Browse Definitions :

Browse Definitions by Alphabet

IPX - IT

  • IPX - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
  • IR - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • IR LED (infrared light-emitting diode) - An IR LED (infrared light emitting diode) is a solid state lighting (SSL) device that emits light in the infrared range of the electromagnetic radiation spectrum.
  • IR wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • IR wireless (infrared wireless) - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • IRC - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • IrDA - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • IrDA (Infrared Data Association) - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • Iris - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • iris recognition - Iris recognition is a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye.
  • IRIX - IRIX is a UNIX -based operating system from SGI that is optimized for applications that use 3-D visualization and virtual reality environments.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • Iron Python - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
  • IronPython - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
  • IronRuby - IronRuby is a version of the Ruby programming language developed for Microsoft Common Language Runtime (CLR), which is part of the .
  • IRQ - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • IRR - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
  • irrational number - An irrational number is a real number that cannot be reduced to any ratio between an integer p and a natural number q.
  • IRU - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • IS - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS (Intermediate System-to-Intermediate System protocol) - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • ISA - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that is associated with the IBM AT motherboard.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that is associated with the IBM AT motherboard.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISA Server (Internet Security and Acceleration Server) - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
  • ISAE 3402 - ISAE (International Standards for Assurance Engagements) 3402 is a global assurance standard for reporting on controls at service organizations.
  • ISAM - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • ISAPI - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • ISAPI (Internet Server Application Program Interface) - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • ISBN - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
  • ISBN (International Standard Book Number) - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
  • ISBS - The Information Security Breaches Survey is an independent security research effort in the U.
  • iSCSI - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • iSCSI (Internet Small Computer System Interface) - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
  • iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
  • iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
  • iSCSI Target Server - ISCSI Target Server is a server that lets administrators boot multiple computers to a network from a single operating system image in a central location.
  • ISDN (Integrated Services Digital Network) - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
  • ISE - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • iSeries - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • iSeries (i5, i5 Series) - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • iSeries Cheat Sheets - A collection of cheat sheets for iSeries (AS/400).
  • iSeries Learning Guides - We've gathered a collection of our learning guides and tutorials on iSeries-related topics.
  • iSeries Quizzes - We've gathered a collection of our iSeries quizzes.
  • ISMS - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
  • ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • ISO 20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • ISO 20022 - ISO 20022 is an ISO standard for developing financial services messages.
  • ISO 22301 - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22317 (International Standards Organization 22317) - The ISO 22317 provides guidance on conducting a formal business impact analysis.
  • ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
  • ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS).
  • ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
  • ISO 9000 - (For the business server line from Hewlett-Packard, see HP 9000.
  • ISO 9660 - An ISO 9660 file system is a standard CD-ROM file system that allows you to read the same CD-ROM whether you're on a PC, Mac, or other major computer platform.
  • ISO date format - The International Organization for Standardization (ISO) date format is a standard way to express a numeric calendar date that eliminates ambiguity.
  • ISO IEC - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 15504 - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • ISO/IEC 17799: Code of Practice for Information Security Management - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO/IEC 24734 - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 24734 (International Standards Organization/International Electrotechnical Commission) - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • ISO17799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • ISOC - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • isochronous - In information technology, isochronous (from the Greek "equal" and "time"; pronounced "eye-SAH-krun-us") pertains to processes that require timing coordination to be successful, such as voice and digital video transmission.
  • isolation - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • isotope - An isotope is a form of a chemical element whose atomic nucleus contains a specific number of neutron s, in addition to the number of protons that uniquely defines the element.
  • isotropic radiator - An isotropic radiator is a transducer that produces useful electromagnetic field output in all directions with equal intensity, and at 100-percent efficiency, in three-dimensional space.
  • ISP - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISP (Internet service provider) - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISPF - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
  • ISPF (Interactive System Productivity Facility) - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
  • ISPs - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISR G2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • ISRC - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
  • ISRS - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISRS (information storage and retrieval system) - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISSA (Information Systems Security Association) - The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • issue tracking system (ITS) - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
  • Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
  • ISV - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT - Information technology (IT) is a general term that covers all forms of technology used to create, store, exchange, and use information in various forms.
  • IT Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
  • IT aftermarket - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close