Browse Definitions :

Browse Definitions by Alphabet

CIT - CLI

  • Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of remote display and graphics acceleration technologies designed to optimize the user experience of resource-intensive virtual applications on the XenDesktop and XenApp platforms.
  • Citrix Machine Creation Services (Citrix MCS) - Citrix Machine Creation Services is a desktop image delivery feature in XenDesktop used to configure and distribute virtual desktops to end users.
  • Citrix Provisioning Services (Citrix PVS) - Citrix Provisioning Services (Citrix PVS) is a software-streaming technology that allows administrators to patch or reconfigure an entire deployment of virtual desktops from one shared master image.
  • Citrix Receiver - Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.
  • Citrix Secure Browser - Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.
  • Citrix Solution Advisor - Citrix Solution Advisor is Citrix Systems Inc.
  • Citrix StoreFront - Citrix StoreFront is an enterprise application store that acts as a central location for users to access XenDesktop and XenApp virtual desktops and applications from their mobile devices, laptops, Windows PCs or Macs.
  • Citrix User Profile Management - Citrix User Profile Management is a tool in the company's XenDesktop and XenApp desktop virtualization platform that allows IT administrators to deliver employees' personal data and settings to physical and virtual endpoints.
  • Citrix VDI-in-a-Box - Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-sized businesses.
  • Citrix Workflow Studio - Citrix Workflow Studio is a workflow automation software product.
  • Citrix Workspace Suite - Citrix Workspace Suite combines Citrix products including XenApp, XenDesktop, XenMobile, ShareFile Enterprise and NetScaler Gateway into a single platform IT administrators can use to deliver desktops, data, applications and services to users.
  • Citrix WorkspacePod - Citrix WorkspacePod is a converged infrastructure product that de-centralizes storage to provide scalable and consistent mobile workspace and application delivery.
  • Citrix Worx - Citrix Worx is a line of certified mobile applications for the enterprise.
  • Citrix X1 Mouse - The Citrix X1 Mouse is a small Bluetooth device that allows users to navigate Windows virtual desktops and applications on mobile devices.
  • Citrix XenApp - Citrix XenApp is an application virtualization product that extends Microsoft Remote Desktop Session Host desktop sessions and apps to users via the Citrix HDX protocol.
  • Citrix XenClient - Citrix XenClient is a Type 1 (or bare metal) client hypervisor from software provider Citrix Systems.
  • Citrix XenDesktop - Citrix XenDesktop is a desktop virtualization product from software vendor Citrix Systems.
  • Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
  • Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
  • CIW - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • CIW - Certified Internet Webmaster (CIW) is a set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce.
  • CIW (Computer Intensive Workload) - In IBM's AS/400 and iSeries line of computers, CIW (Computer Intensive Workload) is a measure that can be used to compare the workload-handling capability of different computer models when running application programs in which most of the computer processor work is done within the applications.
  • CKO - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • clan culture - A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values.
  • Clarus - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • classical computing - Classical computing is the typical type of binary data processing in traditional types of processors including x86, ARM and other bit based computer systems.
  • classification of data - Data classification is the process of organizing data into categories for its most effective and efficient use.
  • classless inter domain routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • Classless Inter-Domain Routing - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • Classless Inter-Domain Routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • classless interdomain routing - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • Claude Shannon - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
  • clawback - A clawback is a contractual provision under which money that’s already been paid out must be returned to an employer or another type of organization under certain conditions.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean computing - Clean computing is when an organization's manufacture, use and disposal of IT equipment does not produce any harmful waste at any stage.
  • clean desk policy - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity is electrical power that is free from voltage spikes and drops.
  • clean install - A clean install is a software installation in which any previous version is removed.
  • clean room - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • clean room design - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean room technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean room technique (clean room design) - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clean tech - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • clean technology (clean tech) - Clean technology (clean tech) is a general term used to describe products, processes or services that reduce waste and require as few non-renewable resources as possible.
  • cleanroom - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • cleanroom technique - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • clear 64 - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear box - A white box or clear box is a device, program or system whose internal workings are well understood.
  • clear channel - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • clear zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • CLEC - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • CLI - A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • click - In Web advertising, a click is an instance of a user pressing down (clicking) on a mouse button in an ad space.
  • click and collect - Click and collect is a hybrid e-commerce model in which people purchase or select items online and pick them up in-store or at a centralized collection point.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
  • click to talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • Click to Tweet - Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.
  • click tracking - Click tracking is a method used by companies to observe and analyze how many viewers visit a website, and digest its content, over a specific period of time.
  • click-for-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-through rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click-to-callback - Click-to-callback is a Web-based customer relationship management (CRM) technology that enables users browsing a company's Web site to leave a phone number where a company representative can call them back with more information.
  • click-to-dial - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • clickbait - Clickbait is a negative term that describes links to frivolous content whose only goal is to improve the original web page's clickthrough rate.
  • clickbait title - A clickbait title is a title for online content that is designed to engage the reader and tempt them into clicking through to the associated content.
  • clickjacking - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clicks and mortar - Clicks and mortar, sometimes seen as clicks-and-mortar or clicks and bricks, is a type of omnichannel business model that takes advantage of both online and offline operations.
  • clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickthrough rate (CTR) - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • client - A client is the requesting program or user in a client/server relationship.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
  • client hypervisor - A client hypervisor is a hypervisor that resides on a laptop, PC or other client device.
  • client solid state drive - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client solid state drive (SSD) - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • client-based virtual machine - A client-based virtual machine is an instance of an operating system that is managed centrally on a server and executed locally on a client device.
  • client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
  • client-server network - A client-server network is a communications model in which multiple client programs share the services of a common server program.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
  • clinical business intelligence - Clinical business intelligence is the application of data analytics to medical records through various systems to improve medical care.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • Clinical Data Repository - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • Clinical Data Repository/Health Data Repository (CHDR) - Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the Veterans Administration.
  • clinical decision support system - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close