Browse Definitions :

Browse Definitions by Alphabet

INF - INS

  • Information Security Breaches Survey - The Information Security Breaches Survey is an independent security research effort in the U.
  • Information Security Breaches Survey (ISBS) - The Information Security Breaches Survey is an independent security research effort in the U.
  • information security management system - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • information service - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information signature - To fight terrorism, the Information Awareness Office (IAO) of the U.
  • information silo - An information silo is a business division or group of employees within an organization that fails to communicate freely or effectively with other groups, including management.
  • information silo - An information silo exists when an organization's departments and systems cannot, or do not, communicate freely with one another and encourage the sharing of business-relevant items.
  • Information Society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
  • information storage and retrieval system - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
  • information system - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • information technology - Information technology (IT) is a general term that covers all forms of technology used to create, store, exchange, and use information in various forms.
  • information technology (IT) - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • Information Technology Amendment Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
  • Information Technology Association of America - The ITAA (Information Technology Association of America) is a trade organization of corporations involved with all aspects of information technology.
  • information technology consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
  • Information Technology Information Sharing and Analysis Center - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
  • Information Technology Infrastructure Library - The ITIL (Information Technology Infrastructure Library) framework is designed to standardize the selection, planning, delivery and support of IT services to a business.
  • information theory - Information theory is a branch of mathematics that overlaps into communications engineering, biology, medical science, sociology, and psychology.
  • information war - According to the U.
  • information-centric security - Information-centric security is an approach to information security paradigm that emphasizes the security of the information itself rather than the security of networks, applications, or even simply data.
  • infosurfing - Infosurfing is using the Internet and World Wide Web so that you get maximum information in the shortest amount of time, which for many people means favoring textual content over images.
  • Infosys Technologies (Infosys Limited) - Infosys Technologies (now known as Infosys Limited) is a global IT consulting firm headquartered in Bangalore, India.
  • infotainment - Infotainment, combining information with entertainment, is a fairly recent neologism for a television program, Web site feature, or other presentation that combines information with entertainment.
  • infranet - The infranet is a proposed universal, public, packet-switched supplement to the Internet for businesses and high-demand private users that would provide guaranteed security, reliability, and quality of service (QoS).
  • Infranet Initiative - The Infranet Initiative is a collaborative effort to develop a high-performance universal public network that would serve as a supplement to the Internet for businesses and other high-demand users.
  • infrared - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • Infrared Data Association - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • infrared radiation - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • infrared radiation (IR) - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • infrared transmission - Infrared transmission refers to energy in the region of the electromagnetic radiation spectrum at wavelength s longer than those of visible light, but shorter than those of radio.
  • infrared wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • infrastructure (IT infrastructure) - Infrastructure is the foundation or framework that supports a system or organization.
  • Infrastructure as a Service - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • Infrastructure as a Service (IaaS) - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
  • infrastructure as code - Infrastructure as code (IaC) is an approach to software development that treats physical compute, storage and network fabric resources as web services and allows apps to run where they are best suited, based on cost and performance data.
  • infrastructure management - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
  • infrastructure management (IM) - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
  • Ingres - Ingres is a relational database management system (RDBMS) that evolved from a research project at the University of California at Berkeley in the 1970s.
  • ingress - Ingress (pronounced IHN-grehs, from Latin ingressus or stepping into) is the act of entering something.
  • ingress filtering - Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
  • inherence factor - The inherence factor, in a security context, is a category of user authentication credentials consisting of elements that are integral to the individual in question, in the form of biometric data.
  • inherent risk - Inherent risk is a category of threat that describes potential losses or pitfalls that exist before internal security controls or mitigating factors are implemented.
  • inheritance - In object-oriented programming, inheritance is the concept that when a class of objects is defined, any subclass that is defined can inherit the definitions of one or more general classes.
  • INI - INI is a file name extension used in Microsoft Windows.
  • initial extent - The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.
  • initial program load - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • initial program load (IPL) - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • initial public offering - .
  • initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
  • initialization - Initialization is the process of locating and using the defined values for variable data that is used by a computer program.
  • initialization vector - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • initialization vector (IV) - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
  • injectable ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injection laser - A laser diode, also known as an injection laser or diode laser, is a semiconductor device that produces coherent radiation (in which the waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when current passes through it.
  • ink jet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • ink jet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • Inline Frame - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
  • inline network device - An inline network device is one that receives packets and forwards them to their intended destination.
  • innovation culture - Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application.
  • innovation management - Innovation management is the process of managing an organization's innovation procedure, which helps increase competitive advantage and drives business growth.
  • innovation management software - Innovation management software, a subset of enterprise collaboration software, helps company digitally manage the generation, collection and evaluation and launch of new ideas from internal employees and external sources.
  • innovation manager - An innovation manager fosters the development of new products, services and processes.
  • innovation process management (IPM) - Innovation process management (IPM) a systematic approach to nurturing the creative capabilities of employees and creating a workplace environment that encourages new ideas for workflows, methodologies, services or products.
  • inode - In a UNIX-based operating system, an inode is a computer-stored description of an individual file in a UNIX file system.
  • iNotes - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • iNotes (iNotes Web Access) - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • input output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • input output operations per second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • input output supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
  • input/output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • Input/Output Operations Per Second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • Input/Output Supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • insect robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • insecure deserialization - Insecure deserialization is a vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.
  • insecure relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • insider threat - Insider threat is a category of risk posed by humans who have access to an organization's physical or digital assets.
  • insider trading - Insider trading is the buying and selling of securities based on information that has not been made available to the general public.
  • insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • inspection lots (SAP inspection lots) - An inspection lot within the SAP Quality Management module is a formal notification of the inspection of certain materials or goods at a plant.
  • Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • InstallAnywhere - InstallAnywhere is a program that can used by software developers to package a product written in Java so that it can be installed on any major operating system.
  • installation restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • Installfest - An Installfest is a special occasion when computer users get together to help each other install new programming, usually the Linux operating system and related programs, often together with experts and the resources to download programming from the Internet.
  • Installing and Removing Software in Ubuntu - Screencast: Installing and removing software in Ubuntu.
  • Installing Ubuntu/Linux OS to Hard Drive - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive.
  • InstallShield - InstallShield is a product used by software developers to package software so that users can install it easily and safely.
  • instance - An instance, in object-oriented programming (OOP), is a specific realization of any object.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close