Browse Definitions :

Browse Definitions by Alphabet

ILE - INC

  • ILEC - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • ILEC (incumbent local exchange carrier) - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • iLINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • illegal operation - An illegal operation, a term often seen in error messages, is a command to the operating system or an instruction to the computer processor that specifies an operation that is unknown to the operating system or processor and that therefore can't be performed.
  • illumos - Illumos is a free, open source operating system (OS) developed as a fork of Unix-based OpenSolaris, the open source community-built derivative of the Solaris OS.
  • illustrated - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
  • Illustrated definitions - Quick look-up for WhatIs.
  • ILM - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk.
  • IM - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
  • IM - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • IM bot - An IM bot is a chatterbot program that uses instant messaging (IM) as an application interface.
  • IM spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • IM worm - An IM worm is self-replicating malicious code that spreads in instant messaging networks.
  • IMA - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • iMac - The iMac is a low-cost version of Apple Computer's Macintosh.
  • image - An image is a picture that has been created or copied and stored in electronic form.
  • Image Color Matching file - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • image compression - Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level.
  • image content search - Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query.
  • image map - In Web page development, an image map is a graphic image defined so that a user can click on different areas of the image and be linked to different destinations.
  • image metadata - Image metadata is information about an image that is associated with the image file either automatically or deliberately added.
  • image of the early universe - An image of the early universe, showing irregularities in its brightness 380,000 years after its birth, has been produced by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).
  • image of the universe - An image of the early universe, showing irregularities in its brightness 380,000 years after its birth, has been produced by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • image replay attack - An image replay attack is the use of a picture to fool an authentication method.
  • image setter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • image spam - Image spam is junk email that replaces text with images as a means of fooling spam filters.
  • image stitching - Image stitching is the combination of images with overlapping sections to create a single panoramic or high-resolution image.
  • image-based backup - Image-based backup is a backup process for a computer or virtual machine (VM) that creates a copy of the operating system and all the data associated with it, including the system state, and application configurations and saves it as a single file.
  • imagesetter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • imaginary number - An imaginary number is a quantity of the form ix, where x is a real number and i is the positive square root of -1.
  • imaging - Imaging is the capture, storage, manipulation, and display of images.
  • IMAP - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • IMAP (Internet Message Access Protocol) - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets.
  • IMHO - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • IMing - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • imitation game - In artificial intelligence (AI), a Turing Test is a method of inquiry for determining whether or not a computer is capable of thinking like a human being.
  • immediate real time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • immediate real-time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • immersive fitness - Immersive fitness is technology enhanced exercise typically including simulated audio/visual experiences and performance metrics.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immersive web - The immersive web is a version of the online world that incorporates advanced technologies to enhance user engagement and blur the line between the user's physical reality and the digital environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impact sourcing - Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.
  • impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution of any idea, model, or method; in IT, it refers to the process of setting up new software or hardware after a purchase is made.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • import - In a personal computer application, to import is to open a file that is in a format different from the format the application creates on its own.
  • impostor syndrome - Impostor syndrome is a psychological phenomenon that causes sufferers to attribute their successes and accomplishments to external factors rather than to personal merit, hard work or ability.
  • impression - In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.
  • imputation - Imputation, in statistics, is the insertion of a value to stand in for missing data.
  • IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS (Intelligent Manufacturing Systems) - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • IMT CDMA - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
  • IMT-2000 direct spread - Also see CDMA, CDMA One, and CDMA2000.
  • IN - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • in between - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • In Case of Emergency - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
  • in circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in data mining - Association rules are if-then statements that help to show the probability of relationships between data items within large data sets in various types of databases.
  • in grid computing - Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power.
  • in house - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • in managed services - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing.
  • in my humble opinion - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • in networks - In networks, a jabber is any device that is handling electrical signals improperly, usually with negative results for the rest of the network.
  • in the wild - According to noted computer virus expert Paul Ducklin, in order for a virus to be considered in the wild, "it must be spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-band signaling - In the public switched telephone network, (PSTN), in-band signaling is the exchange of signaling (call control) information on the same channel that the telephone call itself is using.
  • in-circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-house marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • in-memory database management system (IMDBMS) - An in-memory database management system (IMDBMS) stores, manages and provides access to data from main memory.
  • In-Memory OLTP - In-Memory OLTP is a Microsoft in-memory technology built into SQL Server and optimized for transaction processing applications.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound call center - An inbound call center is one that exclusively or predominately handles inbound calls (calls initiated by the customer) rather than outbound calls.
  • inbound link - An inbound link (also referred to as a back link) is a hyperlink on a third-party web page that points to a web page on �your site.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.
  • incentivize - Incentivize is to offer a reward, such as money or a free vacation, in hopes of motivating an individual to perform a specific action, such as enter a contest or work longer hours without being paid.
  • incidence - Incidence, in statistics, is the rate of occurrence of something within a population, or the number of times it occurs.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management - Incident management, in information technology, is a process designed to return service to normal as quickly as possible after an incident, in a way that has with little to no negative impact on the business.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close