MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with C
  • Centralized Backup

    A process that involves automatically replicating data from remote sites and sending it over a network to a main (centralized) location for storage. It can be used to automate backups  and potentially reduce backup administration costs.

  • Cerillion

    Cerillion is a popular service provider in enterprise billing, charging and customer management systems. Based out of UK, the company focuses on delivering solutions to a range of industries including telecommunications, finance, utilities and transportation.

  • Certification in IT Project Management (CITPM)

    The Certification in IT Project Management (CITPM), is a Project Management Certification awarded by the Singapore Computer Society (SCS) and endorsed by Infocomm Development Authority of Singapore (IDA), is a hallmark of accredited competence and professionalism in IT project management.

  • Certified Ethical Hacker (CEH)

    Certified Ethical Hacker (CEH) is a professional qualification of hackers obtained in assessing the security of computer systems, using penetration testing techniques. A CEH is hired to locate and repair application and system security vulnerabilities to preempt exploitations by black hat hackers and others with potentially illegal intentions.

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA . The CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents.

  • Certified Information Systems Auditor (CISA)

    A certification issued by the Information Systems Audit and Control Association (ISACA). The purpose of the certification is to assist employers in hiring auditors who are skilled in measuring and assessing IT controls.

  • Certified Information Systems Security Professional (CISSP)

    The exam is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. 

  • Certified Internet Webmaster (CIW)

    A set of courses and exams that, when completed successfully, certifies an individual as capable in Web site development and server administration, including security and e-commerce. 

  • Certified Software Tester (CSTE)

    A Certified Software Tester (CSTE) certification is an initial qualification awarded to professionals who have showcased their level of competence in the principles and practices of quality control in the IT profession.

  • Certified Wireless Networking Professional (CWNP)

    The name for the family of wireless certifications from Planet3Wireless. This is an entry-level certification for network administrators who implement or maintain wireless networks as part of a traditional networking environment.

  • Ceylon

    Ceylon is an object-oriented, strongly statically typed programming language with an emphasis on immutability, created by Red Hat. It is based on the Java programming language. Ceylon programs run on the Java Virtual Machine, and can be compiled to JavaScript.

  • CFML (ColdFusion Markup Language)

    A Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically in response to variables such as user input. 

  • CGEIT

    CGEIT certification is designed for IT professionals who manage, provide advisory and assurance services and who support the governance of an enterprise’s IT.

  • Chaining Message Authentication Code Protocol (CCMP)

    An encryption protocol that forms part of the 802.11i standard for wireless local area networks (WLANs), particularly those using WiMax technology. CCMP offers enhanced security such as minimizing  vulnerability to replay attacks.

  • Challenge-Response Authentication Mechanism (CRAM)

    The two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP). The two levels are basic authentication and digest authentication.

  • Challenge-Response system

    A program that replies to an e-mail message from an unknown sender by subjecting the sender to a test (called a CAPTCHA) designed to differentiate humans from automated senders. 

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to