Browse Definitions :

Browse Definitions by Alphabet

CIW - CLO

  • CIW - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • CIW - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • CKO - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • clan culture - A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values.
  • Clarus - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • Class of Service - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
  • classification of data - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • classless inter domain routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • Classless Inter-Domain Routing - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • Classless Inter-Domain Routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • classless interdomain routing - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CLC - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean computing - Clean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage.
  • clean desk policy - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity is electrical power that is free from voltage spikes and drops.
  • clean install - A clean install is a software installation in which any previous version is removed.
  • clean room - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • clean room design - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean room technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean tech - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology (clean tech) - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • cleanroom - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • cleanroom technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clear 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear box - White box testing is a software testing methodology in which the code structure is known and understood by the tester.
  • clear channel - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • CLEC - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLI - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • CLI - Part of Microsoft's .
  • click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • Click Fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
  • click to talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • Click to Tweet - Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.
  • click tracking - Click tracking is a method used by companies to observe and analyze how many viewers visit a website, and digest its content, over a specific period of time.
  • click-for-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-through rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click-to-callback - Click-to-callback is a Web-based customer relationship management (CRM) technology that enables users browsing a company's Web site to leave a phone number where a company representative can call them back with more information.
  • click-to-dial - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • clickbait - Clickbait is a negative term that describes links to frivolous content whose only goal is to improve the original web page's clickthrough rate.
  • clickbait title - A clickbait title is a title for online content that is designed to engage the reader and tempt them into clicking through to the associated content.
  • clickjacking - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clicks and mortar - Clicks and mortar, sometimes seen as clicks-and-mortar or clicks and bricks, is a type of omnichannel business model that takes advantage of both online and offline operations.
  • clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickstream analytics - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickthrough rate - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • client - A client is the requesting program or user in a client/server relationship.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
  • client hypervisor - A client hypervisor is a hypervisor that resides on a laptop, PC or other client device.
  • client solid state drive - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client solid state drive (SSD) - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client-based virtual machine - A client-based virtual machine is an instance of an operating system that is managed centrally on a server and executed locally on a client device.
  • client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
  • client-server network - A client-server network is a communications model in which multiple client programs share the services of a common server program.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
  • clinical business intelligence - Clinical business intelligence is the application of data analytics to medical records through various systems to improve medical care.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • Clinical Data Repository - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • Clinical Data Repository/Health Data Repository (CHDR) - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • clinical decision support system - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical document (HL7 clinical document) - A clinical document is a written, printed or electronic record that provides evidence of medical care.
  • Clinical Document Architecture - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • Clipper - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
  • cloak of invisibility - A cloak of invisibility is a method of rendering physical objects undetectable or invisible.
  • cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
  • clock cycle - In a computer, the clock cycle is the time between two adjacent pulses of the oscillator that sets the tempo of the computer processor.
  • clock gating - Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits.
  • clock speed - In a computer, clock speed refers to the number of pulses per second generated by an oscillator that sets the tempo for the processor.
  • clocks or cycles per instruction - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Clojure programming language - The Clojure programming language, used in the Lisp programming language, is a high-level, dynamic functional programming language.
  • clone - A clone is an identical copy of something and is a term that first became familiar to the public from the biosciences.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close