Browse Definitions :

Browse Definitions by Alphabet

IRQ - IT

  • IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • IRR - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
  • irrational number - An irrational number is a real number that cannot be reduced to any ratio between an integer p and a natural number q.
  • IRTF - The IRTF is an activity of the of the Internet Society.
  • IRU - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • IS - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
  • IS IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • IS-IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
  • ISA - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISA Server (Internet Security and Acceleration Server) - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
  • ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
  • ISAE 3402 - ISAE (International Standards for Assurance Engagements) 3402 is a global assurance standard for reporting on controls at service organizations.
  • ISAM - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
  • ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system that allows records to be accessed either sequentially or randomly.
  • ISAPI - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
  • ISBN - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
  • ISBS - The Information Security Breaches Survey is an independent security research effort in the U.
  • iSCSI - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
  • iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
  • iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
  • iSCSI Target Server - ISCSI Target Server is a server that lets administrators boot multiple computers to a network from a single operating system image in a central location.
  • ISDN - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
  • ISE - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • iSeries - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
  • iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • iSeries Quizzes - We've gathered a collection of our iSeries quizzes.
  • island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
  • ISMS - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
  • ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
  • ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
  • ISO 22301 - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 22317 (International Standards Organization 22317) - ISO 22317 is the first formal standard to address the business impact analysis process.
  • ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
  • ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS).
  • ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
  • ISO 9000 - ISO 9000 is a series of standards, developed and published by the International Organization for Standardization (ISO).
  • ISO date format - The International Organization for Standardization (ISO) date format is a standard way to express a numeric calendar date that eliminates ambiguity.
  • ISO IEC - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO/IEC 15504 - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • ISO/IEC 17799: Code of Practice for Information Security Management - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO/IEC 24734 - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
  • ISO17799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • ISOC - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
  • isolation - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ISP - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISP (Internet service provider) - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISPF - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
  • ISPs - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
  • ISR G2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • ISRC - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
  • ISRS - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISRS (information storage and retrieval system) - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISSA (Information Systems Security Association) - The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • issue tracking system - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
  • Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
  • ISV - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
  • IT Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
  • IT aftermarket - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
  • IT aftermarket (tech secondary market) - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
  • IT asset disposition (ITAD) - IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.
  • IT asset lifecycle - The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership.
  • IT asset management (ITAM) - IT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
  • IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
  • IT blueprint - An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.
  • IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
  • IT centralization (information technology centralization) - IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.
  • IT chargeback / showback - IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
  • IT continuity (information technology continuity) - IT continuity (information technology continuity) is the holistic management of technology systems toward the guarantee that essential business operations will proceed in the event of a major disruption.
  • IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
  • IT cost structure - IT cost structure is the relationship of different types of costs within a larger IT budget.
  • IT director (information technology director) - An IT director (information technology director) is an employee in charge of technology within an organization.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT elasticity - IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.
  • IT financial management - IT financial management is the oversight of expenditures required to deliver IT products and services.
  • IT Governance Institute (ITGI) - The IT Governance Institute (ITGI) is an arm of ISACA that provides research, publications and resources on IT governance and related topics.
  • IT incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • IT incident report - An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
  • IT Infrastructure Library - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
  • IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
  • IT ISAC - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
  • IT leadership (information technology leadership) - IT leadership (information technology leadership) refers to the senior management in an organization responsible for driving business strategy via IT infrastructure and applications.
  • IT management - IT management is the process of overseeing all matters related to information technology operations and resources within an IT organization.
  • IT monitoring - IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close