You are browsing sample data. Buy download of full dataset or subscribe to API access with one of our member plans.
{ "sample": { "is_sample": "TRUE", "limit_total": 400 }, "api": { "title": "Abbreviations 3", "point": { "title": "By Table", "desc": "Each API function returns data from a specific database table. " } }, "input": { "url": false, "get": false, "post": false }, "links": { "up": { "href": "https://songer.datasn.com/data/api/v1/u_4db7936df78dfe468fc2/abbreviations_3/by_table/" }, "home": { "href": "https://songer.datasn.com/data/api/v1/u_4db7936df78dfe468fc2/abbreviations_3/by_table/abbreviation/?app=html-json&manifest=row" }, "prev": { "href": "https://songer.datasn.com/data/api/v1/u_4db7936df78dfe468fc2/abbreviations_3/by_table/abbreviation/2/?app=html-json&manifest=row" }, "next": { "href": "https://songer.datasn.com/data/api/v1/u_4db7936df78dfe468fc2/abbreviations_3/by_table/abbreviation/4/?app=html-json&manifest=row" } }, "meta": { "query": { "page": 3, "limit": 100, "limit_total": 400, "time": 0.0023999999999999997897515147116109801572747528553009033203125 }, "stats": { "raw_rows": 100, "rows": 100, "rows_total": 20817, "pages_total": 209 }, "struct": { "stem": { "0": "abbreviation" }, "leaf": "abbreviation.id", "leaf_stem": {}, "leaf_stem_leaf": null } }, "output": { "rows": { "202": { "abbreviation.id": 202, "abbreviation.ts": "2018-04-19 01:35:08", "abbreviation.initial": "C sharp", "abbreviation.meaning": "C# (pronounced \"C-sharp\") is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java." }, "203": { "abbreviation.id": 203, "abbreviation.ts": "2018-04-19 01:35:18", "abbreviation.initial": "C shell", "abbreviation.meaning": "C shell is the UNIX shell (command execution program, often called a command interpreter ) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell . These two UNIX shells, along with the Korn shell , are the three most commonly used shells. The C shell program name is csh , and the shell prompt (the character displayed to indicate readiness for user input) is the % symbol. The C shell was invented for programmers who prefer a syntax similar to that of the C programming language." }, "204": { "abbreviation.id": 204, "abbreviation.ts": "2018-04-19 01:35:21", "abbreviation.initial": "C#", "abbreviation.meaning": "C# (pronounced \"C-sharp\") is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java." }, "205": { "abbreviation.id": 205, "abbreviation.ts": "2018-04-19 01:35:28", "abbreviation.initial": "C++", "abbreviation.meaning": "C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications. C++ is a superset of the C language." }, "206": { "abbreviation.id": 206, "abbreviation.ts": "2018-04-19 01:35:37", "abbreviation.initial": "C, C# and C++ Cheat Sheets", "abbreviation.meaning": "We've gathered cheat sheets for fast reference to C-related information. You'll find information about C, structured programming, object-oriented programming and more. Do you have a favorite C cheat sheet? Let us know!" }, "207": { "abbreviation.id": 207, "abbreviation.ts": "2018-04-19 01:35:44", "abbreviation.initial": "C-level (C-suite)", "abbreviation.meaning": "C-level, also called the C-suite, is an adjective used to describe high-ranking executive titles within an organization. The letter C, in this context, stands for chief. Officers who hold C-level positions are typically considered the most powerful and influential members of an organization; consequently, these executives set the company's strategy, make higher-stakes decisions and ensure the day-to-day operations align with fulfilling the company's strategic goals." }, "208": { "abbreviation.id": 208, "abbreviation.ts": "2018-04-19 01:35:45", "abbreviation.initial": "C-sharp", "abbreviation.meaning": "C# (pronounced \"C-sharp\") is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java." }, "209": { "abbreviation.id": 209, "abbreviation.ts": "2018-04-19 01:35:51", "abbreviation.initial": "C/N", "abbreviation.meaning": "In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of the received carrier strength relative to the strength of the received noise. High C/N ratios provide better quality of reception, and generally higher communications accuracy and reliability, than low C/N ratios." }, "210": { "abbreviation.id": 210, "abbreviation.ts": "2018-04-19 01:35:56", "abbreviation.initial": "C14N", "abbreviation.meaning": "In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification. To canonicalize (as well as the slightly less tortured variant canonify ) is to ensure that data conforms to canonical rules, and is in an approved format. Canonicalization may sometimes mean generating canonical data from noncanonical data." }, "211": { "abbreviation.id": 211, "abbreviation.ts": "2018-04-19 01:36:01", "abbreviation.initial": "C3D", "abbreviation.meaning": "C3D (pronounced SEE-THREE-DEE ) is a combined hardware/software process that captures a pair of two-dimensional images, objects, or scenes and automatically reconstructs them into a digital three-dimensional ( 3-D ) model. In turn, this model can be used to create a virtual representation of the image, object, or scene. The C3D process uses a standard PC and camera to produce a realistic photographic model for viewing on a PC at a reconstruction accuracy of 50 micron s. C3D can be used with other tools, such as the Virtual Reality Modelling Language ( VRML )." }, "212": { "abbreviation.id": 212, "abbreviation.ts": "2018-04-19 01:36:09", "abbreviation.initial": "C6", "abbreviation.meaning": "WinChip (also known as the WinChip C6) is a microprocessor designed for use in business computers that run Microsoft operating systems Made by IDT, the microprocessor reportedly provides comparable performance to Intel's more expensive Pentium microprocessors as well as to the more competitively-priced K6 and the Cyrix 6X86MX. IDT designed a smaller die area for the microprocessor, making it easier and cheaper to manufacture. WinChip cites Winstone tests that show the C6 has the highest rating per square millimeter of die area among Socket 7 microprocessors. The C6 does not include branch prediction and other features of some of the other microprocessors. It is optimized for running the most frequently used instructions and aims to be the most cost-effective choice for business applications such as word processing, spreadsheets, and database management." }, "213": { "abbreviation.id": 213, "abbreviation.ts": "2018-04-19 01:36:13", "abbreviation.initial": "CA", "abbreviation.meaning": "A certificate authority (CA) is a trusted entity that issues electronic documents that verify a digital entity’s identity on the Internet. The electronic documents, which are called digital certificates, are an essential part of secure communication and play an important part in the public key infrastructure (PKI). Certificates typically include the owner's public key, the expiration date of the certificate, the owner's name and other information about the public key owner. Operating systems (OSes) and browsers maintain lists of trusted CA root certificates to verify certificates that a CA has issued and signed." }, "214": { "abbreviation.id": 214, "abbreviation.ts": "2018-04-19 01:36:21", "abbreviation.initial": "CA", "abbreviation.meaning": "A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells. Cellular automata have been suggested for possible use in public key cryptography." }, "215": { "abbreviation.id": 215, "abbreviation.ts": "2018-04-19 01:36:24", "abbreviation.initial": "CA", "abbreviation.meaning": "Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming. CA has been used for years for pay-TV services. There are numerous ATSC and DVB-compliant CA systems available for a broadcaster to choose from. The CA system provider provides the equipment and software to the broadcaster who then integrates the CA system into his equipment. CA is not designed solely for DTV. It can be used for digital radio broadcasts, digital data broadcasts, and non-broadcast information and interactive services. A CA system consists of several basic components:" }, "216": { "abbreviation.id": 216, "abbreviation.ts": "2018-04-19 01:36:29", "abbreviation.initial": "CA Privileged Access Manager", "abbreviation.meaning": "CA Privileged Access Manager is a product that tracks and secures the usage of logins involving access to administrative control or sensitive information. Privileged Access Manager is available as a rack-mounted hardware appliance or a virtual appliance." }, "217": { "abbreviation.id": 217, "abbreviation.ts": "2018-04-19 01:36:33", "abbreviation.initial": "CA-ACF2", "abbreviation.meaning": "ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes. ACF2 prevents accidental or deliberate modification, corruption, mutilation, deletion, or viral infection of files. With ACF2, access to a system is denied to unauthorized personnel. Any authorized or unauthorized attempt to gain access is logged. System status can be monitored on a continuous basis, and a permanent usage log can be created. The logging feature, besides helping to identify potential intruders, makes it possible to identify and analyze changes and trends in the use of the system. Settings can be changed on a moment's notice, according to current or anticipated changes in the security or business requirements of the organization using the system." }, "218": { "abbreviation.id": 218, "abbreviation.ts": "2018-04-19 01:36:37", "abbreviation.initial": "CaaS", "abbreviation.meaning": "Communications as a Service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor. Such communications can include voice over IP (VoIP or Internet telephony), instant messaging (IM), collaboration and videoconference applications using fixed and mobile devices. CaaS has evolved along the same lines as Software as a Service (SaaS)." }, "219": { "abbreviation.id": 219, "abbreviation.ts": "2018-04-19 01:36:41", "abbreviation.initial": "CAB", "abbreviation.meaning": "In Microsoft program development, a cabinet is a single file created to hold a number of compressed files. A related set of cabinet files can be contained in a folder. During installation of a program, the compressed files in a cabinet are decompressed and copied to an appropriate directory for the user. A cabinet file usually has the file name suffix of \".cab\"." }, "220": { "abbreviation.id": 220, "abbreviation.ts": "2018-04-19 01:36:42", "abbreviation.initial": "cabinet file", "abbreviation.meaning": "In Microsoft program development, a cabinet is a single file created to hold a number of compressed files. A related set of cabinet files can be contained in a folder. During installation of a program, the compressed files in a cabinet are decompressed and copied to an appropriate directory for the user. A cabinet file usually has the file name suffix of \".cab\"." }, "221": { "abbreviation.id": 221, "abbreviation.ts": "2018-04-19 01:36:42", "abbreviation.initial": "cabinet file (.cab)", "abbreviation.meaning": "In Microsoft program development, a cabinet is a single file created to hold a number of compressed files. A related set of cabinet files can be contained in a folder. During installation of a program, the compressed files in a cabinet are decompressed and copied to an appropriate directory for the user. A cabinet file usually has the file name suffix of \".cab\"." }, "222": { "abbreviation.id": 222, "abbreviation.ts": "2018-04-19 01:36:50", "abbreviation.initial": "Cabir", "abbreviation.meaning": "A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. Although mobile phone virus hoaxes have been around for years, the so-called Cabir virus is the first verified example. The virus was created by a group from the Czech Republic and Slovakia called 29a, who sent it to a number of security software companies, including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a \"proof of concept\" virus, because it proves that a virus can be written for mobile phones, something that was once doubted." }, "223": { "abbreviation.id": 223, "abbreviation.ts": "2018-04-19 01:37:00", "abbreviation.initial": "cable", "abbreviation.meaning": "Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. It is primarily used by cable TV companies to connect their satellite antenna facilities to customer homes and businesses. It is also sometimes used by telephone companies to connect central offices to telephone poles near customers. Some homes and offices use coaxial cable, too, but its widespread use as an Ethernet connectivity medium in enterprises and data centers has been supplanted by the deployment of twisted pair cabling." }, "224": { "abbreviation.id": 224, "abbreviation.ts": "2018-04-19 01:37:04", "abbreviation.initial": "cable head-end", "abbreviation.meaning": "A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers. In distributing cable television services, the head-end includes a satellite dish antenna for receiving incoming programming. This programming is then passed on to the subscriber. (Cable TV companies may also play videotapes and originate live programming.) Normally, all signals are those that are sent downstream to the subscriber, but some are received upstream such as when a customer requests a pay-per-view program." }, "225": { "abbreviation.id": 225, "abbreviation.ts": "2018-04-19 01:37:12", "abbreviation.initial": "cable modem", "abbreviation.meaning": "A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN) and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to or integrated with a set-top box that provides your TV set with channels for Internet access. In most cases, cable modems are furnished as part of the cable access service and are not purchased directly and installed by the subscriber." }, "226": { "abbreviation.id": 226, "abbreviation.ts": "2018-04-19 01:37:15", "abbreviation.initial": "cable modem termination system", "abbreviation.meaning": "A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network. A cable modem termination system is located at the local office of a cable television company." }, "227": { "abbreviation.id": 227, "abbreviation.ts": "2018-04-19 01:37:19", "abbreviation.initial": "cable modem termination system (CMTS)", "abbreviation.meaning": "A cable modem termination system (CMTS) is a component that exchanges digital signals with cable modems on a cable network. A cable modem termination system is located at the local office of a cable television company." }, "228": { "abbreviation.id": 228, "abbreviation.ts": "2018-04-19 01:37:23", "abbreviation.initial": "cable TV", "abbreviation.meaning": "Cable TV is also known as \"CATV\" (community antenna television). In addition to bringing television programs to those millions of people throughout the world who are connected to a community antenna, cable TV will likely become a popular way to interact with the World Wide Web and other new forms of multimedia information and entertainment services." }, "229": { "abbreviation.id": 229, "abbreviation.ts": "2018-04-19 01:37:25", "abbreviation.initial": "cable TV or CATV (community antenna ...", "abbreviation.meaning": "Cable TV is also known as \"CATV\" (community antenna television). In addition to bringing television programs to those millions of people throughout the world who are connected to a community antenna, cable TV will likely become a popular way to interact with the World Wide Web and other new forms of multimedia information and entertainment services." }, "230": { "abbreviation.id": 230, "abbreviation.ts": "2018-04-19 01:37:30", "abbreviation.initial": "CableLabs Certified Cable Modems", "abbreviation.meaning": "Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set. DOCSIS 1.0 was ratified by the International Telecommunication Union (ITU-TS) in March of 1998. Although \"DOCSIS\" continues to be used, the newer name emphasizes that the standard is now being used to certify the products of cable modem makers. Cable modems conforming to DOCSIS are now being marketed." }, "231": { "abbreviation.id": 231, "abbreviation.ts": "2018-04-19 01:37:38", "abbreviation.initial": "CAC", "abbreviation.meaning": "1. A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication. CACs are issued as standard identification for active-duty military personnel, reserve personnel, civilian employees, non-DoD government employees, state employees of the National Guard and eligible contractor personnel. In addition to its use as an ID card, a CAC is required for access to government buildings and computer networks." }, "232": { "abbreviation.id": 232, "abbreviation.ts": "2018-04-19 01:37:45", "abbreviation.initial": "CAC", "abbreviation.meaning": "Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony). Call admission control can also be used to ensure, or maintain, a certain level of audio quality in voice communications networks, or a certain level of performance in Internet nodes and servers where VoIP traffic exists." }, "233": { "abbreviation.id": 233, "abbreviation.ts": "2018-04-19 01:37:52", "abbreviation.initial": "cache (computing)", "abbreviation.meaning": "A cache (pronounced CASH) is a place to store something temporarily in a computing environment." }, "234": { "abbreviation.id": 234, "abbreviation.ts": "2018-04-19 01:37:59", "abbreviation.initial": "cache algorithm", "abbreviation.meaning": "A cache algorithm is a detailed list of instructions that directs which items should be discarded in a computing device's cache of information." }, "235": { "abbreviation.id": 235, "abbreviation.ts": "2018-04-19 01:38:04", "abbreviation.initial": "cache coherence", "abbreviation.meaning": "In a shared memory multiprocessor with a separate cache memory for each processor , it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory. When one copy of an operand is changed, the other copies of the operand must be changed also. Cache coherence is the discipline that ensures that changes in the values of shared operands are propagated throughout the system in a timely fashion." }, "236": { "abbreviation.id": 236, "abbreviation.ts": "2018-04-19 01:38:07", "abbreviation.initial": "cache cramming", "abbreviation.meaning": "Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run. The method consists of placing code in the computer's local disk cache when the computer uses Internet Explorer in certain environments." }, "237": { "abbreviation.id": 237, "abbreviation.ts": "2018-04-19 01:38:12", "abbreviation.initial": "cache engine", "abbreviation.meaning": "A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise's bandwidth. Cache servers also allow users to access content offline, including rich media files or other documents. A cache server is sometimes called a \"cache engine.\"" }, "238": { "abbreviation.id": 238, "abbreviation.ts": "2018-04-19 01:38:19", "abbreviation.initial": "cache memory", "abbreviation.meaning": "Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. This memory is typically integrated directly with the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU." }, "239": { "abbreviation.id": 239, "abbreviation.ts": "2018-04-19 01:38:22", "abbreviation.initial": "cache poisoning", "abbreviation.meaning": "Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location." }, "240": { "abbreviation.id": 240, "abbreviation.ts": "2018-04-19 01:38:26", "abbreviation.initial": "cache poisoning (domain name system ...", "abbreviation.meaning": "Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location." }, "241": { "abbreviation.id": 241, "abbreviation.ts": "2018-04-19 01:38:30", "abbreviation.initial": "cache server", "abbreviation.meaning": "A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise's bandwidth. Cache servers also allow users to access content offline, including rich media files or other documents. A cache server is sometimes called a \"cache engine.\"" }, "242": { "abbreviation.id": 242, "abbreviation.ts": "2018-04-19 01:38:37", "abbreviation.initial": "cache thrash", "abbreviation.meaning": "Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system. A key sign of cache thrashing is high CPU usage or a system that seems to be running very slowly. In thrashing, the computer will typically take the same actions over and over in an attempt to complete the desired task. One process diverts resources from another process, which in turn must take resources from another process in a vicious cycle if the total resources available are insufficient. For example, a translation lookaside buffer (TLB) may have to be completely reloaded to capture data on each sweep if the CPU cannot address the total number of pages involved. This means there is no TLB cache reuse, leading to inefficiency and long load times. In this case, thrashing can be occurring even if there are no page faults." }, "243": { "abbreviation.id": 243, "abbreviation.ts": "2018-04-19 01:38:46", "abbreviation.initial": "cached", "abbreviation.meaning": "A cache (pronounced CASH) is a place to store something temporarily in a computing environment." }, "244": { "abbreviation.id": 244, "abbreviation.ts": "2018-04-19 01:38:54", "abbreviation.initial": "caching", "abbreviation.meaning": "Caching (pronounced “cashing”) is the process of storing data in a cache." }, "245": { "abbreviation.id": 245, "abbreviation.ts": "2018-04-19 01:39:02", "abbreviation.initial": "CACS", "abbreviation.meaning": "A computer assisted coding system (CACS) is software that analyzes healthcare documents and produces appropriate medical codes for specific phrases and terms within the document." }, "246": { "abbreviation.id": 246, "abbreviation.ts": "2018-04-19 01:39:10", "abbreviation.initial": "CAD", "abbreviation.meaning": "CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models." }, "247": { "abbreviation.id": 247, "abbreviation.ts": "2018-04-19 01:39:15", "abbreviation.initial": "CAD", "abbreviation.meaning": "CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices." }, "248": { "abbreviation.id": 248, "abbreviation.ts": "2018-04-19 01:39:19", "abbreviation.initial": "CAD (computer-aided design)", "abbreviation.meaning": "CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models." }, "249": { "abbreviation.id": 249, "abbreviation.ts": "2018-04-19 01:39:21", "abbreviation.initial": "CAD/CAM (computer-aided design/...", "abbreviation.meaning": "CAD /CAM (computer-aided design/computer-aided manufacturing) is software used to design products such as electronic circuit boards in computers and other devices." }, "250": { "abbreviation.id": 250, "abbreviation.ts": "2018-04-19 01:39:27", "abbreviation.initial": "caddy", "abbreviation.meaning": "A caddy is the plastic case that enclosed a CD-ROM disk in the period when players required them. Early CD-ROM disks were always enclosed in a caddy and the caddy was inserted in the player. More recent CD-ROM players, following the compact disc players, provide a tray on which you can directly lay the CD-ROM disk. A caddy is not to be confused with the so-called plastic \"jewel case\" that some CD-ROM disks come in. These are mainly provided for marketing and storage protection purposes." }, "251": { "abbreviation.id": 251, "abbreviation.ts": "2018-04-19 01:39:35", "abbreviation.initial": "CADE", "abbreviation.meaning": "CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers. CADE was introduced in a joint repot from the Uptime Institute and McKinsey that proposed the metric as a single key performance indicator that could be used to compare the energy consumption of one data center against another. CADE combines measurements of the energy efficiency and utilization of IT equipment and facilities into a single percentage. A higher CADE indicates a more energy efficient data center. The formula for CADE is: CADE = Facility Efficiency (FE) x Asset Efficiency (AE)" }, "252": { "abbreviation.id": 252, "abbreviation.ts": "2018-04-19 01:39:35", "abbreviation.initial": "CADE (Corporate Average Data center ...", "abbreviation.meaning": "CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers. CADE was introduced in a joint repot from the Uptime Institute and McKinsey that proposed the metric as a single key performance indicator that could be used to compare the energy consumption of one data center against another. CADE combines measurements of the energy efficiency and utilization of IT equipment and facilities into a single percentage. A higher CADE indicates a more energy efficient data center. The formula for CADE is: CADE = Facility Efficiency (FE) x Asset Efficiency (AE)" }, "253": { "abbreviation.id": 253, "abbreviation.ts": "2018-04-19 01:39:39", "abbreviation.initial": "cadmium telluride (CdTe) photovoltaics", "abbreviation.meaning": "Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic cells that convert sunlight into DC (direct current) electricity. Photovoltaic (PV) cells are an integral part of solar-electric energy systems, which are becoming increasingly important as alternative sources of utility power." }, "254": { "abbreviation.id": 254, "abbreviation.ts": "2018-04-19 01:39:40", "abbreviation.initial": "cadmium telluride photovoltaics", "abbreviation.meaning": "Cadmium telluride (CdTe) photovoltaics is a technology that uses the compound cadmium telluride (CdTe) as the semiconductor material in photovoltaic cells that convert sunlight into DC (direct current) electricity. Photovoltaic (PV) cells are an integral part of solar-electric energy systems, which are becoming increasingly important as alternative sources of utility power." }, "255": { "abbreviation.id": 255, "abbreviation.ts": "2018-04-19 01:39:45", "abbreviation.initial": "CAE", "abbreviation.meaning": "CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes. CAE includes CAD (computer-aided design) - the use of a computer for drafting and modeling designs, and CAM (computer-aided manufacturing) - the use of computers for managing manufacturing processes." }, "256": { "abbreviation.id": 256, "abbreviation.ts": "2018-04-19 01:39:48", "abbreviation.initial": "CAE (computer-aided engineering)", "abbreviation.meaning": "CAE (computer-aided engineering) is a broad term used by the electronic design automation (EDA) industry for the use of computers to design, analyze, and manufacture products and processes. CAE includes CAD (computer-aided design) - the use of a computer for drafting and modeling designs, and CAM (computer-aided manufacturing) - the use of computers for managing manufacturing processes." }, "257": { "abbreviation.id": 257, "abbreviation.ts": "2018-04-19 01:40:00", "abbreviation.initial": "CAES", "abbreviation.meaning": "Compressed air energy storage (CAES) is a way to store massive amounts of renewable power by compressing air at very high pressures and storing it in large underground caverns, depleted wells or aquifers. The compressed air can be released and run through turbines to generate power when wind turbines and solar plants reduce output and power is needed. Hundreds of hours of output can be stored, providing the ability to cover long doldrum wind periods or a series of cloudy days." }, "258": { "abbreviation.id": 258, "abbreviation.ts": "2018-04-19 01:40:08", "abbreviation.initial": "CAIQ (Consensus Assessments Initiative ...", "abbreviation.meaning": "The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider." }, "259": { "abbreviation.id": 259, "abbreviation.ts": "2018-04-19 01:40:15", "abbreviation.initial": "cal", "abbreviation.meaning": "The calorie (symbolized cal) is a unit of heat occasionally used in the centimeter-gram-second ( cgs ) system of physical units. Heat is a form of kinetic energy transfer from one medium or object to another." }, "260": { "abbreviation.id": 260, "abbreviation.ts": "2018-04-19 01:40:20", "abbreviation.initial": "CalConnect", "abbreviation.meaning": "CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further \"the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.\" To that end, CalConnect seeks to promote understanding of, and mechanisms for, interoperable methodologies, tools, and applications that incorporate or use calendaring and scheduling data." }, "261": { "abbreviation.id": 261, "abbreviation.ts": "2018-04-19 01:40:21", "abbreviation.initial": "CalConnect (Calendaring and Scheduling ...", "abbreviation.meaning": "CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further \"the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.\" To that end, CalConnect seeks to promote understanding of, and mechanisms for, interoperable methodologies, tools, and applications that incorporate or use calendaring and scheduling data." }, "262": { "abbreviation.id": 262, "abbreviation.ts": "2018-04-19 01:40:27", "abbreviation.initial": "calculator", "abbreviation.meaning": "1) A calculator is a device that performs arithmetic operations on numbers. The simplest calculators can do only addition, subtraction, multiplication, and division. More sophisticated calculators can handle exponent ial operations, roots, logarithm s, trigonometric functions, and hyperbolic functions. Internally, some calculators actually perform all of these functions by repeated processes of addition." }, "263": { "abbreviation.id": 263, "abbreviation.ts": "2018-04-19 01:40:39", "abbreviation.initial": "CALEA", "abbreviation.meaning": "CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security. CALEA originated in the House of Representatives as bill H.R. 4922 and in the Senate as bill S. 2375. CALEA was signed into law by President Clinton on October 25, 1994." }, "264": { "abbreviation.id": 264, "abbreviation.ts": "2018-04-19 01:40:41", "abbreviation.initial": "CALEA (Communications Assistance for ...", "abbreviation.meaning": "CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security. CALEA originated in the House of Representatives as bill H.R. 4922 and in the Senate as bill S. 2375. CALEA was signed into law by President Clinton on October 25, 1994." }, "265": { "abbreviation.id": 265, "abbreviation.ts": "2018-04-19 01:40:41", "abbreviation.initial": "Calendaring and Scheduling Consortium", "abbreviation.meaning": "CalConnect is the public name for the Calendaring and Scheduling Consortium, an industry and public organization created to further \"the interoperable exchange of calendaring and scheduling information between dissimilar programs, platforms, and technologies.\" To that end, CalConnect seeks to promote understanding of, and mechanisms for, interoperable methodologies, tools, and applications that incorporate or use calendaring and scheduling data." }, "266": { "abbreviation.id": 266, "abbreviation.ts": "2018-04-19 01:40:46", "abbreviation.initial": "calibrate", "abbreviation.meaning": "In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure. For example, the brightness or black level of a video display can be calibrated using a PLUGE pattern ." }, "267": { "abbreviation.id": 267, "abbreviation.ts": "2018-04-19 01:40:53", "abbreviation.initial": "Calibrated Vectored Cooling", "abbreviation.meaning": "Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density. CVC optimizes the path of air flow through the equipment, increasing the efficiency with which heat is removed." }, "268": { "abbreviation.id": 268, "abbreviation.ts": "2018-04-19 01:40:56", "abbreviation.initial": "Calibrated Vectored Cooling (CVC)", "abbreviation.meaning": "Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density. CVC optimizes the path of air flow through the equipment, increasing the efficiency with which heat is removed." }, "269": { "abbreviation.id": 269, "abbreviation.ts": "2018-04-19 01:41:00", "abbreviation.initial": "calibration", "abbreviation.meaning": "In information technology and other fields, calibration is the setting or correcting of a measuring device or base level, usually by adjusting it to match or conform to a dependably known and unvarying measure. For example, the brightness or black level of a video display can be calibrated using a PLUGE pattern ." }, "270": { "abbreviation.id": 270, "abbreviation.ts": "2018-04-19 01:41:07", "abbreviation.initial": "California Primary Care Association", "abbreviation.meaning": "The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state. The CPCA is one of three members of Cal-REC (Regional Extension Center); the California Medical Association and the California Association of Public Hospitals are the other members." }, "271": { "abbreviation.id": 271, "abbreviation.ts": "2018-04-19 01:41:09", "abbreviation.initial": "California Primary Care Association (...", "abbreviation.meaning": "The California Primary Care Association (CPCA) is an organization that represents more than 800 nonprofit community clinics and health centers in the state. The CPCA is one of three members of Cal-REC (Regional Extension Center); the California Medical Association and the California Association of Public Hospitals are the other members." }, "272": { "abbreviation.id": 272, "abbreviation.ts": "2018-04-19 01:41:15", "abbreviation.initial": "California Security Breach Information ...", "abbreviation.meaning": "In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised. The Act stipulates that if there's a security breach of a database containing personal data, the responsible organization must notify each individual for whom it maintained information. The Act, which went into effect July 1, 2003, was created to help stem the increasing incidence of identity theft. According to the Federal Trade Commission, the organization received 214,905 complaints of identity theft in 2003, up 40% from 2002." }, "274": { "abbreviation.id": 274, "abbreviation.ts": "2018-04-19 01:41:21", "abbreviation.initial": "call admission control", "abbreviation.meaning": "Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony). Call admission control can also be used to ensure, or maintain, a certain level of audio quality in voice communications networks, or a certain level of performance in Internet nodes and servers where VoIP traffic exists." }, "275": { "abbreviation.id": 275, "abbreviation.ts": "2018-04-19 01:41:22", "abbreviation.initial": "call admission control (CAC)", "abbreviation.meaning": "Call admission control (CAC) is the practice or process of regulating traffic volume in voice communications, particularly in wireless mobile networks and in VoIP (voice over Internet Protocol, also known as Internet telephony). Call admission control can also be used to ensure, or maintain, a certain level of audio quality in voice communications networks, or a certain level of performance in Internet nodes and servers where VoIP traffic exists." }, "276": { "abbreviation.id": 276, "abbreviation.ts": "2018-04-19 01:41:30", "abbreviation.initial": "call center", "abbreviation.meaning": "A call center is a centralized department to which phone calls from current and potential customers are directed. Call centers can handle inbound and/or outbound calls, and be located either within a company or outsourced to another company that specializes in handling calls." }, "277": { "abbreviation.id": 277, "abbreviation.ts": "2018-04-19 01:41:36", "abbreviation.initial": "call center agent (call center ...", "abbreviation.meaning": "A call center agent is a person who handles incoming or outgoing customer calls for a business. A call center agent might handle account inquiries, customer complaints or support issues. A call center agent who manages both incoming and outgoing customer calls is also referred to as a blended agent. Other names for a call center agent include customer service representative (CSR), contact center agent, telephone sales or service representative (TSR), attendant, associate, operator, account executive or team member." }, "278": { "abbreviation.id": 278, "abbreviation.ts": "2018-04-19 01:41:41", "abbreviation.initial": "call center schedule adherence", "abbreviation.meaning": "What is call center schedule adherence?" }, "279": { "abbreviation.id": 279, "abbreviation.ts": "2018-04-19 01:41:48", "abbreviation.initial": "call center shrinkage", "abbreviation.meaning": "Call center shrinkage is a measure of how much time is lost in the call center because of things like bathroom breaks, call backs, paperwork, team meetings or training. Shrinkage, which is represented by a percentage, is used to calculate how many agents should be scheduled to work a shift so that all calls can be answered in a timely manner." }, "280": { "abbreviation.id": 280, "abbreviation.ts": "2018-04-19 01:41:55", "abbreviation.initial": "Call Center Terms: Glossary", "abbreviation.meaning": "This glossary contains terms commonly used when discussing call center operations." }, "281": { "abbreviation.id": 281, "abbreviation.ts": "2018-04-19 01:42:00", "abbreviation.initial": "call control", "abbreviation.meaning": "Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established. In voice over Internet Protocol (VoIP) systems, call control is used to control connections between H.323 endpoints, or between an endpoint and a gatekeeper. H.323 is an International Telecommunication Union (ITU) standard for digital communication between terminals, network equipment and services." }, "282": { "abbreviation.id": 282, "abbreviation.ts": "2018-04-19 01:42:10", "abbreviation.initial": "call deflection", "abbreviation.meaning": "Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy. Call deflection is one of several forms of call diversion (also known as call forwarding) defined under the H.450.3 specification." }, "283": { "abbreviation.id": 283, "abbreviation.ts": "2018-04-19 01:42:16", "abbreviation.initial": "call detail record", "abbreviation.meaning": "A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period. The format of the CDR varies among VoIP providers or programs. Some programs allow CDRs to be configured by the user." }, "284": { "abbreviation.id": 284, "abbreviation.ts": "2018-04-19 01:42:19", "abbreviation.initial": "call detail record (CDR)", "abbreviation.meaning": "A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period. The format of the CDR varies among VoIP providers or programs. Some programs allow CDRs to be configured by the user." }, "285": { "abbreviation.id": 285, "abbreviation.ts": "2018-04-19 01:42:23", "abbreviation.initial": "call failure rate", "abbreviation.meaning": "The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through. The CFR is commonly used as a statistical measure in assessing Internet service providers. Companies can also measure the CFR for their own employees who dial in for access to the company's network. Rating companies report on the CFRs for major ISPs like AOL, Ameritech and Mindspring. Visual Networks, formerly Inverse Network Technology, is one the best known benchmarking company of ISPs." }, "286": { "abbreviation.id": 286, "abbreviation.ts": "2018-04-19 01:42:24", "abbreviation.initial": "call failure rate (CFR)", "abbreviation.meaning": "The call failure rate (CFR) is the percentage of calls to an ISP or any network provider that fail to get through. The CFR is commonly used as a statistical measure in assessing Internet service providers. Companies can also measure the CFR for their own employees who dial in for access to the company's network. Rating companies report on the CFRs for major ISPs like AOL, Ameritech and Mindspring. Visual Networks, formerly Inverse Network Technology, is one the best known benchmarking company of ISPs." }, "287": { "abbreviation.id": 287, "abbreviation.ts": "2018-04-19 01:42:27", "abbreviation.initial": "call forwarding", "abbreviation.meaning": "Call forwarding is a telephone service that automatically routes the user's incoming calls to another number. The process may involve use of a virtual phone number. In a find me / follow me service, call forwarding may allow calls to be routed to the user at any location or to route calls through a number of different phone numbers or other applications, such as voice e-mail or text messaging." }, "288": { "abbreviation.id": 288, "abbreviation.ts": "2018-04-19 01:42:36", "abbreviation.initial": "call logging", "abbreviation.meaning": "Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between call center agents and callers. These practice is used for staff training and development, customer quality control and liability protection." }, "289": { "abbreviation.id": 289, "abbreviation.ts": "2018-04-19 01:42:37", "abbreviation.initial": "call monitoring", "abbreviation.meaning": "Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between call center agents and callers. These practice is used for staff training and development, customer quality control and liability protection." }, "290": { "abbreviation.id": 290, "abbreviation.ts": "2018-04-19 01:42:38", "abbreviation.initial": "call recording", "abbreviation.meaning": "Call logging (also known as call recording or call monitoring) is the practice of listening to, recording and assessing interactions between call center agents and callers. These practice is used for staff training and development, customer quality control and liability protection." }, "291": { "abbreviation.id": 291, "abbreviation.ts": "2018-04-19 01:42:44", "abbreviation.initial": "call signaling", "abbreviation.meaning": "Call signaling is a process that is used to set up a connection in a telephone network. Call signaling processes include: authentication, to verify the identities of the calling and called parties; authorization, to ensure that the network is not misused and to minimize the risk of denial-of-service (DOS ) attacks; and communications security, to help prevent eavesdropping or manipulation of message content." }, "292": { "abbreviation.id": 292, "abbreviation.ts": "2018-04-19 01:42:53", "abbreviation.initial": "call to action", "abbreviation.meaning": "A call to action, in marketing, is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step." }, "293": { "abbreviation.id": 293, "abbreviation.ts": "2018-04-19 01:42:56", "abbreviation.initial": "call tree", "abbreviation.meaning": "A call tree is a layered hierarchical communication model used to notify specific individuals of an event -- typically unplanned in nature -- and coordinate recovery, if necessary. A call tree is also known as a phone tree, call list, phone chain or text chain." }, "294": { "abbreviation.id": 294, "abbreviation.ts": "2018-04-19 01:43:02", "abbreviation.initial": "callback", "abbreviation.meaning": "Callback, also known as international callback , is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call. Here's how the procedure works:" }, "295": { "abbreviation.id": 295, "abbreviation.ts": "2018-04-19 01:43:06", "abbreviation.initial": "callback (international callback)", "abbreviation.meaning": "Callback, also known as international callback , is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call. Here's how the procedure works:" }, "296": { "abbreviation.id": 296, "abbreviation.ts": "2018-04-19 01:43:13", "abbreviation.initial": "callback messaging", "abbreviation.meaning": "Callback messaging, in a call center context, is a service that allows callers to leave a message (usually personal contact information, either spoken or through the number pad) so that an agent can call them back and they retain their place in the queue. Frequently used when call volume is high, callback messaging offers the caller an alternative to either holding on the line or losing their place in the response sequence." }, "297": { "abbreviation.id": 297, "abbreviation.ts": "2018-04-19 01:43:23", "abbreviation.initial": "caller ID spoofing", "abbreviation.meaning": "Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display. Just as e-mail spoofing can make it appear that a message came from any e-mail address the sender chooses, caller ID spoofing can make a call appear to come from any phone number the caller wishes." }, "298": { "abbreviation.id": 298, "abbreviation.ts": "2018-04-19 01:43:31", "abbreviation.initial": "CallXML", "abbreviation.meaning": "CallXML is a language based on the Extensible Markup Language (XML) that lets a company describe a phone-to-Web site application in terms of how the call would be handled at the Web site and how it would interact with the caller based on keyed-in or voice responses. CallXML is similar to other voice markup languages such as VoiceXML and Microsoft's WTE." }, "299": { "abbreviation.id": 299, "abbreviation.ts": "2018-04-19 01:43:39", "abbreviation.initial": "calm technology", "abbreviation.meaning": "In computing, calm technology aims to reduce the \"excitement\" of information overload by letting the user select what information is at the center of their attention and what information is peripheral. The term was coined by Mark Weiser, chief technologist, and John Seeley Brown, director of the Xerox Palo Alto Research Lab. In the coming age of ubiquitous computing in which technology will become at once pervasive yet invisible, Weiser and Brown foresee the need for design principles and methods that enable users to sense and control what immediately interests them while retaining peripheral awareness of other information possibilities that they can at any time choose to focus on. Calm technology, they envision, will not only relax the user but, by moving unneeded information to the edge of an interface, allow more information to exist there, ready for selection when needed. An example: a video conference may be a calmer interface than a phone conference because the explicit visual knowledge of details that are peripheral gives participants more confidence in what can be focused on and what can be left at the edge. (Think of phone conferences in which participants are never quite sure who has entered or left the room at the other end. This lack of information is not necessarily calming!) Knowledge of the periphery gives us \"locatedness\" without unduly distracting us." }, "300": { "abbreviation.id": 300, "abbreviation.ts": "2018-04-19 01:43:45", "abbreviation.initial": "CALMS", "abbreviation.meaning": "CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization. The CALMS framework is often used as a maturity model, helping managers to evaluate whether or not their organization is ready for DevOps -- and if not, what needs to change. The acronym CALMS is credited to Jez Humble, co-author of \"The DevOps Handbook.\"" }, "301": { "abbreviation.id": 301, "abbreviation.ts": "2018-04-19 01:43:49", "abbreviation.initial": "D", "abbreviation.meaning": "D is one of two programming languages." }, "302": { "abbreviation.id": 302, "abbreviation.ts": "2018-04-19 01:43:55", "abbreviation.initial": "D AMPS", "abbreviation.meaning": "D-AMPS is now called Time Division Multiple Access/IS-136." } } } }