Browse Definitions :

Browse Definitions by Alphabet

IOS - IS-

  • iOS 8 - IOS 8 is the eighth version of Apple’s mobile operating system.
  • iOS developer kit - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.
  • iOS Developer Program - The iOS Developer Program is a fee-based subscription that allows program members to publish approved apps to the Apple app store.
  • IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
  • IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
  • IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
  • IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT OS (Internet of Things operating system) - An IoT OS is an operating system that is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.
  • IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
  • IoT security (internet of things security) - IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).
  • IOTA - IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy.
  • IOTP - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • IOV - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IP - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • IP - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
  • IP - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
  • IP address - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet.
  • IP address (Internet Protocol Address) - This definition is based on Internet Protocol Version 4.
  • IP address forgery - IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network.
  • IP address management (IPAM) - Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network's Internet Protocol address (IP address) space.
  • IP addressing - 32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system).
  • IP camera - An IP camera is a networked digital video camera that transmits data over a Fast Ethernet link.
  • IP core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP core (intellectual property core) - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP Multimedia Subsystem (IMS) - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
  • IP PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP SAN - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
  • IP SLA (Cisco) - IP SLA (Internet protocol service level agreement) is a feature of the Cisco IOS (Internetwork Operating System) that allows an IT professional to collect information about network performance in real time.
  • IP spoofing - IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network.
  • IP Spoofing - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
  • IP storage - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP storage area network - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IP tables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
  • IP telephony - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).
  • IP-PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP/PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • iPaaS (integration platform as a service) - Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments.
  • iPad - The iPad is a touchscreen tablet PC made by Apple.
  • iPad 2 - The iPad 2 is a 9.
  • iPad Air - Apple’s iPad Air is an iOS tablet that is lighter and thinner than the company’s previous tablets.
  • IPC - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
  • iPhone - IPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
  • iPhone 3G - iPhone 3G is the second generation of iPhone, a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone.
  • iPhone 5 - The iPhone 5 is the sixth version of Apple's touch-based smartphone.
  • iPhone 5s - iPhone 5s is a smartphone from Apple that runs the iOS 7 operating system  (OS) and is powered by a 64-bit dual-core A7 processor, which Apple claims to be 2X faster than the A6 chip from the iPhone 5.
  • iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
  • IPI - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
  • IPI (Intelligent Peripheral Interface) - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
  • IPL - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
  • iPlanet - iPlanet is Sun Microsystem's solution for a Web server and related programs intended to allow an enterprise to take advantage of the Internet.
  • IPLC - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
  • IPLC (international private leased circuit) - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
  • IPM - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • IPO - .
  • IPO (initial public offering) - .
  • iPod - The iPod is a combination portable digital media player and hard drive from Apple Computer.
  • IPP - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • IPP (Internet presence provider) - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
  • IPPBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IPPP (Internet presence provider and promoter) - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
  • IPS - Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.
  • IPsec - IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.
  • IPsec (Internet Protocol Security) - IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.
  • iptables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
  • IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.
  • IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme.
  • IPX - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
  • IR - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
  • IR LED (infrared light-emitting diode) - An IR LED (infrared light emitting diode) is a solid state lighting (SSL) device that emits light in the infrared range of the electromagnetic radiation spectrum.
  • IR wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • IR wireless (infrared wireless) - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
  • IRC - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • IrDA - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • IrDA (Infrared Data Association) - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
  • Iris - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • iris recognition - Iris recognition is a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye.
  • IRIX - IRIX is a UNIX -based operating system from SGI that is optimized for applications that use 3-D visualization and virtual reality environments.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • Iron Python - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
  • IronPython - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
  • IRQ - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • IRR - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
  • irrational number - An irrational number is a real number that cannot be reduced to any ratio between an integer p and a natural number q.
  • IRU - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • IS - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close