Browse Definitions :

Browse Definitions by Alphabet

INI - INT

  • initialization vector (IV) - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
  • injectable ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • injection laser - A laser diode, also known as an injection laser or diode laser, is a semiconductor device that produces coherent radiation (in which the waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when current passes through it.
  • ink jet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • ink jet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inkjet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • Inline Frame - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
  • inline network device - An inline network device is one that receives packets and forwards them to their intended destination.
  • innovation culture - Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application.
  • innovation management - Innovation management is the process of managing an organization's innovation procedure, which helps increase competitive advantage and drives business growth.
  • innovation management software - Innovation management software, a subset of enterprise collaboration software, helps company digitally manage the generation, collection and evaluation and launch of new ideas from internal employees and external sources.
  • innovation manager - An innovation manager fosters the development of new products, services and processes.
  • innovation process management (IPM) - Innovation process management (IPM) a systematic approach to nurturing the creative capabilities of employees and creating a workplace environment that encourages new ideas for workflows, methodologies, services or products.
  • iNotes - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • iNotes (iNotes Web Access) - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • input output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • input output operations per second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • input output supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
  • input/output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • Input/Output Operations Per Second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • Input/Output Supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • insect robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • insecure deserialization - Insecure deserialization is a vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.
  • insecure relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • insider threat - An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
  • insider trading - Insider trading is the buying and selling of securities based on information that has not been made available to the general public.
  • insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • inspection lots (SAP inspection lots) - An inspection lot within the SAP Quality Management module is a formal notification of the inspection of certain materials or goods at a plant.
  • Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • InstallAnywhere - InstallAnywhere is a program that can used by software developers to package a product written in Java so that it can be installed on any major operating system.
  • installation restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • Installfest - An Installfest is a special occasion when computer users get together to help each other install new programming, usually the Linux operating system and related programs, often together with experts and the resources to download programming from the Internet.
  • Installing Ubuntu/Linux OS to Hard Drive - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive.
  • Installing Ubuntu/Linux OS to Hard Drive - Part 1 - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive - Part 1.
  • instance - An instance, in object-oriented programming (OOP), is a specific realization of any object.
  • instant app (Google Android instant app) - A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.
  • instant message - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • Instant Messaging: Glossary - This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.
  • instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
  • instant spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • instantiate - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
  • Institute for Health Technology Transformation - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
  • Institute of Electrical and Electronics Engineers - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • Institute of Electrical and Electronics Engineers Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
  • Institute of Electrical and Electronics Engineers Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
  • Institute of Information Security Professionals - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
  • instruction - An instruction is an order given to a computer processor by a computer program.
  • instruction set - An instruction set is a group of commands for a CPU in machine language.
  • insurance claims analysis - Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.
  • intangible asset - Intangible assets are those assets that are based off non-physical assets.
  • integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
  • integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
  • integrated access management - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
  • integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
  • integrated circuit - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit for encryption/decryption - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • Integrated Definition - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
  • integrated development environment - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • Integrated Digital Enhanced Network - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
  • Integrated Drive Electronics - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
  • integrated search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • Integrated Services Digital Network - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
  • integrated solar - Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • integrated T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integration - Integration is the act of bringing together smaller components into a single system that functions as one.
  • integration and testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
  • integration centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
  • integration server - An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.
  • integration testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration testing or integration and testing (I&T) - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration-centric BPM - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integration-centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integrity check-value - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • Intel - Intel is the world’s largest manufacturer of PC microprocessors and the holder of the x86 processor architecture patent.
  • Intel 4004 - The Intel 4004 was one of the first microprocessors ever produced, released in 1971.
  • Intel 8008 - The Intel 8008, originally called the 1201, was one of the first microprocessors ever developed.
  • Intel 80286 - The Intel 80286 (often called simply the 286) was a 16-bit microprocessor chip introduced in 1982.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close