Browse Definitions :

Browse Definitions by Alphabet

COB - COM

  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBIT 5 - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
  • COBOL - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • cobot - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • COD - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage, or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
  • Code Division Multiple Access - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • code review - Code review is a phase in the computer program development process in which the authors of code, peer reviewers, and perhaps quality assurance reviewers get together to review code, line by line.
  • code-division multiple access - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • codebase (code base) - A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.
  • coded orthogonal frequency division multiplexing - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
  • coding error - In computer technology, a bug is a coding error in a computer program.
  • CoE - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • coefficient - In a mathematical equation, a coefficient is a constant by which a variable is multiplied.
  • coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
  • cognitive architecture - Cognitive architecture is the theory about the structures of the human mind and how they work together to manage intelligent behavior in any complex environment.
  • cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
  • cognitive bias - Cognitive bias is a limitation in objective thinking that is caused by the tendency for the human brain to perceive information through a filter of personal experience and preferences.
  • cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
  • cognitive computing - Cognitive computing systems use computerized models to simulate the human cognition process to find solutions in complex situations where the answers may be ambiguous and uncertain.
  • cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently.
  • cognitive hacking - Cognitive hacking is a cyberattack that seeks to manipulate the perception of people by exploiting their psychological vulnerabilities.
  • cognitive load theory (CLT) - Cognitive load theory (CLT) is based on the premise that instructional materials should be presented at a pace and level of difficulty that corresponds to how humans process information.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cognitive radio - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
  • cognitive robotics - Cognitive robotics is a field of technology involving robots that can learn from experience, from human teachers, and even on their own, thereby developing the ability to effectively deal with their environment.
  • cognitive search - Cognitive search is a new generation of enterprise search that uses artificial intelligence technologies to improve users' search queries and extract relevant information from multiple, diverse data sets.
  • cognitive security - Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.
  • cohort - A cohort is a group of people that have some demographic or statistical characteristic in common.
  • CoIP - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • COLD - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • COLD (Computer Output to Laser Disk) - COLD (Computer Output to Laser Disk) is a system for archiving data such as business records and reports to one or more optical disks in a compressed but easily retrievable format.
  • cold backup - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • cold boot - To reboot is to restart a computer and reload the operating system.
  • cold boot attack - A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system.
  • cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
  • cold cloning - Cold cloning is a cloning method that takes place while the server OS is not running.
  • cold storage - Cold storage is a computer system or mode of operation designed for the retention of inactive data.
  • coldset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • coldset Web offset printing - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • coldset Web offset printing (non-heatset) - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • collaboration - Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project.
  • Collaboration and collaborative software: Glossary - Collaboration is growing both within and beyond the enterprise.
  • Collaboration Data Objects - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
  • Collaboration Data Objects (CDO) - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
  • collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • collaboration software - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • collaboration specialist - A collaboration specialist is an individual in charge of managing customer experience and implementing a collaborative platform across the enterprise in order to enhance the user experience and employee productivity, and collectively accomplish tasks.
  • collaborative BI (collaborative business intelligence) - Collaborative BI (collaborative business intelligence) is the merging of business intelligence software with collaboration tools, including social and Web 2.
  • collaborative computing - Collaborative computing is a diverse collection of information technologies designed to support work between individuals.
  • collaborative consumption - Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.
  • collaborative filtering - Collaborative filtering is the predictive process behind recommendation engines.
  • collaborative robot - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • collaborative software - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • College of Healthcare Information Management Executives - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • Collision Avoidance - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • collision sensor - A collision sensor is a piece of electronic equipment that detects an impact.
  • collocated - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • collocation - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocated care-of address - In Internet routing, a care-of address is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network.
  • colocation - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colocation marketplace - A colocation marketplace is an online platform that connects colocation users with managed service providers, IT vendors and potential business partners.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • column database management system (CDBMS) - There are different types of CDBMS offerings, with the common defining feature being that data is stored by column (or column families) instead of as rows.
  • column-level encryption - Column-level encryption is a method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes.
  • columnar database - A columnar database is a database management system (DBMS) that stores data in columns instead of rows.
  • columnstore index - A columnstore index is a type of index used to store, manage and retrieve data stored in a columnar format in a database.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • COM - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
  • COMINT (communications intelligence) - Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.
  • comma separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • command - In computers, a command is a specific order from a user to the computer's operating system or to an application to perform a service, such as "Show me all my files" or "Run this program for me.
  • command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • command interpreter - A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program.
  • command line interface - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • command-and-control server (C&C server) - A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
  • command-line interface (CLI) - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
  • comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
  • Commerce Extensible Markup Language - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
  • committed information rate - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
  • committed information rate (CIR) - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close