Browse Definitions :

Browse Definitions by Alphabet

IN - INF

  • in house - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • in managed services - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.
  • in my humble opinion - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-band signaling - In the public switched telephone network, (PSTN), in-band signaling is the exchange of signaling (call control) information on the same channel that the telephone call itself is using.
  • in-circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-house marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • in-memory database management system (IMDBMS) - An in-memory database management system (IMDBMS) stores, manages and provides access to data from main memory.
  • In-Memory OLTP - In-Memory OLTP is a Microsoft in-memory technology built into SQL Server and optimized for transaction processing applications.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound link - An inbound link (also referred to as a back link) is a hyperlink on a third-party web page that points to a web page on �your site.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.
  • incidence - Incidence, in statistics, is the rate of occurrence of something within a population, or the number of times it occurs.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response policy - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • increment - An increment is a small, unspecified, nonzero change in the value of a quantity.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • incumbent local exchange carrier - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • Indefeasible Right of Use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • Indefeasible Right of Use (IRU) - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • independent software vendor - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • independent variable - An independent variable is a variable that is manipulated to determine the value of a dependent variable.
  • index fund - An index fund is a type of mutual fund collection that follows the trend of a given security or market index, which represents a number of sectors of a market and offers comprehensive exposure to several markets.
  • index register - An index register is a circuit that receives, stores, and outputs instruction-changing codes in a computer.
  • Indexed Sequential Access Method - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
  • Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • indirect competition - Indirect competition is between two vendors whose products or services are not the same but that could satisfy the same consumer need.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductance - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • inductive argument - An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion.
  • inductive charging - Inductive charging is a wireless charging method used for charging mid-sized items such as cell phones, MP3 players and PDAs.
  • inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
  • inductor - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • industrial and organizational psychology (I/O psychology) - Industrial and organizational (I/O) psychology is an area of study that applies psychological research, principles and practices to improve the functioning and experience of people in the workplace.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
  • industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
  • Industrial Internet Consortium (IIC) - The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • Industry Standard Architecture - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
  • InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
  • infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
  • infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinite series - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • inflection point - An inflection point, in a general sense, is a decisive moment in the course of some entity, event or situation; typically, an inflection point marks a significant change.
  • influencer (social influencer) - An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have.
  • influencer marketing - Influence marketing can be broken down into a few stages.
  • InfoCard - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • infonomics - Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • information and communications technologies - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Communications Technologies for Development - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • information and communications technology - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Content Exchange - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information arbitrage - Information arbitrage is an instrument for creating opportunities in the marketplace by identifying trends ahead of others and acting on them.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
  • information blocking - Information blocking occurs when a person or entity purposely and unreasonably interferes with the sharing or use of electronic health information.
  • Information Commissioner's Office - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Display System - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
  • information filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • information life cycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information life cycle management (ILM) - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information lifecycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • Information Management System - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
  • information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
  • information rights management (IRM) - Information rights management (IRM) technologies help control, secure and manage content from unwanted access.
  • information security (infosec) - Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of information.
  • information security management system - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close