Browse Definitions :

Browse Definitions by Alphabet

AWS - CHA

  • AWS CloudWatch - Amazon CloudWatch is a component of Amazon Web Services that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • C - The C programming language is a procedural and general-purpose language that provides low-level access to system memory.
  • C shell - C shell (csh) is a Unix shell that provides a command-line user interface (UI) to interact with an operating system (OS).
  • C# (C-Sharp) - C#, pronounced "C-sharp," is an object-oriented programming language from Microsoft that enables developers to build applications that run on the .
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • C-Level (C-Suite) - C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • cache memory - Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM).
  • cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • cache server - A cache server is a dedicated network server or service acting as a server that saves webpages or other internet content locally.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • caching - Caching -- pronounced "cashing" -- is the process of storing data in a cache, which is a temporary storage area that facilitates faster access to data with the goal of improving application and system performance.
  • CAD (computer-aided design) - CAD (computer-aided design) is the use of computer-based software to aid in design processes.
  • CAIQ (Consensus Assessments Initiative Questionnaire) - The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
  • calculator - A calculator is a device that performs arithmetic operations on numbers.
  • California Consumer Privacy Act (CCPA) - The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).
  • call admission control (CAC) - Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony).
  • call center - A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
  • call center agent (call center representative) - A call center agent is a person who handles incoming or outgoing customer calls for a business.
  • call center schedule adherence - Call center schedule adherence is a standard metric used in business call centers to determine whether call center agents are working the amount of time they are scheduled to work.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call management - Call management is the process by which inbound telephone calls are routed to call center agents.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • call tree - A call tree is a layered hierarchical communication model used to notify specific individuals of an event and coordinate recovery if necessary.
  • CALMS - CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
  • camcorder (camera recorder) - A camcorder (camera recorder) is a portable electronic recording device capable of recording live-motion video and audio for later playback.
  • CamelCase - CamelCase is a way to separate the words in a phrase by making the first letter of each word capitalized and not using spaces.
  • campus network - A campus network is a proprietary local area network (LAN) or set of interconnected LANs serving a corporation, government agency, university or similar organization.
  • canary testing - In software testing, canary testing refers to testing a new software version or a new feature with real users in a live (production) environment.
  • candidate experience - Candidate experience reflects a person's feelings about going through a company's job application process.
  • canonical - In programming, canonical means "according to the rules.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • capacitive touchscreen - A capacitive touchscreen is a control display that uses the conductive touch of a human finger or a specialized input device for input and control.
  • capacitor (capacitance) - In its simplest form, a capacitor consists of two conducting plates separated by an insulating material called thedielectric.
  • capacity management - Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that ensure that a computing infrastructure has adequate resources to handle current data processing requirements, as well as the capacity to accommodate future loads.
  • capacity on demand (COD) - Capacity on demand (COD) is a purchasing option that allows companies to receive equipment with more computer processing, storage or other capacity than the company needs at the time of purchase, and have that extra capacity remain unused and unpaid for until the company actually requires it.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs.
  • captive portal - A captive portal is a webpage that the user of a public-access network is required to view and interact with before they can access the network.
  • CAPWAP (Control and Provisioning of Wireless Access Points) - CAPWAP (Control and Provisioning of Wireless Access Points) is a protocol that enables an access controller to manage a collection of wireless termination points.
  • car hacking - Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
  • carbon accounting - Carbon accounting is the process of calculating and tracking the amount of carbon dioxide (CO2) and other greenhouse gas (GHG) emissions both produced and removed from the biosphere by an organization.
  • carbon footprint - A carbon footprint is the measure of the environmental impact of a particular individual or organization's lifestyle or operation, measured in units of carbon dioxide.
  • carbon offset - A carbon offset is a credit that a person or organization can buy to decrease its carbon footprint.
  • carbon-aware computing - As a green design principle, carbon-aware computing steers software and hardware development up a path of sustainability toward carbon neutrality.
  • card dipping (EMV card dipping) - Dipping can be contrasted with swiping.
  • card skimming - Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).
  • card verification value (CVV) - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • cardholder data (CD) - Cardholder data (CD) is any personally identifiable information (PII) associated with a person who has a credit or debit card.
  • cardholder data environment (CDE) - A cardholder data environment (CDE) is a computer system or networked group of IT systems that processes, stores or transmits cardholder data or sensitive payment authentication data.
  • carrier cloud - A carrier cloud is a cloud computing environment that is owned and operated by a traditional telecommunications service provider.
  • carrier network - A telecommunications carrier network is the collection of devices and underlying infrastructure used to transmit data from one location to another.
  • carrier-to-noise ratio - In communications, the carrier-to-noise ratio, often written as CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise.
  • Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • case study - In a business context, a case study is a documented implementation of something, such as a practice, a product or a service.
  • case-based reasoning (CBR) - Case-based reasoning (CBR) is an experience-based approach to solving new problems by adapting previously successful solutions to similar problems.
  • catchball - Catchball is an approach to decision-making in an organization or group where ideas are pitched from one individual to another throughout the group’s hierarchy and divisions.
  • Categories of twisted-pair cabling systems - A twisted-pair cabling system is a cable consisting of one or several pairs of copper wires.
  • cathode - A cathode is the metallic electrode through which current flows out in a polarized electrical device.
  • cathode ray tube (CRT) - A cathode ray tube (CRT) is a specialized vacuumtube in which images are produced when an electron beam strikes aphosphorescent surface.
  • causation - Causation, or causality, is the capacity of one variable to influence another.
  • CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality (VR) environment consisting of a cube-shaped VR room or a room-scale area in which the walls, floors and ceilings are projection screens.
  • CBRS (Citizens Broadband Radio Service) - Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum.
  • CCNA certification - Cisco Certified Network Associate (CCNA) is a technical certification that Cisco offers for early-career networking professionals.
  • CCTV (closed circuit television) - CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  • CD-ROM - A CD-ROM (Compact Disc Read-Only Memory) is a type of compact disc that can only be read, not written to.
  • CDMA (Code-Division Multiple Access) - CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.
  • CDN (content delivery network) - A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers.
  • CE router (customer edge router) - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in a grid of specified shape, such that each cell changes state as a function of time, according to a defined set of rules driven by the states of neighboring cells.
  • Cellular Vehicle to Everything (C-V2X) - Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
  • center of excellence (CoE) - A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide best practices for a particular area of interest.
  • Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Centers for Medicare & Medicaid Services (CMS) - The Centers for Medicare & Medicaid Services (CMS) is the wing of the U.
  • centimeter (cm) - The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.
  • central bank digital currency (CBDC) - A central bank digital currency (CBDC) is a digital version of a country's central bank money or fiat currency.
  • centrex (central office exchange service) - Centrex (central office exchange service) is a service from local telephone companies in the United States in which up-to-date phone facilities at the phone company's central (local) office are offered to business users so that they don't need to purchase their own facilities.
  • CenturyLink - CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.
  • CEO (Chief Executive Officer) - The chief executive officer (CEO) is the top position in an organization and responsible for implementing existing plans and policies, improving the company's financial strength, supporting ongoing digital business transformation and setting future strategy.
  • Ceph - Ceph is open source software providing scalable object-, block- and file-based storage under a unified system.
  • Cerner Corp. - Cerner Corp.
  • CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • certificate revocation list (CRL) - A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their actual or assigned expiration date.
  • Certified Associate in Project Management (CAPM) - The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.
  • Certified Cloud Security Professional (CCSP) - Certified Cloud Security Professional (CCSP) is an International Information System Security Certification Consortium, or (ISC)2, certification that covers cloud-based cybersecurity best practices.
  • Certified in Risk and Information Systems Control (CRISC) - Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.
  • Certified Information Security Manager (CISM) - Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
  • Certified Information Systems Auditor (CISA) - Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Security Professional (CISSP) - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • Certified ScrumMaster (CSM) - Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology.
  • CFO (Chief Financial Officer) - CFO (Chief Financial Officer) is the corporate title for the person responsible for managing the company's financial operations and strategy.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • change agent (agent of change) - A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
Networking
  • top-of-rack switching

    Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other ...

  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

Security
  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an unwanted and uninvited user or group of such users interrupts online ...

  • CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • globalization

    Globalization is the process by which ideas, knowledge, information, goods and services spread around the world.

  • business process outsourcing (BPO)

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

  • localization

    Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its ...

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close