Browse Definitions by Alphabet
- chief financial officer (CFO) - A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations and strategy.
- Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
- chief human resources officer (CHRO) - Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
- chief marketing officer (CMO) - A chief marketing officer (CMO) is a C-suite executive responsible for overseeing the planning, development and execution of an organization's marketing and advertising initiatives.
- Chief Medical Information Officer (CMIO) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a healthcare organization.
- chief operating officer (COO) - A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.
- chief privacy officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect employee and customer data from unauthorized access.
- chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
- chief product officer (CPO) - A chief product officer (CPO) is a C-level executive who is responsible for the strategy and execution of all product-related activities within an organization.
- chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
- chief strategy officer (CSO) - A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an organization's strategic initiatives and future goals.
- Chief Technology Officer (CTO) - The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.
- chief transformation officer (CTO) - Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth in revenue and profit to an organization.
- chief trust officer - A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
- chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
- CHKDSK (check disk) - CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume.
- Chromecast - Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television.
- churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
- CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
- CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
- CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.
- cipher - In cryptography, a cipher is an algorithm for encrypting and decrypting data.
- ciphertext - Ciphertext is encrypted text transformed from plaintext using an encryption algorithm.
- ciphertext feedback (CFB) - In cryptography, ciphertext feedback (CFB), also known as cipher feedback, is a mode of operation for a block cipher.
- circuit - In electronics, a circuit is a complete circular path that electricity flows through.
- circuit switching - Circuit switching is a type of network configuration in which a physical path is obtained and dedicated to a single connection between two endpoints in the network for the duration of a dedicated connection.
- circular economy - A circular economy is a model of production and consumption, where items and products are reused whenever possible rather than discarded.
- Cisco Certified Entry Networking Technician (CCENT) - Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.
- Cisco Certified Network Professional (CCNP) - Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program.
- Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
- Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
- Cisco IOS (Cisco Internetwork Operating System) - Cisco IOS (Internetwork Operating System) is a collection of proprietary operating systems (OSes) that runs on Cisco hardware devices, including Cisco Systems network devices, routers and network switches.
- Cisco Systems, Inc. - Cisco Systems, Inc.
- Cisco Webex - Cisco Webex is a video conferencing and collaboration product suite.
- CISO (chief information security officer) - The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.
- CISO as a service (vCISO, virtual CISO, fractional CISO) - A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
- citizen data scientist - A citizen data scientist is an individual who does some data science work for an organization but doesn't hold the title of data scientist or have a formal background in advanced analytics, statistics or related disciplines.
- citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
- Citrix - Citrix Systems is a U.
- Citrix Cloud - Citrix Cloud is a management and delivery platform for IT administrators to design, deliver and manage virtual desktops and applications and other services, such as file sharing, on any device.
- Citrix DesktopPlayer - Citrix DesktopPlayer is a desktop virtualization platform with a Type 2 hypervisor that administrators install locally on top of a Windows or Mac OS X operating system.
- Citrix HDX 3D Pro - Citrix HDX 3D Pro is a group of graphics acceleration technologies that help optimize the delivery of resource-intensive virtual applications on a company's XenDesktop and XenApp platforms.
- Citrix StoreFront - Citrix StoreFront is an enterprise application store that provides an interface for users to access Citrix Virtual Apps -- formerly XenApp apps -- and Citrix Virtual Desktops -- formerly XenDesktop -- remotely.
- Citrix Workspace app (Citrix Receiver) - Citrix Receiver was renamed the Citrix Workspace app in 2018.
- Citrix XenApp - Citrix XenApp, now called Citrix Virtual Apps, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.
- CKO (chief knowledge officer) - Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.
- claims-based identity - Claims-based identity is a means of authenticating an end user, application or device to another system in a way that abstracts the entity's specific information while providing data that authorizes it for appropriate and relevant interactions.
- class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
- Class C2 - Class C2 is a security rating established by the U.
- class library (in object-oriented programming) - In object-oriented programming, a class library is a collection of classes and other reusable software components, such as interfaces and value types.
- Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
- classical computing - Classical computing is the processing of binary data in traditional types of bit-based computer systems.
- clean architecture - Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.
- clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
- clean electricity - Clean electricity, or carbon-free electricity, is electricity without high voltage spikes and drops, meaning it is low on emitting electrical pollution.
- clean install - A clean install is a software installation in which any previous version is eradicated.
- click fraud (pay-per-click fraud) - Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for online advertisements.
- click-wrap agreement (click-through agreement) - A click-wrap agreement (click-through agreement) is an online agreement in which the user signifies their acceptance by clicking a button or checking a box that states, 'I agree.
- clickstream data (clickstream analytics) - Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
- client - A client is a hardware or software device that requests access to a service that is typically made available by a server.
- Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
- client-server - Client-server is a relationship in which one program, the client, requests a service or resource from another program, the server.
- client-server network - A client-server network is a distributed communications architecture in which a centralized server receives and responds to requests for services and data from multiple clients.
- client-side extension (CSE) - A client-side extension (CSE) is an integral component of enterprise group policy administration that applies Group Policy to users or endpoint systems.
- client-side framework - A client-side framework is a software development framework that focuses on executing application processes on end user devices rather than the application's own server.
- clinical data analyst - A clinical data analyst -- also referred to as a 'healthcare data analyst' -- is a healthcare information professional who verifies the validity of scientific experiments and data gathered from research.
- clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
- Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
- clinical documentation - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
- clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
- clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
- clipboard - A clipboard is a feature in an operating system or application that temporarily stores data copied or cut from a document or other location, allowing the user to transfer or duplicate it elsewhere.
- cloaking - Cloaking is a technique where a different version of web content is returned to users than to the search engine crawlers.
- clock speed - Clock speed is the number of times a second that a circuit operates and is most associated with the central processing unit (CPU).
- Clos network - A Clos network is a type of nonblocking, multistage switching network used today in large-scale data center switching fabrics.
- closed captions - Closed captions are a text version of the spoken part of a television, movie or computer presentation.
- closed circuit television (CCTV) - CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
- closed loop control system - A closed loop control system is a mechanical or electronic device that automatically regulates a system to maintain a desired state or set point without human interaction.
- cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
- cloud archive - A cloud archive is storage as a service for long-term data retention.
- cloud audit - A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.
- cloud browser - A cloud browser is a cloud-based combination of a web browser application with a virtualized container that implements the concept of remote browser isolation.
- cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
- cloud collaboration - Cloud collaboration is a type of enterprise collaboration that allows employees to work together on documents and other data types, which are stored off-premises and outside of the company firewall.
- Cloud Controls Matrix - The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider.
- cloud data management - Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.
- Cloud Data Management Interface (CDMI) - The Cloud Data Management Interface (CDMI) is an international standard that defines a functional interface that applications use to create, retrieve, update and delete data elements from cloud storage.
- cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
- cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
- cloud encryption - Cloud encryption is a service cloud storage providers offer whereby a customer's data is transformed using encryption algorithms from plaintext into ciphertext and stored in the cloud.
- cloud ERP - Cloud ERP is a type of enterprise resource planning software that runs on a provider's cloud computing platform, rather than on premises on an enterprise's own computers.
- Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications.
- cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
- cloud IDE - A cloud IDE is a web-based integrated development platform.
- cloud infrastructure entitlement management (CIEM) - Cloud infrastructure entitlement management (CIEM) is a discipline for managing identities and privileges in cloud environments.
- cloud integration - Cloud integration is the act of combining different cloud-based systems into an integral whole.
- cloud load balancing - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources.
- cloud management platform (CMP) - A cloud management platform (CMP) is a suite of integrated software tools that an enterprise can use to monitor and control cloud environments.
- cloud modernization - Cloud modernization is a multistep process where existing on-premises applications, infrastructure and data sources are migrated, updated and transformed into a cloud-based architecture and environment.
- cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.