Browse Definitions :

Browse Definitions by Alphabet

CLE - CLO

  • clear channel - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • CLEC - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLI - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • CLI - Part of Microsoft's .
  • click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • Click Fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
  • click to talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • Click to Tweet - Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.
  • click tracking - Click tracking is a method used by companies to observe and analyze how many viewers visit a website, and digest its content, over a specific period of time.
  • click-for-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-through rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click-to-dial - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • clickbait - Clickbait is a negative term that describes links to frivolous content whose only goal is to improve the original web page's clickthrough rate.
  • clickbait title - A clickbait title is a title for online content that is designed to engage the reader and tempt them into clicking through to the associated content.
  • clickjacking - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickstream analytics - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickthrough rate - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • client - A client is the requesting program or user in a client/server relationship.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
  • client hypervisor - A client hypervisor is a hypervisor that resides on a laptop, PC or other client device.
  • client solid state drive - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client solid state drive (SSD) - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client-based virtual machine - A client-based virtual machine is an instance of an operating system that is managed centrally on a server and executed locally on a client device.
  • client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
  • client-server network - A client-server network is a communications model in which multiple client programs share the services of a common server program.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
  • clinical business intelligence - Clinical business intelligence is the application of data analytics to medical records through various systems to improve medical care.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • Clinical Data Repository - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • Clinical Data Repository/Health Data Repository (CHDR) - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • clinical decision support system - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical document (HL7 clinical document) - A clinical document is a written, printed or electronic record that provides evidence of medical care.
  • Clinical Document Architecture - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • Clipper - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
  • cloak of invisibility - A cloak of invisibility is a method of rendering physical objects undetectable or invisible.
  • cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
  • clock gating - Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits.
  • clock speed - In a computer, clock speed refers to the number of pulses per second generated by an oscillator that sets the tempo for the processor.
  • clocks or cycles per instruction - For a given font, cpi (characters per inch) is the number of typographic character that will fit on each inch of a printed line.
  • Clojure programming language - The Clojure programming language, used in the Lisp programming language, is a high-level, dynamic functional programming language.
  • clone - A clone is an identical copy of something and is a term that first became familiar to the public from the biosciences.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • Clos network - A Clos network is a type of non-blocking, multistage switching architecture that reduces the number of ports required in an interconnected fabric.
  • closed caption - Closed captions are a text version of the spoken part of a television, movie, or computer presentation.
  • closed captions - Closed captions are a text version of the spoken part of a television, movie, or computer presentation.
  • closed circuit television - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed circuit television - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • closed loop control system - A closed loop control system is a set of mechanical or electronic devices that automatically regulates a process variable to a desired state or set point without human interaction.
  • closed loop manufacturing resource planning - Closed loop manufacturing resource planning, also known as closed loop MRP (CLMRP), is a manufacturing resource planning model that includes returned products in the supply chain.
  • closed loop manufacturing resource planning (MRP) - Closed loop manufacturing resource planning, also known as closed loop MRP (CLMRP), is a manufacturing resource planning model that includes returned products in the supply chain.
  • closed loop reporting - Closed loop reporting (CLR) is a system in which data and information collected by marketing and sales professionals is made available to both teams.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud adaptor - A cloud adaptor is a software utility that controls the transfer of information between local back office systems and a cloud provider.
  • cloud agent - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
  • cloud aggregator - A cloud aggregator is a type of cloud broker that packages and integrates multiple cloud computing services into one or more composite services.
  • cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud architect - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy.
  • cloud archive - Cloud archiving is a storage procurement model in which data that is no longer accessed on a regular basis is managed and backed up remotely by a cloud storage service provider.
  • cloud automation - Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.
  • cloud backup - Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.
  • cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
  • cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
  • cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
  • cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
  • cloud cartography - Cloud cartography is a scheme for pinpointing the physical locations of Web servers hosted on a third-party cloud computing service.
  • cloud collaboration - Cloud collaboration is a system of communication that enables employees to work together on a project that is hosted in the cloud, can be accessed at any time and can be edited by multiple users at once.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
  • Cloud Computing (quiz) - Test yourself.
  • cloud computing maturity model (CCMM) - A Cloud Computing Maturity Model (CCMM) is a model that defines and analyzes the progress of an organization’s ability to deliver cloud services in key areas such as capabilities, domains, maturity and adoption.
  • cloud configuration - Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate.
  • cloud content management - Cloud content management is the process of collecting, delivering, retrieving, governing and managing information within a cloud-based hosting environment.
  • cloud controller - A cloud controller is a device that moves data between on-premises storage and the cloud.
  • Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
  • cloud cost analysis tool - A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations.
  • Cloud Cruiser - Cloud Cruiser is a vendor that offers cost-analtyics software for hybrid cloud and multi-cloud computing environments.
  • cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
  • Cloud Data Management Interface - Cloud Data Management Interface (CDMI) is a Storage Networking Industry Association (SNIA) industry standard that defines the interface that applications will use to create, retrieve, update and delete data elements from the cloud.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close