Browse Definitions by Alphabet
- cloud load balancing - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources.
- cloud management platform (CMP) - A cloud management platform (CMP) is a suite of integrated software tools that an enterprise can use to monitor and control cloud environments.
- cloud modernization - Cloud modernization is a multistep process where existing on-premises applications, infrastructure and data sources are migrated, updated and transformed into a cloud-based architecture and environment.
- cloud NAS (cloud network attached storage) - Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.
- Cloud Native Computing Foundation (CNCF) - The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of cloud-native computing.
- cloud object storage - Cloud object storage is a format for storing unstructured data in the cloud.
- cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
- cloud PBX (private branch exchange) - A cloud PBX (private branch exchange) is a business phone system for connecting employees to a telephone network using a managed service running in the cloud.
- cloud penetration testing - Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its own defenses.
- cloud provisioning - Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.
- cloud radio access network (C-RAN) - Cloud radio access network (C-RAN) is a centralized, cloud computing-based architecture for radio access networks.
- cloud security - Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.
- Cloud Security Alliance (CSA) - The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
- cloud security architecture - Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
- cloud security posture management (CSPM) - Cloud security posture management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
- cloud SLA (cloud service-level agreement) - A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.
- cloud sourcing - Cloud sourcing is an arrangement in which a company pays a third-party cloud hosting provider to deliver and support IT services that could be provided in-house.
- cloud storage - Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, managed, backed up and made available to users over a network (typically the internet).
- cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
- cloud storage provider - A cloud storage provider, sometimes referred to as a managed service provider, is a company that offers organizations and individuals the ability to place and retain data in an off-site storage system.
- cloud storage service - A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.
- cloud telephony (cloud calling) - Cloud telephony (cloud calling) is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
- Cloud visibility: Definition, importance and challenges - Cloud visibility is a company's ability to monitor, track and gain insight into its cloud infrastructure and resources.
- cloud washing - Cloud washing (also spelled cloudwashing) is the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by associating the buzzword 'cloud' with it.
- cloud workload protection - Cloud workload protection is the safeguarding of workloads spread out across multiple cloud environments.
- cloud workload protection platform (CWPP) - A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud or in a hybrid arrangement.
- cloud-native application protection platform (CNAPP) - Cloud-native application protection platform, or CNAPP, is a software product that bundles multiple cloud security tools into one package, thereby delivering a holistic approach for securing an organization's cloud infrastructure, its cloud-native applications and its cloud workloads.
- Cloud-to-Cloud Backup (C2C Backup) - C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service.
- Cloudability - Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.
- CloudCheckr - CloudCheckr is a vendor that provides a cloud management platform intended to give an organization more control over and visibility into its cloud computing costs, performance and security.
- cloudlet - A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity.
- CloudOps (cloud operations) - Cloud operations (CloudOps) is the management, delivery and consumption of software in a computing environment where there is limited visibility into an app's underlying infrastructure.
- CloudTrust Protocol (CTP) - The CloudTrust Protocol or CTP is a mechanism that helps cloud service customers request and retrieve standardized inquiries about cloud provider transparency.
- cluster - Clusters are typically defined as collections or groups of items with similar or different characteristics.
- cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
- clustered network-attached storage (NAS) system - A clustered network-attached storage (NAS) system is a scale-out storage platform made up of multiple NAS nodes networked together into a single cluster.
- cmdlet - A cmdlet -- pronounced 'command-let' -- is a small, lightweight command that is used in the Windows PowerShell environment.
- CMOS sensor - A CMOS sensor is an electronic chip that converts photons to electrons for digital processing.
- coaxial cable - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
- COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
- COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
- code - In computer programming, 'computer code' refers to the set of instructions, or a system of rules, written in a particular programming language (i.
- codebase (code base) - A codebase, or code base, is the complete body of source code for a software program, component or system.
- codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
- coded orthogonal frequency-division multiplexing (COFDM) - Coded orthogonal frequency-division multiplexing (COFDM) is a telecommunications modulation scheme that divides a single digital signal across 1,000 or more signal carriers simultaneously.
- coexistence testing - Coexistence testing, similar to compatibility testing, is a method of measuring the ability of multiple devices to interact in a single environment with limited bandwidth.
- cognitive automation - Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.
- cognitive bias - Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences.
- cognitive blindness - Cognitive blindness is the inability to understand something due to the lack of a precept of knowledge, understanding or belief in a necessary fundamental concept.
- cognitive computing - Cognitive computing is the use of computerized models to simulate the human thought process in complex situations where the answers might be ambiguous and uncertain.
- cognitive diversity - Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently, have divergent perspectives and come from varied backgrounds.
- cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
- cognitive radio (CR) - Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which ones are not.
- cognitive search - Cognitive search represents a new generation of enterprise search that uses artificial intelligence (AI) technologies to improve users' search queries and extract relevant information from multiple diverse data sets.
- cohort learning - Cohort learning is a learning strategy prioritizing coursework or lessons that groups of students complete together in an interactive fashion.
- cold backup (offline backup) - A cold backup is a backup of an offline database.
- cold calling - Cold calling is the business practice of contacting a potential customer or client who has not expressed previous interest in speaking with a customer service representative or making a purchase.
- cold storage - Cold storage is a computer system or mode of operation designed for the retention of inactive data.
- collaboration diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
- collision in networking - In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at the same time.
- colocation (colo) - A colocation facility (colo) is a data center or telecommunications facility in which a business can rent space for servers, storage devices, and other computing and networking hardware.
- columnar database - A columnar database (column-oriented) is a database management system (DBMS) that stores data on disk in columns instead of rows.
- com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
- combination and permutation - In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets.
- command-and-control server (C&C server) - A command-and-control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware.
- command-line interface (CLI) - A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
- committed information rate (CIR) - Committed information rate (CIR) is the guaranteed rate at which a Frame Relay network will transfer information under normal line conditions.
- commodity hardware - Commodity hardware in computing is computers or components that are readily available, inexpensive and easily interchangeable with other commodity hardware.
- Common Access Card (CAC) - A Common Access Card (CAC) is a smart card issued by the Unites States Department of Defense for accessing DOD systems and facilities.
- Common Body of Knowledge (CBK) - In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.
- Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard that defines device and application characteristics so system administrators and management programs can control devices and applications from different manufacturers.
- Common Internet File System (CIFS) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
- Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
- Common Service Center (CSC) - Common Service Center (CSC) is an initiative by the government of India to establish locations with computers that are freely available for citizens to use.
- Common Vulnerability Scoring System (CVSS) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity and characteristics of security vulnerabilities in information systems.
- Common Weakness Enumeration (CWE) - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
- communication plan - A communication plan is a policy-driven approach to providing company stakeholders with certain information.
- communication service provider (CSP) - Communication service provider (CSP) is the broad title for a variety of service providers in broadcast and two-way communications services.
- Communications as a Service (CaaS) - Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor.
- communications intelligence (COMINT) - Communications intelligence (COMINT) is information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls and online interactions.
- communications platform as a service (CPaaS) - Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).
- communications security (COMSEC) - Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred.
- compact disc (CD) - A compact disc is a portable storage medium that can record, store and play back audio, video and other data in digital form.
- compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
- compatibility - In the world of IT, compatibility refers to the ability of software and hardware from different sources to work together without having to be altered to do so.
- compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
- compensating control (alternative control) - A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
- compensation management - Compensation management is the discipline and process for determining employees' appropriate pay and benefits.
- competency framework - A competency framework is a structure that defines a set of competencies, or skills, for each role in an organization.
- competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
- competitive advantage - Competitive advantage is the favorable position an organization seeks to be more profitable than its rivals.
- competitive differentiation - Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.
- compiler - A compiler is a special program that translates a programming language's source code into machine code, bytecode or another programming language.
- complex event processing (CEP) - Complex event processing (CEP) is the use of technology to predict high-level events.
- compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
- compliance as a service (CaaS) - Compliance as a service (CaaS) is a cloud service that specifies how a managed service provider (MSP) helps an organization meet its regulatory compliance mandates.
- compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
- compliance automation - Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with artificial intelligence features -- to perform and simplify compliance procedures.
- compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
- compliance officer - Compliance officers are employees tasked with ensuring a company follows its internal rules and best-practice policies while always complying with applicable external laws and government regulations.