Browse Definitions :

Browse Definitions by Alphabet

INT - ISO

  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • internet shaming (online shaming) - Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet Small Computer System Interface (iSCSI) adapter - An iSCSI adapter is a network interface card that enables the transmission of data between host computers and iSCSI-based storage arrays and typically handles the TCP/IP processing.
  • Internet Storm Center - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them.
  • Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
  • Internet users' bill of rights - The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online.
  • interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the end user.
  • interprocess communication (IPC) - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interrupt - An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.
  • interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • intersection symbol - The intersection symbol denotes the intersection of two sets.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a network security and threat prevention tool.
  • inventory management - Inventory management is the supervision of noncapitalized assets -- or inventory -- and stock items.
  • inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
  • inventory turns (inventory turnover) - Inventory turns, also referred to as inventory turnover and inventory turnover ratio, are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.
  • inversion of control (IoC) - Inversion of control, also known as the Hollywood Principle, changes the control flow of an application and allows developers to sidestep some typical configuration hassles.
  • invitation to tender (ITT) - An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.
  • invocation ID - An invocation ID is an ID number that identifies databases within Active Directory and changes as AD is in a restore process.
  • invoice - An invoice is a document listing billed goods and/or services that a provider presents to a customer.
  • IO.SYS - IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
  • ion - An ion is an atom or group of atoms in which the number of electrons is different from the number of proton s.
  • IOPS (input/output operations per second) - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • iOS 8 - IOS 8 is the eighth version of Apple’s mobile operating system.
  • iOS developer kit - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.
  • iOS Developer Program - The iOS Developer Program is a fee-based subscription that allows program members to publish approved apps to the Apple app store.
  • IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
  • IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
  • IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
  • IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT OS (Internet of Things operating system) - An IoT OS is an operating system that is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.
  • IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
  • IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
  • IOTA - IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy.
  • IP address (Internet Protocol Address) - This definition is based on Internet Protocol Version 4.
  • IP camera - An IP camera is a networked digital video camera that transmits data over a Fast Ethernet link.
  • IP core (intellectual property core) - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
  • IP SLA (Cisco) - IP SLA (Internet protocol service level agreement) is a feature of the Cisco IOS (Internetwork Operating System) that allows an IT professional to collect information about network performance in real time.
  • IP spoofing - Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
  • iPad - The iPad is a touchscreen tablet PC made by Apple.
  • iPad 2 - The iPad 2 is a 9.
  • iPad Air - Apple’s iPad Air is an iOS tablet that is lighter and thinner than the company’s previous tablets.
  • iPhone - The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
  • iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
  • IPsec (Internet Protocol Security) - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
  • iptables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
  • IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
  • IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
  • IR LED (infrared light-emitting diode) - An IR LED (infrared light emitting diode) is a solid state lighting (SSL) device that emits light in the infrared range of the electromagnetic radiation spectrum.
  • IR wireless (infrared wireless) - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • iris recognition - Iris recognition is a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • irrational number - An irrational number is a real number that cannot be reduced to any ratio between an integer p and a natural number q.
  • IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.
  • ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
  • ISAE 3402 - ISAE (International Standards for Assurance Engagements) 3402 is a global assurance standard for reporting on controls at service organizations.
  • ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system that allows records to be accessed either sequentially or randomly.
  • iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
  • iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
  • iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
  • iSCSI Target Server - ISCSI Target Server is a server that lets administrators boot multiple computers to a network from a single operating system image in a central location.
  • island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
  • ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
  • ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22317 (International Standards Organization 22317) - ISO 22317 is the first formal standard to address the business impact analysis process.
  • ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
  • ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS).
  • ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
  • ISO 31000 Risk Management - The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for risk management from the International Organization for Standardization.
  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close