Browse Definitions :

Browse Definitions by Alphabet

  • I/O (input/output) - I/O (input/output), pronounced "eye-oh," describes any operation, program or device that transfers data to or from a computer.
  • IBM (International Business Machines Corporation) - IBM (International Business Machines Corporation) is a multinational technology company headquartered in Armonk, N.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner was a supercomputer developed by IBM at the Los Alamos National Laboratory in New Mexico.
  • IBM Watson supercomputer - Watson was a supercomputer designed and developed by IBM.
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
  • ICD-10 (International Classification of Diseases, 10th Revision) - The International Classification of Diseases, 10th Revision (ICD-10), is a global standard for classifying and coding mortality and morbidity data.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS (International Classification of Diseases, 10th Revision, Procedure Coding System) - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is an American adaptation of the World Health Organization's ICD-10 system, tailored for procedural coding in inpatient and hospital settings.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
  • ICT (information and communications technology or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is a decentralized movement dedicated to making access to digital technologies more equitable, with the goals of bridging the digital divide and advancing global economic development.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
  • identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
  • identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
  • identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
  • IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
  • IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • IEEE 802 wireless standards - IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless.
  • IEEE 802.3 - 802.3, or IEEE 802.
  • IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • image metadata - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in digital images.
  • image-based backup - Image-based backup creates a copy of an operating system and all the data associated with it, including the system state and application configurations.
  • image-to-image translation - Image-to-image translation is a generative artificial intelligence (AI) technique that translates a source image into a target image while preserving certain visual properties of the original image.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-memory analytics - In-memory analytics is an approach to querying data residing in a computer's random access memory (RAM) as opposed to querying data stored on physical drives.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created internet content, thereby having potential customers come to the organization rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
  • inception score (IS) - The inception score (IS) is a mathematical algorithm used to measure or determine the quality of images created by generative AI through a generative adversarial network (GAN).
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • incumbent local exchange carrier (ILEC) - An incumbent local exchange carrier (ILEC) is a type of U.
  • Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
  • indicators of compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductive argument - An inductive argument is an assertion that uses specific premises or observations to make a broader generalization.
  • inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
  • inductor - An inductor is a passive electronic component that temporarily stores energy in a magnetic field when electric current flows through the inductor's coil.
  • industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
  • industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
  • infinite loop (endless loop) - An infinite loop -- sometimes called an endless loop -- is a piece of code that lacks a functional exit so that it repeats indefinitely.
  • infographic - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age is the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information asset - An information asset is a collection of knowledge or data that is organized, managed and valuable.
  • information assurance (IA) - Information assurance (IA) is the practice of protecting physical and digital information and the systems that support the information.
  • information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • information lifecycle management (ILM) - Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, starting with its creation and acquisition through when it becomes obsolete and is deleted.
  • information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
  • information rights management (IRM) - Information rights management (IRM) is a discipline that involves managing, controlling and securing content from unwanted access.
  • information security (infosec) - Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information.
  • information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
  • information systems (IS) - An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information.
  • information technology (IT) - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • information technology (IT) director - An information technology (IT) director is the person in charge of technology within an organization.
  • Information Technology Amendment Act 2008 (IT Act 2008) - The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act 2000.
  • infrared radiation (IR) - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nm to 1 mm.
  • infrastructure (IT infrastructure) - Infrastructure is the foundation or framework that supports a system or organization.
  • Infrastructure as a Service (IaaS) - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • infrastructure as code (IaC) - Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.
  • ingress filtering - Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network.
  • initial program load (IPL) - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • initial public offering (IPO) - An initial public offering (IPO) is the event when a privately held organization initially offers stock shares in the company on a public stock exchange.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close