Browse Definitions :

Browse Definitions by Alphabet

INK - INT

  • inkjet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • Inline Frame - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
  • inline network device - An inline network device is one that receives packets and forwards them to their intended destination.
  • innovation culture - Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application.
  • innovation management - Innovation management is the process of managing an organization's innovation procedure, which helps increase competitive advantage and drives business growth.
  • innovation management software - Innovation management software, a subset of enterprise collaboration software, helps company digitally manage the generation, collection and evaluation and launch of new ideas from internal employees and external sources.
  • innovation manager - An innovation manager fosters the development of new products, services and processes.
  • innovation process management (IPM) - Innovation process management (IPM) a systematic approach to nurturing the creative capabilities of employees and creating a workplace environment that encourages new ideas for workflows, methodologies, services or products.
  • iNotes - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • input output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • input output operations per second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • input output supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
  • input/output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • input/output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • Input/Output Operations Per Second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • Input/Output Supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • insect robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • insecure deserialization - Insecure deserialization is a vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.
  • insecure relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • insider threat - An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
  • insider trading - Insider trading is the buying and selling of securities based on information that has not been made available to the general public.
  • insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • inspection lots (SAP inspection lots) - An inspection lot within the SAP Quality Management module is a formal notification of the inspection of certain materials or goods at a plant.
  • Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • InstallAnywhere - InstallAnywhere is a program that can used by software developers to package a product written in Java so that it can be installed on any major operating system.
  • installation restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • Installing Ubuntu/Linux OS to Hard Drive - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive.
  • Installing Ubuntu/Linux OS to Hard Drive - Part 1 - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive - Part 1.
  • instance - An instance, in object-oriented programming (OOP), is a specific realization of any object.
  • instant app (Google Android instant app) - A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.
  • instant message - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
  • instant spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • instantiate - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
  • Institute for Health Technology Transformation - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
  • Institute of Electrical and Electronics Engineers - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • Institute of Electrical and Electronics Engineers Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
  • Institute of Electrical and Electronics Engineers Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
  • Institute of Information Security Professionals - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
  • instruction - An instruction is an order given to a computer processor by a computer program.
  • instruction set - An instruction set is a group of commands for a CPU in machine language.
  • insurance claims analysis - Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.
  • intangible asset - Intangible assets are those assets that are based off non-physical assets.
  • integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
  • integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
  • integrated access management - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
  • integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
  • integrated circuit - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip, microchip or microelectronic circuit, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, diodes and transistors are fabricated.
  • integrated circuit for encryption/decryption - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • Integrated Definition - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
  • integrated development environment - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • Integrated Digital Enhanced Network - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
  • Integrated Drive Electronics - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
  • integrated search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • Integrated Services Digital Network - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
  • integrated solar - Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • integrated T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integration - Integration is the act of bringing together smaller components into a single system that functions as one.
  • integration and testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
  • integration centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • integration testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration testing or integration and testing (I&T) - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration-centric BPM - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integration-centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integrity check-value - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • Intel - Intel is the world’s largest manufacturer of PC microprocessors and the holder of the x86 processor architecture patent.
  • Intel 4004 - The Intel 4004 was one of the first microprocessors ever produced, released in 1971.
  • Intel 80286 - The Intel 80286 (often called simply the 286) was a 16-bit microprocessor chip introduced in 1982.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
  • Intel 80486 - Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor.
  • Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
  • Intel Atom - Atom is Intel's family of x86 and x86-64 processors that are optimized for small computing devices, such as smartphones and mobile Internet devices (MIDs).
  • Intel Bay Trail - Intel Bay Trail is the code name for a line of Atom processors manufactured by Intel Corp.
  • Intel Compute Card - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Intel Curie - Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE.
  • Intel Hub Architecture - Accelerated Hub Architecture (AHA) (also called Intel Hub Architecture) is an Intel 800-series chipset design that uses a dedicated bus to transfer data between the two main processor chips instead of using the Peripheral Component Interconnect (PCI) bus, which was used in previous chipset architectures.
  • Intel Quark - Intel Quark is an embedded system-on-a-chip (SoC) processor design intended for smaller mobile devices like wearable computers.
  • Intel Technology Provider - The Intel Technology Provider program is Intel Corp.
  • Intel VT - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel Xeon D-2100 - The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close