Browse Definitions :

Browse Definitions by Alphabet

INT - INV

  • Internet Explorer Administration Kit - Internet Explorer Administration Kit (IEAK) is a product from Microsoft that enables an organization to centrally manage the customizing, deployment, and maintenance of Microsoft's Web browser, Internet Explorer, for users on different computer platforms.
  • Internet Explorer Administration Kit (IEAK) - Internet Explorer Administration Kit (IEAK) is a product from Microsoft that enables an organization to centrally manage the customizing, deployment, and maintenance of Microsoft's Web browser, Internet Explorer, for users on different computer platforms.
  • Internet Fibre Channel Protocol - iFCP (Internet Fibre Channel Protocol) is an emerging standard for extending Fibre Channel storage networks across the Internet.
  • Internet Group Management Protocol - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
  • Internet Group Management Protocol (IGMP) - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
  • internet history - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Internet Information Server - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • Internet Inter ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • Internet Inter-ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • Internet Key Exchange - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
  • Internet Key Exchange (IKE) - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
  • Internet Learning Guides - We've gathered a collection of our learning guides and tutorials on Internet-related topics.
  • Internet mailer - A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
  • Internet map - An Internet map is any kind of map that attempts to portray all or some aspect of the Internet.
  • internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
  • Internet Message Access Protocol - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • Internet metering - Internet metering is a service model in which an Internet service provider (ISP) tracks the customer's use of bandwidth and charges accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet Network Information Center - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • internet of things (IoT) - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet Open Trading Protocol - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • Internet presence provider - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • Internet Protocol - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Address - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Security - IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • Internet Protocol telephony - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • Internet Quizzes - We've gathered a collection of our quizzes on Internet-related topics.
  • Internet ratings - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.
  • Internet reboot keys - Internet reboot keys are encrypted DNSSEC keys that can restore the Internet root zone in the event of an attack or natural catastrophe.
  • Internet refrigerator - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet refrigerator (Net fridge or Web-enabled refrigerator) - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet Relay Chat - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Research Task Force (IRTF) - The IRTF is an activity of the of the Internet Society.
  • Internet Router in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space (IRIS) - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing Protocol in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Security and Acceleration Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • Internet Server Application Program Interface - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • Internet service provider - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • internet shaming (online shaming) - Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet Small Computer System Interface - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • Internet Small Computer System Interface (iSCSI) adapter - An iSCSI adapter is a network interface card that enables the transmission of data between host computers and iSCSI-based storage arrays and typically handles the TCP/IP processing.
  • Internet Society - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • Internet Storm Center - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them.
  • Internet time - Internet time is the concept that events occur at a faster rate on the Internet than elsewhere or that, everywhere, the Internet is affecting the pace of change.
  • internet timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Internet timeline - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.
  • Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
  • Internet Transaction Server - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet Transaction Server (ITS) - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
  • Internet users' bill of rights - The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online.
  • Internet voting - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • Internet.org - Internet.org is an initiative to make the Web affordable and accessible for people in developing and disadvantaged areas of the world.
  • Internet2 - Internet2 is a collaboration among more than 100 U.
  • Internetwork Packet Exchange - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • internetworking - Internetworking is a term used by Cisco, BBN, and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.
  • InterNIC - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • InterNIC (Internet Network Information Center) - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the end user.
  • interpreted - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interpreted (script) - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interprocess communication - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interprocess communication (IPC) - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interrupt - An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.
  • interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • interruption science - Interruption science is the study of how disruptions from current tasks affect employees on the job.
  • intersection symbol - The intersection symbol denotes the intersection of two sets.
  • interstitial - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • interstitial (in between) - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • Intertainment - Intertainment is the name of an e-business initiative that encourages shopping malls and other public places to provide visitors with free high-speed Internet access.
  • intrabody signaling - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
  • intrusion - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a device or software application that alerts an administrator of a security breach, policy violation or other compromise that may adversely affect the administrator's information technology (IT) network.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion prevention - Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.
  • inventory management - Inventory management is the supervision of non-capitalized assets (inventory) and stock items.
  • inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
  • inventory turns - Inventory turns are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse mapping - Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.
  • inverse mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close