Browse Definitions :

Browse Definitions by Alphabet

I - ICT

  • I and T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • I SPY Act Internet Spyware Prevention Act of 2005 - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
  • I&T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • i-Net - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
  • I-SPY Act -- Internet Spyware Prevention Act of 2005 - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
  • i.LINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • I.T. - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • I/O - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • I/O fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • I/O fencing (input/output fencing) - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • I/O virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • I18N - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
  • I2C - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
  • I2C bus - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
  • I2S - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
  • i5 - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • i5 Series - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • IaaS - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • IAB - The IAB (Internet Advertising Bureau) is an organization that fosters the growth of advertising on the Internet.
  • IAB - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
  • IAB (Internet Architecture Board) - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
  • IAM - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • IAM system - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • IANA - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
  • IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
  • IAO - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • IAP - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAS 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • IAX - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IBM - Big Blue refers to IBM, which has used blue as a branding color in its logo and elsewhere.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM Bluemix Local - IBM Bluemix Local is a private version of the IBM Bluemix public cloud platform.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM Cloud Functions - IBM Cloud Functions is the company’s software underlying cloud applications to provide granular access control to cloud resources.
  • IBM Daksh (IBM Global Process Services) - IBM Daksh, also known as IBM Global Process Services, is a business process outsourcing (BPO) firm that was formerly known as Daksh eServices.
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM i - IBM i is an operating system (OS) created to run on IBM’s Power Systems and Pure Systems for minicomputers and enterprise servers.
  • IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
  • IBM iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • IBM Lotus Instant Messaging & Web Conferencing - Sametime is software from Lotus for group collaboration over the Internet.
  • IBM MobileFirst - IBM MobileFirst is a group of products designed to simplify and accelerate mobile adoption by offering mobile application development and management in a single package.
  • IBM MobileFirst Platform Foundation (formerly IBM Worklight) - IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.
  • IBM OpenPages - IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives.
  • IBM PartnerWorld - IBM PartnerWorld is a program run by IBM that outlines how the company works with IBM Business Partners such as VARs, systems integrators, managed service providers, consultants and independent software vendors.
  • IBM Power9 Server - IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IBM SmartCloud - IBM SmartCloud is a line of enterprise-class cloud computing technologies and services for building and using private, public and hybrid clouds.
  • IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • IBM System z Application Assist Processor (zAAP) - The IBM System z Application Assist Processor (zAAP) is a specialty engine that provides a performance environment for Web-based apps and service-oriented architecture-based technologies, e.
  • IBM System z Integrated Information Processor (zIIP) - IBM's System z Integrated Information Processor (zIIP) is a specialty offload engine that helps improve computing performance for a subset of mainframe workloads.
  • IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
  • IBM Watson Assistant - IBM Watson Assistant is a white label cloud service that allows enterprise-level software developers to embed a virtual assistant (VA) in the software they are developing and brand the VA as their own.
  • IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
  • IBM Workplace - Lotus Workplace is a set of customizable online work collaboration products from IBM's Lotus division.
  • IC - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • IC BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • IC-BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • IC-BPMS (integration-centric business process management suite) - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
  • ICANN - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
  • ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
  • ICD-10-CM - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
  • ICD-11 - The International Classification of Disease, Eleventh Revision (ICD-11) is a system of medical coding created by the World Health Organization (WHO) for documenting diseases, signs and symptoms, diagnoses and social circumstances.
  • ICD-9-CM - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • ICE - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • ICE - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
  • ICE - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • Ice Cream Sandwich - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
  • Ice Lake - Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.
  • IceNewk - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • IceWarp - IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • IcM - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • ICM file - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • ICM file (Image Color Matching file) - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • ICMP - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • ICMP bug - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • ICMP sweep - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
  • ICO - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • icon - In a computer's graphical user interface (GUI), an icon (pronounced EYE-kahn) is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user.
  • ICP - An ICP (Internet commerce provider) is a company that sells software and services that enable a merchant with a Web site to build an online store on the merchant's own site or on the provider's site.
  • ICR - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • ICS - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
  • ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • ICT - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close