Browse Definitions :

Browse Definitions by Alphabet

IND - INK

  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • Industry Standard Architecture - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
  • InfiniBand - InfiniBand is an architecture and specification for data flow between processors and I/O devices.
  • infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
  • infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinite series - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • inflection point - An inflection point, in a general sense, is a decisive moment in the course of some entity, event or situation; typically, an inflection point marks a significant change.
  • influencer (social influencer) - An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have.
  • influencer marketing - Influence marketing can be broken down into a few stages.
  • InfoCard - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • infonomics - Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • information and communications technologies - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Communications Technologies for Development - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • information and communications technology - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Content Exchange - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
  • information arbitrage - Information arbitrage is an instrument for creating opportunities in the marketplace by identifying trends ahead of others and acting on them.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Assurance Standard 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
  • Information Awareness Office - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • information blocking - Information blocking occurs when a person or entity purposely and unreasonably interferes with the sharing or use of electronic health information.
  • Information Commissioner's Office - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Display System - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
  • information filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • information life cycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information life cycle management (ILM) - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information lifecycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • Information Management System - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
  • information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
  • information rights management (IRM) - Information rights management (IRM) technologies help control, secure and manage content from unwanted access.
  • information security (infosec) - Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of information.
  • Information Security Breaches Survey - The Information Security Breaches Survey is an independent security research effort in the U.
  • information security management system - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information service - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information silo - An information silo is a business division or group of employees within an organization that fails to communicate freely or effectively with other groups, including management.
  • Information Society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
  • information storage and retrieval system - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
  • information system - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information technology - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • information technology (IT) - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • Information Technology Amendment Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
  • Information Technology Association of America - The ITAA (Information Technology Association of America) is a trade organization of corporations involved with all aspects of information technology.
  • information technology consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
  • Information Technology Information Sharing and Analysis Center - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
  • Information Technology Infrastructure Library - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
  • information war - According to the U.
  • information-centric security - Information-centric security is an approach to information security paradigm that emphasizes the security of the information itself rather than the security of networks, applications, or even simply data.
  • Infosys Technologies (Infosys Limited) - Infosys Technologies (now known as Infosys Limited) is a global IT consulting firm headquartered in Bangalore, India.
  • infrared - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • Infrared Data Association - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • infrared radiation - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • infrared radiation (IR) - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • infrared transmission - Infrared transmission refers to energy in the region of the electromagnetic radiation spectrum at wavelength s longer than those of visible light, but shorter than those of radio.
  • infrared wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • infrastructure (IT infrastructure) - Infrastructure is the foundation or framework that supports a system or organization.
  • Infrastructure as a Service - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • Infrastructure as a Service (IaaS) - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • infrastructure as code - Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.
  • infrastructure management - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
  • Ingres - Ingres is a relational database management system (RDBMS) that evolved from a research project at the University of California at Berkeley in the 1970s.
  • ingress filtering - Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
  • inherence factor - The inherence factor, in a security context, is a category of user authentication credentials consisting of elements that are integral to the individual in question, in the form of biometric data.
  • inherent risk - Inherent risk is a category of threat that describes potential losses or pitfalls that exist before internal security controls or mitigating factors are implemented.
  • inheritance - In object-oriented programming, inheritance is the concept that when a class of objects is defined, any subclass that is defined can inherit the definitions of one or more general classes.
  • initial extent - The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.
  • initial program load - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • initial program load (IPL) - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • initial public offering - .
  • initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
  • initialization - Initialization is the process of locating and using the defined values for variable data that is used by a computer program.
  • initialization vector - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • initialization vector (IV) - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
  • injectable ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injection laser - A laser diode, also known as an injection laser or diode laser, is a semiconductor device that produces coherent radiation (in which the waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when current passes through it.
  • ink jet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • ink jet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close