Browse Definitions :

Browse Definitions by Alphabet

INT - IPS

  • interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • interruption science - Interruption science is the study of how disruptions from current tasks affect employees on the job.
  • intersection symbol - The intersection symbol denotes the intersection of two sets.
  • interstitial - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • interstitial (in between) - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • intrabody signaling - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
  • intrusion - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion detection - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion detection system - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a network security and threat prevention tool.
  • inventory management - Inventory management is the supervision of noncapitalized assets -- or inventory -- and stock items.
  • inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
  • inventory turns - Inventory turns are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • inverse multiplexing over ATM - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.
  • inversion of control (IoC) - Inversion of control, also known as the Hollywood Principle, changes the control flow of an application and allows developers to sidestep some typical configuration hassles.
  • invisible Internet - Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records and other content that is accessible over the Internet but is not crawled and indexed by search engines.
  • invitation to tender (ITT) - An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.
  • invocation ID - An invocation ID is an ID number that identifies databases within Active Directory and changes as AD is in a restore process.
  • invoice - An invoice is a document listing billed goods and/or services that a provider presents to a customer.
  • IO - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • io fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • IO virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IO.SYS - In the Windows 95 operating system, IO.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
  • ion - An ion is an atom or group of atoms in which the number of electrons is different from the number of proton s.
  • ion pump - An ion pump is a device that can cool, clean and filter air without the use of conventional fans or other moving parts.
  • IOPS - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • IOPS (input/output operations per second) - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • IOS - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
  • iOS 7 - iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch.
  • iOS 8 - IOS 8 is the eighth version of Apple’s mobile operating system.
  • iOS developer kit - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.
  • iOS Developer Program - The iOS Developer Program is a fee-based subscription that allows program members to publish approved apps to the Apple app store.
  • IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
  • IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
  • IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
  • IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT OS (Internet of Things operating system) - An IoT OS is an operating system that is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.
  • IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
  • IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
  • IOTA - IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy.
  • IOTP - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • IOV - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IP - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
  • IP - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • IP - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • IP address - This definition is based on Internet Protocol Version 4.
  • IP address (Internet Protocol Address) - This definition is based on Internet Protocol Version 4.
  • IP address forgery - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
  • IP address management (IPAM) - Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network's Internet Protocol address (IP address) space.
  • IP addressing - 32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system).
  • IP camera - An IP camera is a networked digital video camera that transmits data over a Fast Ethernet link.
  • IP core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP core (intellectual property core) - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP Multimedia Subsystem - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
  • IP PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP SAN - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
  • IP SLA (Cisco) - IP SLA (Internet protocol service level agreement) is a feature of the Cisco IOS (Internetwork Operating System) that allows an IT professional to collect information about network performance in real time.
  • IP Spoofing - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
  • IP spoofing - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
  • IP storage area network - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IP tables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
  • IP telephony - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
  • IP-PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP/PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • iPad - The iPad is a touchscreen tablet PC made by Apple.
  • iPad 2 - The iPad 2 is a 9.
  • iPad Air - Apple’s iPad Air is an iOS tablet that is lighter and thinner than the company’s previous tablets.
  • IPC - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • iPhone - IPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
  • iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
  • IPI - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
  • IPL - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • IPLC - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
  • IPLC (international private leased circuit) - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
  • IPM - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • IPng - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IPO - .
  • iPod - The iPod is a combination portable digital media player and hard drive from Apple Computer.
  • IPP - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • IPPBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IPPP - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
  • IPS - An intrusion prevention system (IPS) is a network security and threat prevention tool.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close