Browse Definitions :

Browse Definitions by Alphabet

IMA - IND

  • image replay attack - An image replay attack is the use of a picture to fool an authentication method.
  • image setter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • image stitching - Image stitching is the combination of images with overlapping sections to create a single panoramic or high-resolution image.
  • image-based backup - Image-based backup is a backup process for a computer or virtual machine (VM) that creates a copy of the operating system and all the data associated with it, including the system state, and application configurations and saves it as a single file.
  • imagesetter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • imaging - Imaging is the capture, storage, manipulation, and display of images.
  • IMAP - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • IMAP (Internet Message Access Protocol) - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
  • IMHO - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • IMing - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • imitation game - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • immediate real time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • immediate real-time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • immersive fitness - Immersive fitness is technology enhanced exercise typically including simulated audio/visual experiences and performance metrics.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immersive web - The immersive web is a version of the online world that incorporates advanced technologies to enhance user engagement and blur the line between the user's physical reality and the digital environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impact sourcing - Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.
  • impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution of any idea, model, or method; in IT, it refers to the process of setting up new software or hardware after a purchase is made.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • impostor syndrome - Impostor syndrome is a psychological phenomenon that causes sufferers to attribute their successes and accomplishments to external factors rather than to personal merit, hard work or ability.
  • impression - In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • imputation - Imputation, in statistics, is the insertion of a value to stand in for missing data.
  • IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
  • IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IMS (Intelligent Manufacturing Systems) - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • IMT CDMA - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
  • IMT-2000 direct spread - Also see CDMA, CDMA One, and CDMA2000.
  • IN - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • in between - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • In Case of Emergency - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
  • in circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in data mining - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • in grid computing - Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power.
  • in house - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • in managed services - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.
  • in my humble opinion - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • in networks - In networks, a jabber is any device that is handling electrical signals improperly, usually with negative results for the rest of the network.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-band signaling - In the public switched telephone network, (PSTN), in-band signaling is the exchange of signaling (call control) information on the same channel that the telephone call itself is using.
  • in-circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-house marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • in-memory database management system (IMDBMS) - An in-memory database management system (IMDBMS) stores, manages and provides access to data from main memory.
  • In-Memory OLTP - In-Memory OLTP is a Microsoft in-memory technology built into SQL Server and optimized for transaction processing applications.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound call center - An inbound call center is one that exclusively or predominately handles inbound calls (calls initiated by the customer) rather than outbound calls.
  • inbound link - An inbound link (also referred to as a back link) is a hyperlink on a third-party web page that points to a web page on �your site.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.
  • incidence - Incidence, in statistics, is the rate of occurrence of something within a population, or the number of times it occurs.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
  • incident response policy - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • increment - An increment is a small, unspecified, nonzero change in the value of a quantity.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • Incremental Revenue Analysis - Incremental Revenue (Value) Analysis is a process used to calculate the value of each agent in a call center.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • incumbent local exchange carrier - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • Indefeasible Right of Use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • Indefeasible Right of Use (IRU) - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • indemnity - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • independent software vendor - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • independent variable - An independent variable is a variable that is manipulated to determine the value of a dependent variable.
  • index fund - An index fund is a type of mutual fund collection that follows the trend of a given security or market index, which represents a number of sectors of a market and offers comprehensive exposure to several markets.
  • index register - An index register is a circuit that receives, stores, and outputs instruction-changing codes in a computer.
  • Indexed Sequential Access Method - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • India State Data Centre - India State Data Centre is a project that will consolidate services, applications and infrastructure to provide efficient electronic delivery of government-to-government (G2G), government-to-citizen (G2C) and government-to-business (G2B) services.
  • Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
  • Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Indigo - Windows Communication Foundation (WCF) is Microsoft's programming model for using managed code to build unified Web services and other distributed systems that can talk to each other.
  • indirect competition - Indirect competition is between two vendors whose products or services are not the same but that could satisfy the same consumer need.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductance - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • inductive argument - An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion.
  • inductive charging - Inductive charging is a wireless charging method used for charging mid-sized items such as cell phones, MP3 players and PDAs.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close