Browse Definitions :

Browse Definitions by Alphabet

  • channel strategy - A channel strategy is a vendor's plan for moving a product or a service through the chain of commerce to the end customer.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • Chaos Monkey - Chaos Monkey is a software tool Netflix engineers developed to test the resiliency and recoverability of their Amazon Web Services (AWS) infrastructure.
  • CHAP (Challenge-Handshake Authentication Protocol) - CHAP (Challenge-Handshake Authentication Protocol) is a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user.
  • charge (electric charge) - In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • chart of accounts (COA) - A chart of accounts (COA) is a financial, organizational tool that provides an index of every account in an accounting system.
  • chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
  • chat room - A chat room is an online platform that enables users to communicate with each other in real time.
  • chatbot - A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.
  • ChatGPT - ChatGPT is an AI chatbot that uses natural language processing to create humanlike conversational dialogue.
  • ChatOps - ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.
  • chatting - While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, it can also occur over the internet via Short Message Service (SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • Cheat Sheet - Characters and quotes from The Phoenix Project - Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot.
  • Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project' - Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.
  • checksum - A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions.
  • Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
  • Chernobyl virus - The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed.
  • chief customer officer (CCO) - A chief customer officer, or customer experience officer, is responsible for customer research, communicating with company employees and taking charge of customer experience (CX) metrics.
  • chief data officer (CDO) - A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data management responsibilities related to the business to derive maximum value from the data available to the enterprise.
  • chief digital officer - A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies, such as the cloud, AI, machine learning, automation, IoT, mobile and social media, to create business value.
  • chief diversity officer (CDO) - The chief diversity officer (CDO) is a senior leader who develops and implements diversity, equity and inclusion initiatives within an organization.
  • chief experience officer (CXO) - A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.
  • chief financial officer (CFO) - A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations and strategy.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
  • chief marketing officer (CMO) - A chief marketing officer (CMO) is a C-suite executive responsible for overseeing the planning, development and execution of an organization's marketing and advertising initiatives.
  • Chief Medical Information Officer (CMIO) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a healthcare organization.
  • chief operating officer (COO) - A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.
  • chief privacy officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect employee and customer data from unauthorized access.
  • chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
  • chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chief strategy officer (CSO) - A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an organization's strategic initiatives and future goals.
  • chief sustainability officer (CSO) - A chief sustainability officer (CSO) is an executive tasked with improving sustainability within the company.
  • Chief Technology Officer (CTO) - The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
  • chief transformation officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
  • chief trust officer - A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
  • Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • CIA triad (confidentiality, integrity and availability) - The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
  • cinema pulldown 3:2 (telecine) - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.
  • CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
  • cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
  • cipher block chaining (CBC) - Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block.
  • ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
  • ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
  • circuit - In electronics, a circuit is a complete circular path that electricity flows through.
  • circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
  • circular economy - A circular economy is a model of production and consumption, where items and products are reused whenever possible rather than discarded.
  • Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
  • Cisco Certified Internetwork Expert (CCIE certification) - Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.
  • Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
  • Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a collection of proprietary operating systems (OSes) that runs on Cisco hardware devices, including Cisco Systems network devices, routers and network switches.
  • Cisco Performance Routing (PfR) - Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.
  • Cisco Systems, Inc. - Cisco Systems, Inc.
  • Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
  • CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
  • CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
  • citizen data scientist - A citizen data scientist is an individual who does some data science work for an organization but doesn't hold the title of data scientist or have a formal background in advanced analytics, statistics or related disciplines.
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • Citrix - Citrix Systems is a U.
  • Citrix Cloud - Citrix Cloud is a management and delivery platform for IT administrators to design, deliver and manage virtual desktops and applications and other services, such as file sharing, on any device.
  • Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
  • Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of graphics acceleration technologies that help optimize the delivery of resource-intensive virtual applications on a company's XenDesktop and XenApp platforms.
  • Citrix StoreFront - Citrix StoreFront is an enterprise application store that provides an interface for users to access Citrix Virtual Apps -- formerly XenApp apps -- and Citrix Virtual Desktops -- formerly XenDesktop -- remotely.
  • Citrix Workspace app (Citrix Receiver) - Citrix Receiver was renamed the Citrix Workspace app in 2018.
  • Citrix XenApp - Citrix XenApp, now called Citrix Virtual Apps, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
  • Citrix XenServer - Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.
  • CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
  • claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • Class C2 - Class C2 is a security rating established by the U.
  • class diagram - A class diagram is an illustration of the relationships and source code dependencies among classes in the Unified Modeling Language (UML).
  • class library (in object-oriented programming) - In object-oriented programming, a class library is a collection of classes and other reusable software components, such as interfaces and value types.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
  • classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
  • clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clean electricity - Clean electricity, or carbon-free electricity, is electricity without high voltage spikes and drops, meaning it is low on emitting electrical pollution.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • CLEC (competitive local exchange carrier) - In the United States, a CLEC (competitive local exchange carrier) is a telephone company that competes with the already established local telephone business by providing its own network and switching.
  • click fraud (pay-per-click fraud) - Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for online advertisements.
  • click-wrap agreement (click-through agreement) - A click-wrap agreement (click-through agreement) is an online agreement in which the user signifies their acceptance by clicking a button or checking a box that states, 'I agree.
  • clickstream data (clickstream analytics) - Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • client - A client is a hardware or software device that requests access to a service that is typically made available by a server.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
  • client-server - Client-server is a relationship in which one program, the client, requests a service or resource from another program, the server.
  • client-server network - A client-server network is a distributed communications architecture in which a centralized server receives and responds to requests for services and data from multiple clients.
  • client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
  • client-side framework - A client-side framework is a software development framework that focuses on executing application processes on end user devices rather than the application's own server.
  • clinical data analyst - A clinical data analyst -- also referred to as a 'healthcare data analyst' -- is a healthcare information professional who verifies the validity of scientific experiments and data gathered from research.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close