Browse Definitions :

Browse Definitions by Alphabet

INC - INF

  • Incremental Revenue (Value) Analysis - Incremental Revenue (Value) Analysis is a process used to calculate the value of each agent in a call center.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • incubator - In the business world, an incubator is an enterprise that is set up to provide office space, equipment, and sometimes mentoring assistance and capital to new businesses that are just getting started.
  • incumbent local exchange carrier - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • Indefeasible Right of Use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • Indefeasible Right of Use (IRU) - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • indemnification - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • indemnity - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • indempotency - Based on our inferences about the only three uses of this term that we have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee, from Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no matter how much it is used or accessed by another thing or action.
  • Indeo - Indeo is a compression algorithm developed by Intel and used by Microsoft's Video for Windows.
  • independent software vendor - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • independent variable - An independent variable is a variable that is manipulated to determine the value of a dependent variable.
  • index fund - An index fund is a type of mutual fund collection that follows the trend of a given security or market index, which represents a number of sectors of a market and offers comprehensive exposure to several markets.
  • index register - An index register is a circuit that receives, stores, and outputs instruction-changing codes in a computer.
  • Indexed Sequential Access Method - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • India State Data Centre - India State Data Centre is a project that will consolidate services, applications and infrastructure to provide efficient electronic delivery of government-to-government (G2G), government-to-citizen (G2C) and government-to-business (G2B) services.
  • Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
  • Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Indigo - Windows Communication Foundation (WCF) is Microsoft's programming model for using managed code to build unified Web services and other distributed systems that can talk to each other.
  • indirect competition - Indirect competition is between two vendors whose products or services are not the same but that could satisfy the same consumer need.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductance - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • inductive argument - An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion.
  • inductive charging - Inductive charging is a wireless charging method used for charging mid-sized items such as cell phones, MP3 players and PDAs.
  • inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
  • inductor - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • industrial and organizational psychology (I/O psychology) - Industrial and organizational (I/O) psychology is an area of study that applies psychological research, principles and practices to improve the functioning and experience of people in the workplace.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
  • industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
  • Industrial Internet Consortium (IIC) - The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.
  • industrial strength - In information technology, industrial strength is a characteristic sometimes ascribed to a hardware or software product or a system to describe its ability to work capably and dependably in the operational world of business.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • Industry Standard Architecture - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that is associated with the IBM AT motherboard.
  • inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
  • iNet - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
  • InfiniBand - InfiniBand is an architecture and specification for data flow between processors and I/O devices.
  • infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
  • infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinite series - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinity - In general, infinity is the quality or state of endlessness or having no limits in terms of time, space, or other quantity.
  • inflection point - An inflection point, in a general sense, is a decisive moment in the course of some entity, event or situation; typically, an inflection point marks a significant change.
  • influencer (social influencer) - An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have.
  • influencer marketing - Influence marketing can be broken down into a few stages.
  • InfoCard - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • infomercial - On television, an infomercial is a short or regular-length television program that combines information presentation with an integrated suggestion to buy a particular product or service.
  • infonomics - Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • information and communications technologies - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Communications Technologies for Development - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • information and communications technology - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Content Exchange - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
  • information arbitrage - Information arbitrage is an instrument for creating opportunities in the marketplace by identifying trends ahead of others and acting on them.
  • information architecture - In technical writing, information architecture is the set of ideas about how all information in a given context should be treated philosophically and, in a general way, how it should be organized.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Assurance Standard 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
  • Information Awareness Office - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • Information Awareness Office (IAO) - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • information blocking - Information blocking occurs when a person or entity purposely and unreasonably interferes with the sharing or use of electronic health information.
  • Information Commissioner's Office - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • information design - Information design is the detailed planning of specific information that is to be provided to a particular audience to meet specific objectives.
  • Information Display System - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
  • information filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • Information Kit: Grid Computing - Grid computing (or the use of a computational grid) is applying the resources of many computers in a network to a single problem at the same time.
  • information life cycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information life cycle management (ILM) - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information lifecycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • Information Management System - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
  • information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
  • information rights management (IRM) - Information rights management (IRM) technologies help control, secure and manage content from unwanted access.
  • information security (infosec) - Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of information.
  • Information Security Breaches Survey - The Information Security Breaches Survey is an independent security research effort in the U.
  • information security management system - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information service - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information signature - To fight terrorism, the Information Awareness Office (IAO) of the U.
  • information silo - An information silo is a business division or group of employees within an organization that fails to communicate freely or effectively with other groups, including management.
  • Information Society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
  • information storage and retrieval system - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
  • information system - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information technology - Information technology (IT) is a general term that covers all forms of technology used to create, store, exchange, and use information in various forms.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a ...

  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close