Browse Definitions :

Browse Definitions by Alphabet

INT - INV

  • Internet Fibre Channel Protocol - iFCP (Internet Fibre Channel Protocol) is an emerging standard for extending Fibre Channel storage networks across the Internet.
  • Internet Group Management Protocol - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
  • Internet Group Management Protocol (IGMP) - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
  • internet history - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Internet Information Server - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • Internet Inter ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • Internet Inter-ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • Internet Key Exchange - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
  • Internet Key Exchange (IKE) - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
  • Internet mailer - A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
  • Internet map - An Internet map is any kind of map that attempts to portray all or some aspect of the Internet.
  • internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
  • Internet Message Access Protocol - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • Internet metering - Internet metering is a service model in which an Internet service provider (ISP) tracks the customer's use of bandwidth and charges accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet Network Information Center - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • internet of things (IoT) - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet Open Trading Protocol - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • Internet presence provider - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • Internet Protocol - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Address - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Security - IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • Internet Protocol telephony - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • Internet Quizzes - We've gathered a collection of our quizzes on Internet-related topics.
  • Internet ratings - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.
  • Internet reboot keys - Internet reboot keys are encrypted DNSSEC keys that can restore the Internet root zone in the event of an attack or natural catastrophe.
  • Internet refrigerator - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet refrigerator (Net fridge or Web-enabled refrigerator) - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet Relay Chat - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Research Task Force (IRTF) - The IRTF is an activity of the of the Internet Society.
  • Internet Router in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space (IRIS) - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing Protocol in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Security and Acceleration Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • Internet Server Application Program Interface - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • Internet service provider - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • internet shaming (online shaming) - Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet Small Computer System Interface - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • Internet Small Computer System Interface (iSCSI) adapter - An iSCSI adapter is a network interface card that enables the transmission of data between host computers and iSCSI-based storage arrays and typically handles the TCP/IP processing.
  • Internet Society - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • Internet Storm Center - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them.
  • Internet time - Internet time is the concept that events occur at a faster rate on the Internet than elsewhere or that, everywhere, the Internet is affecting the pace of change.
  • internet timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Internet timeline - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.
  • Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
  • Internet Transaction Server - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet Transaction Server (ITS) - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
  • Internet users' bill of rights - The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online.
  • Internet voting - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • Internet.org - Internet.org is an initiative to make the Web affordable and accessible for people in developing and disadvantaged areas of the world.
  • Internet2 - Internet2 is a collaboration among more than 100 U.
  • Internetwork Packet Exchange - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • internetworking - Internetworking is a term used by Cisco, BBN, and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.
  • InterNIC - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • InterNIC (Internet Network Information Center) - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the end user.
  • interpreted - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interpreted (script) - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interprocess communication - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interprocess communication (IPC) - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interrupt - An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.
  • interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • interruption science - Interruption science is the study of how disruptions from current tasks affect employees on the job.
  • intersection symbol - The intersection symbol denotes the intersection of two sets.
  • interstitial - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • interstitial (in between) - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • Intertainment - Intertainment is the name of an e-business initiative that encourages shopping malls and other public places to provide visitors with free high-speed Internet access.
  • intrabody signaling - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
  • intrusion - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a network security and threat prevention tool.
  • inventory management - Inventory management is the supervision of non-capitalized assets (inventory) and stock items.
  • inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
  • inventory turns - Inventory turns are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse mapping - Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.
  • inverse mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • inverse multiplexing - Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels (such as a T-1 or E-1 lines) and are then reconstructed at the other end back into the original data stream.
  • inverse multiplexing over ATM - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • inverse multiplexing over ATM (IMA) - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close