Browse Definitions :

Browse Definitions by Alphabet

CLO - COB

  • cloud portability - Cloud portability is the ability to move applications and data from one cloud computing environment to another with minimal disruption.
  • cloud printing - Cloud printing is a service that lets users print from any device on a network.
  • cloud provider API - A cloud provider API is an application program interface that allows the end user to interact with a cloud provider's service.
  • cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
  • cloud radio access network (C-RAN) - C-RAN, or cloud radio access network, is a centralized, cloud computing-based architecture for radio access networks (RAN) that enables large-scale deployment, collaborative radio technology support and real time virtualization capabilities.
  • cloud robotics - Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.
  • cloud security - Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks.
  • Cloud Security Alliance - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
  • cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
  • Cloud Security Posture Management (CSPM) - Cloud Security Posture Management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
  • cloud seeding - Cloud seeding is a strategy for uploading large amounts of data to a cloud storage service.
  • cloud server - A cloud server is a compute server that has been virtualized, making its resources accessible to users remotely over a network.
  • cloud service latency - Latency greatly affects how usable and enjoyable devices and communications are.
  • cloud service provider (cloud provider) - A cloud service provider, or CSP, is a company that offers some component of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • cloud services reseller - A cloud services reseller is a middleman who facilitates commerce between a cloud service provider and the marketplace.
  • cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
  • cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
  • cloud sprawl - Cloud sprawl is the uncontrolled proliferation of an organization's cloud instances, services or providers.
  • cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
  • cloud storage API - A cloud storage API is an application program interface that connects a locally-based application to a cloud-based storage system, so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud storage infrastructure - Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.
  • cloud storage provider - A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
  • cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cloud testing - Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software applications.
  • cloud uptime - Cloud uptime is the amount of time that cloud systems and cloud services hosted by a cloud provider are up and accessible by end users.
  • cloud washing - Cloud washing is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old service by associating the word "cloud" with it.
  • cloud-in-a-can - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
  • cloud-in-a-can (cloud in a box) - A cloud-in-a-can, also called a cloud in a box, is a marketing term used to describe a turnkey product for private cloud deployments.
  • cloud-integrated storage (CIS) - Cloud-integrated storage (CIS) is a term that refers to a conventional storage-area network (SAN), network-attached storage (NAS) or unified storage system that tiers and/or caches data to cloud-based storage and treats the cloud storage as if it were part of the primary storage system.
  • cloud-oriented architecture (COA) - A cloud-oriented architecture (COA) is a conceptual model encompassing all elements in a cloud environment.
  • Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
  • cloud-to-cloud migration - Cloud-to-cloud migration (C2C) is the movement of physical or virtual machines -- along with their associated configurations, operating systems, applications and storage -- from one cloud computing provider to another.
  • Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • CloudBees - CloudBees is a former platform as a service cloud provider that now focuses on open source continuous integration.
  • cloudbook - A cloudbook is a thin client notebook computer with a browser operating system (OS) and interface.
  • Cloudburst VM escape - Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc.
  • CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
  • Cloudflare - Cloudflare is a content distribution network (CDN) for the delivery of website and app content to users around the globe.
  • CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
  • Cloudify - Cloudify is an open source cloud and network functions virtualization (NFV) orchestration platform.
  • cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
  • CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
  • CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
  • CloudStack - Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services.
  • CloudTrust Protocol (CTP) - The CloudTrust Protocol or CTP is a mechanism that helps cloud service customers request and retrieve standardized inquiries about cloud provider transparency.
  • cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
  • CLR - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • Cluster Labs Pacemaker - Pacemaker is an open source high-availability cluster software developed from a collaboration between Red Hat and Novell.
  • cluster name object (CNO) - A cluster name object (CNO) is an Active Directory computer object linked with the network resource Cluster Name.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • clustered NAS - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • Clustered network attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • Clustered network-attached storage - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • clustered network-attached storage (clustered NAS) - A clustered NAS system is a distributed file system that runs concurrently on multiple NAS nodes.
  • clustered storage - Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability.
  • ClusterHQ Flocker - Management of Docker containers can be facilitated with the use of Flocker software – a framework for moving containers across clusters of servers.
  • CM - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • CM - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • cm - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
  • CMA - A content management application (CMA) is the front end component of a content management system (CMS).
  • CMDB - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
  • CMDSP (Certified Mobile Device Security Professional) - CMDSP (Certified Mobile Device Security Professional) is a certification program offered by the Mobile Resource Group that provides a standardized assurance of competency in the field of mobile security and administration.
  • CMIO - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • CMIS - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • CMM - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • CMO (chief marketing officer) - A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.
  • CMOS - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • CMOS (complementary metal-oxide semiconductor) - CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips.
  • CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons.
  • CMR - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • CMS - CMS (Conversational Monitor System) is a product that comes with IBM's VM/ESA operating system and allows each of many simultaneous interactive users to appear to have an entire mainframe computer at their personal disposal.
  • CMS - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • CMS - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • CMTS - A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network.
  • CMYB - CMYK is a scheme for combining primary pigments.
  • CMYK - CMYK is a scheme for combining primary pigments.
  • CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary pigments.
  • CNA - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • CNR - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • co location - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • co-location - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • co-selling - Co-selling is an approach to product and service distribution in which channel partners are the primary route to market.
  • COA - A chart of accounts (COA) is a financial organizational tool that provides a complete listing of every account in an accounting system.
  • coalition loyalty program - A coalition loyalty program is a loyalty card system that offers incentives to customers of two or more businesses in return for allowing those businesses to collect user data.
  • coarse wavelength division multiplexing - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
  • coaxial antenna - A coaxial antenna is a variant of the dipole antenna, designed for use with an unbalanced feed line.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close