Browse Definitions :

Browse Definitions by Alphabet

INS - INT

  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant messaging spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • Instant Messaging: Glossary - This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.
  • instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
  • instant spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • instant translation - Instant translation is the translation from one language to another of Web pages, e-mail, and online chat text by a computer program so that the translated results appear almost instantly.
  • instantiate - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
  • INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
  • Institute for Health Technology Transformation - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
  • Institute of Electrical and Electronics Engineers - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • Institute of Electrical and Electronics Engineers Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
  • Institute of Electrical and Electronics Engineers Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
  • Institute of Information Security Professionals - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
  • instruction - An instruction is an order given to a computer processor by a computer program.
  • instruction set - An instruction set is a group of commands for a CPU in machine language.
  • insurance claims analysis - Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.
  • int - "int" is one of the top-level domain names that can be used when choosing a domain name.
  • intangible asset - Intangible assets are those assets that are based off non-physical assets.
  • integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
  • integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
  • integrated access management - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated access management (IAM) - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
  • integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
  • integrated circuit - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
  • integrated circuit for encryption/decryption - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • integrated development environment - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • Integrated Digital Enhanced Network - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
  • Integrated Drive Electronics - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
  • integrated search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • integrated solar - Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • integrated T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated T1 (channelized T1) - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • integrated threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.
  • integration - Integration is the act of bringing together smaller components into a single system that functions as one.
  • integration and testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
  • integration centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
  • integration server - An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.
  • integration testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration testing or integration and testing (I&T) - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
  • integration-centric BPM - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integration-centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • integrity check-value - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • Intel - Intel is the world’s largest manufacturer of PC microprocessors and the holder of the x86 processor architecture patent.
  • Intel 4004 - The Intel 4004 was one of the first microprocessors ever produced, released in 1971.
  • Intel 8008 - The Intel 8008, originally called the 1201, was one of the first microprocessors ever developed.
  • Intel 80286 - The Intel 80286 (often called simply the 286) was a 16-bit microprocessor chip introduced in 1982.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
  • Intel 80486 - Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor.
  • Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
  • Intel Atom - Atom is Intel's family of x86 and x86-64 processors that are optimized for small computing devices, such as smartphones and mobile Internet devices (MIDs).
  • Intel Bay Trail - Intel Bay Trail is the code name for a line of Atom processors manufactured by Intel Corp.
  • Intel Compute Card - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
  • Intel Curie - Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE.
  • Intel Hub Architecture - Accelerated Hub Architecture (AHA) (also called Intel Hub Architecture) is an Intel 800-series chipset design that uses a dedicated bus to transfer data between the two main processor chips instead of using the Peripheral Component Interconnect (PCI) bus, which was used in previous chipset architectures.
  • Intel Quark - Intel Quark is an embedded system-on-a-chip (SoC) processor design intended for smaller mobile devices like wearable computers.
  • Intel Technology Provider - The Intel Technology Provider program is Intel Corp.
  • Intel VT - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • Intel Xeon D-2100 - The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.
  • intellectual capital - Intellectual capital is knowledge that can be exploited for some money-making or other useful purpose.
  • intellectual property - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • intellectual property (IP) - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • intellectual property core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • intelligence (intel) - According to the FBI, intelligence is both the information itself and the processes used to collect and analyze it.
  • intelligence community - The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.
  • intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
  • intelligent agent - On the Internet, an agent (also called an intelligent agent) is a program that gathers information or performs some other service without your immediate presence and on some regular schedule.
  • intelligent agent - On the Internet, an intelligent agent (or simply an agent) is a program that gathers information or performs some other service without your immediate presence and on some regular schedule.
  • intelligent agent (AI) - An intelligent agent is an AI hardware and/or software system with some degree of autonomy and the capacity to make decisions and take actions.
  • intelligent character recognition - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • intelligent character recognition (ICR) - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • intelligent compression - Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.
  • intelligent content - Intelligent content is an adaptation of digital text, image, video, audio or multimedia data with coding added that allows it to be automatically processed.
  • intelligent database - An intelligent database is a full-text database that employs artficial intelligence (AI), interacting with users to ensure that returned items (hits) contain the most relevant information possible.
  • intelligent device - An intelligent device is any type of equipment, instrument, or machine that has its own computing capability.
  • intelligent electronic device (IED) - An intelligent electronic device (IED) is a device that is added to industrial control systems (ICS) to enable advanced power automation.
  • Intelligent Manufacturing Systems - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
  • Intelligent Mobile Gateway - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • Intelligent Network - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • Intelligent Network (IN) - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
  • intelligent peripheral interface - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
  • Intelligent Platform Management Interface (IPMI) - Intelligent Platform Management Interface (IPMI) is a specification for the equipment that monitors the physical environment and behavior of a server.
  • intelligent pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • intelligent power management - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • intelligent power management (IPM) - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • intelligent process automation (IPA) - Intelligent process automation (IPA) is a combination of technologies used to manage and automate digital processes.
  • intelligent switch - An intelligent switch is a high-level storage area network (SAN) routing switch that provides features such as storage virtualization, quality of service (QoS), remote mirroring, data sharing, protocol conversion, and advanced security.
  • intelligent system - An intelligent system is a machine with an embedded, Internet-connected computer that has the capacity to gather and analyze data and communicate with other systems.
  • intelligent transportation system (ITS) - Intelligent transportation system (ITS) is the application of sensing, analysis, control and communications technologies to ground transportation in order to improve safety, mobility and efficiency.
  • intelligent verification - Intelligent verification is a software process that allows engineers and technicians to use computers to ensure that a hardware design will perform as expected once the device has been fabricated or built.
  • intelligent video - Intelligent video is digital video technology integrated with analytical software.
  • Intelligent workload management (IWM) - Intelligent workload management (IWM) is an approach to running IT systems in a way that rationally optimizes and maximizes use of computing resources and directing them toward better processing, workflow and delivery of services.

-ADS BY GOOGLE

SearchCompliance

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

SearchStorage

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • megabytes per second (MBps)

    Megabytes per second (MBps) is a unit of measurement for data transfer speed to and from a computer storage device.

  • zettabyte

    A zettabyte is a unit of measurement used by technology professionals and the general public to describe a computer or other ...

Close