pays to receive a new fan for a Facebook page, through paid advertising and sometimes through earned media.
  • cost per sale (CPS) - The cost per sale (CPS), also known as the pay per sale, is a metric used by advertising teams to determine the amount of money paid for every sale generated by a specific advertisement.
  • cost price - A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.
  • cost-benefit analysis (CBA) - Cost-benefit analysis (CBA) is an analytical tool for assessing and the pros and cons of moving forward with a business proposal.
  • cost-benefit analysis software - Cost-benefit analysis software is a computer program or suite that assists personnel in the complex task of determining whether or not a proposed plan or project will pay off.
  • COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • CouchDB - CouchDB is an open source document-oriented database based on common web standards.
  • coulomb - The coulomb (symbolized C) is the standard unit of electric charge in the International System of Units (SI).
  • coulomb per centimeter squared - The coulomb per centimeter squared (symbolized C/cm 2) is a unit of electric flux density.
  • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol based on the U.
  • counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
  • counterintelligence - Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions.
  • countermeasure - A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.
  • coupling - Coupling is the act of joining two things together.
  • courseware - Courseware is educational material intended as kits for teachers or trainers or as tutorials for students, usually packaged for use with a computer.
  • COVID-19 Glossary for Employers and HR Managers - We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.
  • cow power (biogas) - Cow power is a term for the conversion of manure to usable energy.
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • coworking - Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.
  • CPE credit - Continuing professional education, or CPE, credit is a term referring to the points professionals receive for participating in specialized training in IT and other fields.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CPI - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • CPQ software (configure price quote software) - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
  • CPRI (Common Public Radio Interface) - CPRI (Common Public Radio Interface) is a specification for wireless communication networks in the interface between radio equipment and radio equipment control.
  • CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
  • CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • CrashPlan - Code42 Software's CrashPlan data protection software comes in home, small business and enterprise versions.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • CRC-4 (Cyclic Redundancy Check 4) - CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking -- a method of checking for errors in transmitted data -- that is used on E1 trunk lines.
  • Creative Commons - Creative Commons is a nonprofit organization that offers copyright licenses for digital work.
  • creative destruction - Creative destruction is a process through which something new brings about the demise of whatever existed before it.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close