Part of the Computing fundamentals glossary:

Based on our inferences about the only three uses of this term that we have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee , from Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no matter how much it is used or accessed by another thing or action. For example, in computer programming, it would usually be desirable for a table that was updated by different sources to reflect the same updated information whether that information was sent in once or many times. A method that ensured such integrity could be said to provide indempotency.

This was last updated in April 2005
Posted by: Margaret Rouse

Related Terms

Definitions

  • term boosting

    - Term boosting is the ability to assign higher importance to specific words in a search engine query. In Google, for example, advanced search options allow you to identify words that must be found i... (WhatIs.com)

  • greedy algorithm

    - A greedy algorithm is a mathematical process that looks for simple, easy-to-implement solutions to complex, multi-step problems by deciding which next step will provide the most obvious benefit. (WhatIs.com)

  • PARC (Palo Alto Research Center)

    - PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley. PARC was incorporated as an independent, wholly-owned s... (WhatIs.com)

Glossaries

  • Computing fundamentals

    - Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About indempotencyPowered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.