Browse Definitions :

Browse Definitions by Alphabet

IS - IT

  • IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS (Intermediate System-to-Intermediate System protocol) - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • ISA - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that is associated with the IBM AT motherboard.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISA Server (Internet Security and Acceleration Server) - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
  • ISAE 3402 - ISAE (International Standards for Assurance Engagements) 3402 is a global assurance standard for reporting on controls at service organizations.
  • ISAM - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • ISAPI - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • ISAPI (Internet Server Application Program Interface) - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • ISBN - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
  • ISBN (International Standard Book Number) - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
  • ISBS - The Information Security Breaches Survey is an independent security research effort in the U.
  • iSCSI - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
  • iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
  • iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
  • iSCSI Target Server - ISCSI Target Server is a server that lets administrators boot multiple computers to a network from a single operating system image in a central location.
  • ISDN (Integrated Services Digital Network) - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
  • ISE - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • iSeries - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • iSeries (i5, i5 Series) - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • iSeries Cheat Sheets - A collection of cheat sheets for iSeries (AS/400).
  • iSeries Quizzes - We've gathered a collection of our iSeries quizzes.
  • island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
  • ISMS - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
  • ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • ISO 20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • ISO 20022 - ISO 20022 is an ISO standard for developing financial services messages.
  • ISO 22301 - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22317 (International Standards Organization 22317) - The ISO 22317 provides guidance on conducting a formal business impact analysis.
  • ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
  • ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS).
  • ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
  • ISO 9000 - (For the business server line from Hewlett-Packard, see HP 9000.
  • ISO 9660 - An ISO 9660 file system is a standard CD-ROM file system that allows you to read the same CD-ROM whether you're on a PC, Mac, or other major computer platform.
  • ISO date format - The International Organization for Standardization (ISO) date format is a standard way to express a numeric calendar date that eliminates ambiguity.
  • ISO IEC - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 15504 - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • ISO/IEC 17799: Code of Practice for Information Security Management - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO/IEC 24734 - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 24734 (International Standards Organization/International Electrotechnical Commission) - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • ISO17799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • ISOC - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • isochronous - In information technology, isochronous (from the Greek "equal" and "time"; pronounced "eye-SAH-krun-us") pertains to processes that require timing coordination to be successful, such as voice and digital video transmission.
  • isolation - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • isotope - An isotope is a form of a chemical element whose atomic nucleus contains a specific number of neutron s, in addition to the number of protons that uniquely defines the element.
  • isotropic radiator - An isotropic radiator is a transducer that produces useful electromagnetic field output in all directions with equal intensity, and at 100-percent efficiency, in three-dimensional space.
  • ISP - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISP (Internet service provider) - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISPF - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
  • ISPF (Interactive System Productivity Facility) - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
  • ISPs - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISR G2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • ISRC - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
  • ISRS - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISRS (information storage and retrieval system) - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISSA (Information Systems Security Association) - The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • issue tracking system (ITS) - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
  • Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
  • ISV - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT - Information technology (IT) is a general term that covers all forms of technology used to create, store, exchange, and use information in various forms.
  • IT Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
  • IT aftermarket - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
  • IT aftermarket (tech secondary market) - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
  • IT asset disposition (ITAD) - IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.
  • IT asset lifecycle - The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership.
  • IT asset management (ITAM) - IT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
  • IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
  • IT blueprint - An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.
  • IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
  • IT business transformation - IT business transformation is a thorough or dramatic change in the business processes and technologies a company employs to reach important business goals.
  • IT centralization (information technology centralization) - IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.
  • IT chargeback / showback - IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
  • IT continuity (information technology continuity) - IT continuity (information technology continuity) is the holistic management of technology systems toward the guarantee that essential business operations will proceed in the event of a major disruption.
  • IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
  • IT cost structure - IT cost structure is the relationship of different types of costs within a larger IT budget.
  • IT director (information technology director) - An IT director (information technology director) is an employee in charge of technology within an organization.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT elasticity - IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.
  • IT financial management - IT financial management is the oversight of expenditures required to deliver IT products and services.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close