Browse Definitions :

Browse Definitions by Alphabet

INS - INT

  • instant app (Google Android instant app) - A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.
  • instant message - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • Instant Messaging: Glossary - This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.
  • instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
  • instant spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • instant translation - Instant translation is the translation from one language to another of Web pages, e-mail, and online chat text by a computer program so that the translated results appear almost instantly.
  • instantiate - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
  • Institute for Health Technology Transformation - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
  • Institute of Electrical and Electronics Engineers - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • Institute of Electrical and Electronics Engineers Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
  • Institute of Electrical and Electronics Engineers Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
  • Institute of Information Security Professionals - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
  • instruction - An instruction is an order given to a computer processor by a computer program.
  • instruction set - An instruction set is a group of commands for a CPU in machine language.
  • insurance claims analysis - Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.
  • int - "int" is one of the top-level domain names that can be used when choosing a domain name.
  • intangible asset - Intangible assets are those assets that are based off non-physical assets.
  • integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
  • integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
  • integrated access management - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated access management (IAM) - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
  • integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
  • integrated circuit - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit for encryption/decryption - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • integrated development environment - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • Integrated Digital Enhanced Network - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
  • Integrated Drive Electronics - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
  • integrated search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • integrated solar - Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • integrated T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 (channelized T1) - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.
  • integration - Integration is the act of bringing together smaller components into a single system that functions as one.
  • integration and testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
  • integration centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
  • integration server - An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.
  • integration testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration testing or integration and testing (I&T) - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration-centric BPM - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integration-centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integrity check-value - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • Intel - Intel is the world’s largest manufacturer of PC microprocessors and the holder of the x86 processor architecture patent.
  • Intel 4004 - The Intel 4004 was one of the first microprocessors ever produced, released in 1971.
  • Intel 8008 - The Intel 8008, originally called the 1201, was one of the first microprocessors ever developed.
  • Intel 80286 - The Intel 80286 (often called simply the 286) was a 16-bit microprocessor chip introduced in 1982.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
  • Intel 80486 - Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor.
  • Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
  • Intel Atom - Atom is Intel's family of x86 and x86-64 processors that are optimized for small computing devices, such as smartphones and mobile Internet devices (MIDs).
  • Intel Bay Trail - Intel Bay Trail is the code name for a line of Atom processors manufactured by Intel Corp.
  • Intel Compute Card - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Intel Curie - Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE.
  • Intel Hub Architecture - Accelerated Hub Architecture (AHA) (also called Intel Hub Architecture) is an Intel 800-series chipset design that uses a dedicated bus to transfer data between the two main processor chips instead of using the Peripheral Component Interconnect (PCI) bus, which was used in previous chipset architectures.
  • Intel Quark - Intel Quark is an embedded system-on-a-chip (SoC) processor design intended for smaller mobile devices like wearable computers.
  • Intel Technology Provider - The Intel Technology Provider program is Intel Corp.
  • Intel VT - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel Xeon D-2100 - The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.
  • intellectual capital - Intellectual capital is knowledge that can be exploited for some money-making or other useful purpose.
  • intellectual property - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • intellectual property (IP) - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • intellectual property core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • intelligence (intel) - According to the FBI, intelligence is both the information itself and the processes used to collect and analyze it.
  • intelligence community - The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.
  • intelligent agent - On the Internet, an intelligent agent (or simply an agent) is a program that gathers information or performs some other service without your immediate presence and on some regular schedule.
  • intelligent agent - On the Internet, an agent (also called an intelligent agent) is a program that gathers information or performs some other service without your immediate presence and on some regular schedule.
  • intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
  • intelligent agent (AI) - An intelligent agent is an AI hardware and/or software system with some degree of autonomy and the capacity to make decisions and take actions.
  • intelligent character recognition - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • intelligent character recognition (ICR) - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • intelligent compression - Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.
  • intelligent content - Intelligent content is an adaptation of digital text, image, video, audio or multimedia data with coding added that allows it to be automatically processed.
  • intelligent database - An intelligent database is a full-text database that employs artficial intelligence (AI), interacting with users to ensure that returned items (hits) contain the most relevant information possible.
  • intelligent device - An intelligent device is any type of equipment, instrument, or machine that has its own computing capability.
  • intelligent electronic device (IED) - An intelligent electronic device (IED) is a device that is added to industrial control systems (ICS) to enable advanced power automation.
  • Intelligent Manufacturing Systems - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • Intelligent Mobile Gateway - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • Intelligent Network - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • Intelligent Network (IN) - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • intelligent peripheral interface - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
  • Intelligent Platform Management Interface (IPMI) - Intelligent Platform Management Interface (IPMI) is a specification for the equipment that monitors the physical environment and behavior of a server.
  • intelligent pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • intelligent power management - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • intelligent power management (IPM) - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • intelligent switch - An intelligent switch is a high-level storage area network (SAN) routing switch that provides features such as storage virtualization, quality of service (QoS), remote mirroring, data sharing, protocol conversion, and advanced security.
  • intelligent system - An intelligent system is a machine with an embedded, Internet-connected computer that has the capacity to gather and analyze data and communicate with other systems.
  • intelligent transportation system (ITS) - Intelligent transportation system (ITS) is the application of sensing, analysis, control and communications technologies to ground transportation in order to improve safety, mobility and efficiency.
  • intelligent verification - Intelligent verification is a software process that allows engineers and technicians to use computers to ensure that a hardware design will perform as expected once the device has been fabricated or built.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close