Browse Definitions :

Browse Definitions by Alphabet

I - IDE

  • I and T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • I&T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • i.LINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • I.T. - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • I/O - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • I/O fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • I/O fencing (input/output fencing) - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • I/O virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • I18N - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
  • IaaS - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • IAB - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
  • IAB (Internet Architecture Board) - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
  • IAM system - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • IANA - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
  • IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization that oversees the allocation of IP addresses to internet service providers (ISPs).
  • IAP - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAX - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM Cloud Functions - IBM Cloud Functions is the company’s software underlying cloud applications to provide granular access control to cloud resources.
  • IBM Daksh (IBM Global Process Services) - IBM Daksh, also known as IBM Global Process Services, is a business process outsourcing (BPO) firm that was formerly known as Daksh eServices.
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM i - IBM i is an operating system (OS) created to run on IBM’s Power Systems and Pure Systems for minicomputers and enterprise servers.
  • IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
  • IBM iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • IBM MobileFirst - IBM MobileFirst is a group of products designed to simplify and accelerate mobile adoption by offering mobile application development and management in a single package.
  • IBM MobileFirst Platform Foundation (formerly IBM Worklight) - IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.
  • IBM OpenPages - IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives.
  • IBM PartnerWorld - IBM PartnerWorld is a program run by IBM that outlines how the company works with IBM Business Partners such as VARs, systems integrators, managed service providers, consultants and independent software vendors.
  • IBM Power9 Server - IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IBM SmartCloud - IBM SmartCloud is a line of enterprise-class cloud computing technologies and services for building and using private, public and hybrid clouds.
  • IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • IBM System z Application Assist Processor (zAAP) - The IBM System z Application Assist Processor (zAAP) is a specialty engine that provides a performance environment for Web-based apps and service-oriented architecture-based technologies, e.
  • IBM System z Integrated Information Processor (zIIP) - IBM's System z Integrated Information Processor (zIIP) is a specialty offload engine that helps improve computing performance for a subset of mainframe workloads.
  • IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
  • IBM Watson Assistant - IBM Watson Assistant is a white label cloud service that allows enterprise-level software developers to embed a virtual assistant (VA) in the software they are developing and brand the VA as their own.
  • IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
  • IC - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • IC BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • IC-BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • IC-BPMS (integration-centric business process management suite) - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
  • ICANN - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
  • ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
  • ICD-10-CM - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
  • ICD-11 - The International Classification of Disease, Eleventh Revision (ICD-11) is a system of medical coding created by the World Health Organization (WHO) for documenting diseases, signs and symptoms, diagnoses and social circumstances.
  • ICD-9-CM - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • ICE - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • ICE - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • Ice Cream Sandwich - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
  • Ice Lake - Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.
  • IceWarp - IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • IcM - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • ICM file - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • ICM file (Image Color Matching file) - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • ICMP - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • ICMP sweep - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
  • ICO - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • icon - In a computer's graphical user interface (GUI), an icon (pronounced EYE-kahn) is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user.
  • ICR - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • ICS - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
  • ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • ICT - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • ID - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • ID management - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
  • ID3 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • ID3 tag - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • ID3v1 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • ID3v2 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • IDaaS - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • IDE - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • IDE - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • IDEA - IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.
  • ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • identification chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • identity access management system - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • identity as a Service - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • identity as a Service (IDaaS) - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • identity card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close