Browse Definitions :

Browse Definitions by Alphabet

INT - IOP

  • Internet Message Access Protocol - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • Internet metering - Internet metering is a service model in which an Internet service provider (ISP) tracks the customer's use of bandwidth and charges accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet Network Information Center - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • internet of things (IoT) - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet Open Trading Protocol - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • Internet presence provider - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • Internet Protocol - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Address - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • Internet Protocol Security - IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • Internet Protocol telephony - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • Internet Quizzes - We've gathered a collection of our quizzes on Internet-related topics.
  • Internet ratings - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.
  • Internet refrigerator - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet refrigerator (Net fridge or Web-enabled refrigerator) - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
  • Internet Relay Chat - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Research Task Force (IRTF) - The IRTF is an activity of the of the Internet Society.
  • Internet Router in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing in Space (IRIS) - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Routing Protocol in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • Internet Security and Acceleration Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • Internet Server Application Program Interface - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • Internet service provider - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • internet shaming (online shaming) - Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet Small Computer System Interface - The iSCSI transport layer protocol allows the SCSI command to be sent over LANs, WANs and the Internet.
  • Internet Small Computer System Interface (iSCSI) adapter - An iSCSI adapter is a network interface card that enables the transmission of data between host computers and iSCSI-based storage arrays and typically handles the TCP/IP processing.
  • Internet Society - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • Internet Storm Center - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them.
  • Internet time - Internet time is the concept that events occur at a faster rate on the Internet than elsewhere or that, everywhere, the Internet is affecting the pace of change.
  • internet timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Internet timeline - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.
  • Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
  • Internet Transaction Server - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet Transaction Server (ITS) - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
  • Internet users' bill of rights - The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online.
  • Internet voting - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • Internet2 - Internet2 is a collaboration among more than 100 U.
  • Internetwork Packet Exchange - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • internetworking - Internetworking is a term used by Cisco, BBN, and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.
  • InterNIC - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • InterNIC (Internet Network Information Center) - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
  • interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the end user.
  • interpreted - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interpreted (script) - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • interprocess communication - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interprocess communication (IPC) - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • interrupt - An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.
  • interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • interruption science - Interruption science is the study of how disruptions from current tasks affect employees on the job.
  • intersection symbol - The intersection symbol denotes the intersection of two sets.
  • interstitial - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • interstitial (in between) - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
  • Intertainment - Intertainment is the name of an e-business initiative that encourages shopping malls and other public places to provide visitors with free high-speed Internet access.
  • intrabody signaling - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
  • intrusion - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a network security and threat prevention tool.
  • inventory management - Inventory management is the supervision of non-capitalized assets, or inventory, and stock items.
  • inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
  • inventory turns - Inventory turns are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse mapping - Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.
  • inverse mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • inverse multiplexing - Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels (such as a T-1 or E-1 lines) and are then reconstructed at the other end back into the original data stream.
  • inverse multiplexing over ATM - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • inverse multiplexing over ATM (IMA) - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.
  • invisible Internet - Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records and other content that is accessible over the Internet but is not crawled and indexed by search engines.
  • invitation to tender (ITT) - An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.
  • invocation ID - An invocation ID is an ID number that identifies databases within Active Directory and changes as AD is in a restore process.
  • invoice - An invoice is a document listing billed goods and/or services that a provider presents to a customer.
  • IO - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
  • io fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
  • IO virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IO.SYS - In the Windows 95 operating system, IO.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
  • ion - An ion is an atom or group of atoms in which the number of electrons is different from the number of proton s.
  • ion pump - An ion pump is a device that can cool, clean and filter air without the use of conventional fans or other moving parts.
  • ionizing radiation - Ionizing radiation, also (imprecisely) called radioactivity, is electromagnetic (EM) radiation whose waves contain energy sufficient to overcome the binding energy of electrons in atoms or molecule s, thus creating ion s.
  • IOPS - IOPS measures the maximum number of reads and writes to non-contiguous storage.
  • IOPS (input/output operations per second) - IOPS measures the maximum number of reads and writes to non-contiguous storage.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close