Browse Definitions :

Browse Definitions by Alphabet

INC - INF

  • incident response plan - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
  • incident response policy - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • Incompleteness Theorem - The Incompleteness Theorem is a pair of logical proofs that revolutionized mathematics.
  • increment - An increment is a small, unspecified, nonzero change in the value of a quantity.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • Incremental Revenue (Value) Analysis - Incremental Revenue (Value) Analysis is a process used to calculate the value of each agent in a call center.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • incubator - In the business world, an incubator is an enterprise that is set up to provide office space, equipment, and sometimes mentoring assistance and capital to new businesses that are just getting started.
  • incumbent local exchange carrier - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • Indefeasible Right of Use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • Indefeasible Right of Use (IRU) - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • indemnification - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • indemnity - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • indempotency - Based on our inferences about the only three uses of this term that we have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee, from Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no matter how much it is used or accessed by another thing or action.
  • Indeo - Indeo is a compression algorithm developed by Intel and used by Microsoft's Video for Windows.
  • independent software vendor - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • independent variable - An independent variable is a variable that is manipulated to determine the value of a dependent variable.
  • index fund - An index fund is a type of mutual fund collection that follows the trend of a given security or market index, which represents a number of sectors of a market and offers comprehensive exposure to several markets.
  • index register - An index register is a circuit that receives, stores, and outputs instruction-changing codes in a computer.
  • Indexed Sequential Access Method - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • India State Data Centre - India State Data Centre is a project that will consolidate services, applications and infrastructure to provide efficient electronic delivery of government-to-government (G2G), government-to-citizen (G2C) and government-to-business (G2B) services.
  • Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
  • Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Indigo - Windows Communication Foundation (WCF) is Microsoft's programming model for using managed code to build unified Web services and other distributed systems that can talk to each other.
  • indirect competition - Indirect competition is between two vendors whose products or services are not the same but that could satisfy the same consumer need.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductance - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • inductive argument - An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion.
  • inductive charging - Inductive charging is a wireless charging method used for charging mid-sized items such as cell phones, MP3 players and PDAs.
  • inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
  • inductor - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • industrial and organizational psychology (I/O psychology) - Industrial and organizational (I/O) psychology is an area of study that applies psychological research, principles and practices to improve the functioning and experience of people in the workplace.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • industrial espionage - Industrial espionage is the covert and sometimes illegal practice of investigating competitors, usually to gain a business advantage.
  • Industrial Internet Consortium (IIC) - The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.
  • industrial strength - In information technology, industrial strength is a characteristic sometimes ascribed to a hardware or software product or a system to describe its ability to work capably and dependably in the operational world of business.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • Industry Standard Architecture - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that is associated with the IBM AT motherboard.
  • inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
  • iNet - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
  • InfiniBand - InfiniBand is an architecture and specification for data flow between processors and I/O devices.
  • infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
  • infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinite series - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infinity - In general, infinity is the quality or state of endlessness or having no limits in terms of time, space, or other quantity.
  • inflection point - An inflection point, in a general sense, is a decisive moment in the course of some entity, event or situation; typically, an inflection point marks a significant change.
  • influencer (social influencer) - An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have.
  • influencer marketing - Influence marketing can be broken down into a few stages.
  • InfoCard - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • infomercial - On television, an infomercial is a short or regular-length television program that combines information presentation with an integrated suggestion to buy a particular product or service.
  • infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
  • infonomics - Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • information and communications technologies - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Communications Technologies for Development - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • information and communications technology - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • Information and Content Exchange - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
  • information arbitrage - Information arbitrage is an instrument for creating opportunities in the marketplace by identifying trends ahead of others and acting on them.
  • information architecture - In technical writing, information architecture is the set of ideas about how all information in a given context should be treated philosophically and, in a general way, how it should be organized.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Assurance Standard 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
  • Information Awareness Office - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • Information Awareness Office (IAO) - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
  • information blocking - Information blocking occurs when a person or entity purposely and unreasonably interferes with the sharing or use of electronic health information.
  • Information Commissioner's Office - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • information design - Information design is the detailed planning of specific information that is to be provided to a particular audience to meet specific objectives.
  • Information Display System - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
  • information filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • Information Kit: Grid Computing - Grid computing (or the use of a computational grid) is applying the resources of many computers in a network to a single problem at the same time.
  • Information Kit: Linux, Unix, and All the Little ixes - Linux, Unix, and all the little ixes --The Unix versus Linux confusion.
  • Information Kit: Voice over IP - What is voice over IP (VoIP)? Expert advice: VoIP certification, Implementing VoIP in a small business, Using VoIP at home.
  • information life cycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information life cycle management (ILM) - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • information lifecycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
  • Information Management System - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
  • information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
  • information rights management (IRM) - Information rights management (IRM) technologies help control, secure and manage content from unwanted access.
  • information security (infosec) - Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close