Browse Definitions :
Definition

Indian Institute of Technology (IIT)

The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists. 

Designated as institutes of national importance, the IITs were set up to boost industrial development and manufacturing by creating an elite pool of engineering talent within the country.

Governed by the IIT Act of 1961, the IITs are autonomous institutes with their own boards of directors. IIT Kharagpur was the first institute to be set up in 1951, followed by IIT Bombay in 1958, IIT Madras and IIT Kanpur in 1959, IIT Delhi in 1961, IIT Guwahati in 1994 and IIT Roorkee in 2001. In 2011, the IIT Act was amended to add more institutes to the list.

As of the 2013 academic year, admissions to these institutes take place through a joint entrance examination (IIT-JEE), which will be conducted in two stages - 'IIT-JEE Main' and 'IIT-JEE Advanced' - with candidates getting filtered out at each stage.

Many IITs, in collaboration with external entities, have established incubation centers to encourage entrepreneurship within the country including:

  • 'Entrepreneurship Cell'  at IIT Kharagpur
  • 'C-TIDES' and 'TeNeT' at IIT Madras 
  • 'Society for Innovation and Entrepreneurship' at IIT Bombay 
  • 'SIDBI Innovation and Incubation Center' ay IIT Kanpur 
  • 'Entrepreneurial Development Cell' at IIT Guwahati, IIT Delhi and IIT Roorkee.

 

This was last updated in August 2012

Continue Reading About Indian Institute of Technology (IIT)

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close