Glossary Letter I
I and T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
I SPY Act Internet Spyware Prevention Act of 2005 - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
I&T - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
i-Mode - i-Mode is the packet-based service for mobile phones offered by Japan's leader in wireless technology, NTT DoCoMo.
i-Net - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
I-SPY Act -- Internet Spyware Prevention Act of 2005 - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744) - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
i.LINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
I.T. - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
I/O - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
I/O fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
I/O fencing (input/output fencing) - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
I/O virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
I18N - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
I2C - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
I2C bus - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
I2C bus (Inter-IC bus) - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
I2S - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
I2S (SQUID) - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
i5 - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
i5 Series - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
IA-64 - IA-64 is a 64-bit processor architecture developed at Intel that is based on Explicitly Parallel Instruction Computing (EPIC) and designed as the foundation for Intel's line of microprocessors through 2005.
IaaS - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
IAB - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
IAB - The IAB (Internet Advertising Bureau) is an organization that fosters the growth of advertising on the Internet.
IAB (Internet Architecture Board) - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
IAM - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
IAM system - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
IANA - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
IAO - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
IAP - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
IAS 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
IAX - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
IBM - Big Blue refers to IBM, which has used blue as a branding color in its logo and elsewhere.
IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
IBM Bluemix Local - IBM Bluemix Local is a private version of the IBM Bluemix public cloud platform.
IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
IBM Cloud Functions - IBM Cloud Functions is the company’s software underlying cloud applications to provide granular access control to cloud resources.
IBM Daksh (IBM Global Process Services) - IBM Daksh, also known as IBM Global Process Services, is a business process outsourcing (BPO) firm that was formerly known as Daksh eServices.
IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
IBM i - IBM i is an operating system (OS) created to run on IBM’s Power Systems and Pure Systems for minicomputers and enterprise servers.
IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
IBM iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
IBM Lotus Instant Messaging & Web Conferencing - Sametime is software from Lotus for group collaboration over the Internet.
IBM MobileFirst - IBM MobileFirst is a group of products designed to simplify and accelerate mobile adoption by offering mobile application development and management in a single package.
IBM MobileFirst Platform Foundation (formerly IBM Worklight) - IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.
IBM OpenPages - IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives.
IBM PartnerWorld - IBM PartnerWorld is a program run by IBM that outlines how the company works with IBM Business Partners such as VARs, systems integrators, managed service providers, consultants and independent software vendors.
IBM Power9 Server - IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line.
IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
IBM racetrack memory - Racetrack memory is a type of non-volatile, solid-state nanotech memory being developed by IBM.
IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
IBM SmartCloud - IBM SmartCloud is a line of enterprise-class cloud computing technologies and services for building and using private, public and hybrid clouds.
IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
IBM System z Application Assist Processor (zAAP) - The IBM System z Application Assist Processor (zAAP) is a specialty engine that provides a performance environment for Web-based apps and service-oriented architecture-based technologies, e.
IBM System z Integrated Information Processor (zIIP) - IBM's System z Integrated Information Processor (zIIP) is a specialty offload engine that helps improve computing performance for a subset of mainframe workloads.
IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
IBM Watson Assistant - IBM Watson Assistant is a white label cloud service that allows enterprise-level software developers to embed a virtual assistant (VA) in the software they are developing and brand the VA as their own.
IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
IBM Workplace - Lotus Workplace is a set of customizable online work collaboration products from IBM's Lotus division.
iButton - An iButton is a microchip similar to those used in a smart card but housed in a round stainless steel button of 17.
IC - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
IC BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
IC-BPMS - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
IC-BPMS (integration-centric business process management suite) - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
ICANN - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
ICD-10-CM - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
ICD-11 - The International Classification of Disease, Eleventh Revision (ICD-11) is a system of medical coding created by the World Health Organization (WHO) for documenting diseases, signs and symptoms, diagnoses and social circumstances.
ICD-9-CM - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
ice - Ice, jello, and liquid are related terms describing three approaches to controlling content placement on a Web page.
ICE - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
ICE - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
ICE - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
ICE (In Case of Emergency) - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
Ice Cream Sandwich - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
Ice Lake - Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.
IceNewk - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
IceWarp - IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.
iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
IcM - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
ICM file - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
ICM file (Image Color Matching file) - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
ICMP - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
ICMP bug - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
ICMP sweep - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
ICO - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
icon - In a computer's graphical user interface (GUI), an icon (pronounced EYE-kahn) is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user.
ICP - An ICP (Internet commerce provider) is a company that sells software and services that enable a merchant with a Web site to build an online store on the merchant's own site or on the provider's site.
ICP (Internet commerce provider) - An ICP (Internet commerce provider) is a company that sells software and services that enable a merchant with a Web site to build an online store on the merchant's own site or on the provider's site.
ICQ - ICQ ("I Seek You") is a program you can download that will let you know when friends and contacts are also online on the Internet.
ICR - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
ICS - Android 4.0 Ice Cream Sandwich (ICS) is a version of Google’s mobile operating system.
ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
ICT - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
ICT4D - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
ID - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
ID management - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
ID3 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
ID3 tag - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
ID3v1 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
ID3v2 - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
IDaaS - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
IDE - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
IDE - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
IDE (Integrated Drive Electronics) - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
IDEA - IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.
ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
IDEF - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
IDEF (Integrated Definition) - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
iDEN - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
iDEN (Integrated Digital Enhanced Network) - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
identification chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
identity access management system - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
identity as a Service - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
identity as a Service (IDaaS) - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
identity card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
identity chaos - Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
identity chaos (password chaos) - Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
Identity Ecosystem - Identity Ecosystem, more formally known as the National Strategy for Trusted Identities in Cyberspace, is a proposal from the United States federal government to improve identity authentication on the Internet and make online transactions safer.
identity federation - Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
identity governance - Identity governance is the policy-based centralized orchestration of user identity management and access control.
identity management - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
identity provider - An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of login credentials that will ensure the entity is who or what it says it is across multiple platforms, applications and networks.
identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else.
IDF - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting the telecommunications cable between end user devices and a main distribution frame (MDF).
IDF - An interface device (IDF) is a hardware component or system of components that allows a human being to interact with a computer or other communication device.
IDL - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
IDoc - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
idoru - An idoru is a virtual (computer-created) media star.
IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
IDS - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
IDSL - IDSL is a system in which digital data is transmitted at 128 Kbps on a regular copper telephone line (twisted pair) from a user to a destination using digital (rather than analog or voice) transmission, bypassing the telephone company's central office equipment that handles analog signals.
IE - Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.
IEC - On the Internet, "IEC" usually means the International Electrotechnical Commission.
IEEE - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
IEEE 1284 parallel interface standard - The IEEE 1284 parallel interface standard is the prevalent standard for connecting a computer to a printer or certain other devices over a parallel (eight bits of data at a time) physical and electrical interface.
IEEE 1284.4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
IEEE 1394 - IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.
IEEE 802 wireless standards - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
IEEE Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
IEEE Computer Society (Institute of Electrical and Electronics Engineers Computer Society) - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
IEEE Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
IEEE Standards Association (Institute of Electrical and Electronics Engineers Standards Association) - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
IEEE-CS - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
IEEE-SA - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
IETF - The IETF (Internet Engineering Task Force) is the body that defines standard Internet operating protocols such as TCP/IP.
IETF (Internet Engineering Task Force) - The IETF (Internet Engineering Task Force) is the body that defines standard Internet operating protocols such as TCP/IP.
iFCP - iFCP (Internet Fibre Channel Protocol) is an emerging standard for extending Fibre Channel storage networks across the Internet.
iFCP (Internet Fibre Channel Protocol) - iFCP (Internet Fibre Channel Protocol) is an emerging standard for extending Fibre Channel storage networks across the Internet.
IFrame - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
IFrame (Inline Frame) - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
iFrame overlay - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
IFRS - IFRS (International Financial Reporting Standards) is a set of accounting standards developed by an independent, not-for profit organization called the International Accounting Standards Board (IASB).
IFRS - International financial reporting standards (IFRS) are specific organizational and monetary standards and frameworks for financial reporting that have been adopted in 113 countries including India, Australia and the European Union.
IFRS (International Financial Reporting Standards) - IFRS (International Financial Reporting Standards) is a set of accounting standards developed by an independent, not-for profit organization called the International Accounting Standards Board (IASB).
IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
IGMP - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
IGP - An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).
IGP (Interior Gateway Protocol) - An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).
IGRP - EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols.
IHRIM (International Association for Human Resource Information Management) - IHRIM (International Association for Human Resource Information Management) is a networking and education association for HRIS and HR technology professionals.
iHT2 - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
IIOP - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
IIOP (Internet Inter-ORB Protocol) - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
IIS - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
IISP - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
IISP (Institute of Information Security Professionals) - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
iJacking - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else.
IKE - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
ikigai - Ikigai is a Japanese word whose meaning encompasses joy, a sense of purpose and meaning and a feeling of well-being.
ILEC - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
ILEC (incumbent local exchange carrier) - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
iLINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
illegal operation - An illegal operation, a term often seen in error messages, is a command to the operating system or an instruction to the computer processor that specifies an operation that is unknown to the operating system or processor and that therefore can't be performed.
illumos - Illumos is a free, open source operating system (OS) developed as a fork of Unix-based OpenSolaris, the open source community-built derivative of the Solaris OS.
illustrated - Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.
ILM - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
ILOVEYOU virus - The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk.
IM - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
IM - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
IM bot - An IM bot is a chatterbot program that uses instant messaging (IM) as an application interface.
IM spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
IM worm - An IM worm is self-replicating malicious code that spreads in instant messaging networks.
IMA - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
iMac - The iMac is a low-cost version of Apple Computer's Macintosh.
image - An image is a picture that has been created or copied and stored in electronic form.
Image Color Matching file - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
image compression - Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level.
image content search - Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query.
image map - In Web page development, an image map is a graphic image defined so that a user can click on different areas of the image and be linked to different destinations.
image metadata - Image metadata is information about an image that is associated with the image file either automatically or deliberately added.
image of the universe - An image of the early universe, showing irregularities in its brightness 380,000 years after its birth, has been produced by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).
image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
image replay attack - An image replay attack is the use of a picture to fool an authentication method.
image setter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
image spam - Image spam is junk email that replaces text with images as a means of fooling spam filters.
image stitching - Image stitching is the combination of images with overlapping sections to create a single panoramic or high-resolution image.
image-based backup - Image-based backup is a backup process for a computer or virtual machine (VM) that creates a copy of the operating system and all the data associated with it, including the system state, and application configurations and saves it as a single file.
imagesetter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
imaginary number - An imaginary number is a quantity of the form ix, where x is a real number and i is the positive square root of -1.
imaging - Imaging is the capture, storage, manipulation, and display of images.
IMAP - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
IMAP (Internet Message Access Protocol) - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
IMHO - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
IMing - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
imitation game - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
immediate real time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
immediate real-time system - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
immersive fitness - Immersive fitness is technology enhanced exercise typically including simulated audio/visual experiences and performance metrics.
immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
immersive web - The immersive web is a version of the online world that incorporates advanced technologies to enhance user engagement and blur the line between the user's physical reality and the digital environment.
immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
impact sourcing - Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.
impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
implementation - Implementation is the execution of any idea, model, or method; in IT, it refers to the process of setting up new software or hardware after a purchase is made.
implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
import - In a personal computer application, to import is to open a file that is in a format different from the format the application creates on its own.
impostor syndrome - Impostor syndrome is a psychological phenomenon that causes sufferers to attribute their successes and accomplishments to external factors rather than to personal merit, hard work or ability.
impression - In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.
improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
imputation - Imputation, in statistics, is the insertion of a value to stand in for missing data.
IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
IMS - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
IMS - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
IMS - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
IMS (Intelligent Manufacturing Systems) - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
IMT CDMA - CDMA2000, also known as IMT-CDMA Multi-Carrier or 1xRTT, is a code-division multiple access (CDMA) version of the IMT-2000 standard developed by the International Telecommunication Union (ITU).
IMT-2000 direct spread - Also see CDMA, CDMA One, and CDMA2000.
IN - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
in between - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
In Case of Emergency - ICE (for In Case of Emergency) is an abbreviation that a cell phone user can enter into the device's directory to identify the telephone number of a primary contact, such as next of kin.
in circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
in data mining - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
in grid computing - Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power.
in house - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
in managed services - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.
in my humble opinion - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
in networks - In networks, a jabber is any device that is handling electrical signals improperly, usually with negative results for the rest of the network.
in the wild - According to noted computer virus expert Paul Ducklin, in order for a virus to be considered in the wild, "it must be spreading as a result of normal day-to-day operations on and between the computers of unsuspecting users.
in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
in-band signaling - In the public switched telephone network, (PSTN), in-band signaling is the exchange of signaling (call control) information on the same channel that the telephone call itself is using.
in-circuit emulator - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
in-house marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
in-memory database management system (IMDBMS) - An in-memory database management system (IMDBMS) stores, manages and provides access to data from main memory.
In-Memory OLTP - In-Memory OLTP is a Microsoft in-memory technology built into SQL Server and optimized for transaction processing applications.
inbound call - An inbound call is one that a customer initiates to a call center or contact center.
inbound call center - An inbound call center is one that exclusively or predominately handles inbound calls (calls initiated by the customer) rather than outbound calls.
inbound link - An inbound link (also referred to as a back link) is a hyperlink on a third-party web page that points to a web page on �your site.
inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
Inbox Zero - Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.
incidence - Incidence, in statistics, is the rate of occurrence of something within a population, or the number of times it occurs.
incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
incident response plan - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
incident response policy - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
Incompleteness Theorem - The Incompleteness Theorem is a pair of logical proofs that revolutionized mathematics.
increment - An increment is a small, unspecified, nonzero change in the value of a quantity.
Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
Incremental Revenue (Value) Analysis - Incremental Revenue (Value) Analysis is a process used to calculate the value of each agent in a call center.
Incremental Revenue Analysis - Incremental Revenue (Value) Analysis is a process used to calculate the value of each agent in a call center.
incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
incubator - In the business world, an incubator is an enterprise that is set up to provide office space, equipment, and sometimes mentoring assistance and capital to new businesses that are just getting started.
incumbent local exchange carrier - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
Indefeasible Right of Use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
Indefeasible Right of Use (IRU) - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
indemnification - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
indemnity - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
indempotency - Based on our inferences about the only three uses of this term that we have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee, from Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no matter how much it is used or accessed by another thing or action.
Indeo - Indeo is a compression algorithm developed by Intel and used by Microsoft's Video for Windows.
independent software vendor - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
independent variable - An independent variable is a variable that is manipulated to determine the value of a dependent variable.
index fund - An index fund is a type of mutual fund collection that follows the trend of a given security or market index, which represents a number of sectors of a market and offers comprehensive exposure to several markets.
index register - An index register is a circuit that receives, stores, and outputs instruction-changing codes in a computer.
Indexed Sequential Access Method - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
India State Data Centre - India State Data Centre is a project that will consolidate services, applications and infrastructure to provide efficient electronic delivery of government-to-government (G2G), government-to-citizen (G2C) and government-to-business (G2B) services.
Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
Indigo - Windows Communication Foundation (WCF) is Microsoft's programming model for using managed code to build unified Web services and other distributed systems that can talk to each other.
indirect competition - Indirect competition is between two vendors whose products or services are not the same but that could satisfy the same consumer need.
Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
inductance - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
inductive argument - An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion.
inductive charging - Inductive charging is a wireless charging method used for charging mid-sized items such as cell phones, MP3 players and PDAs.
inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
inductor - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
industrial and organizational psychology (I/O psychology) - Industrial and organizational (I/O) psychology is an area of study that applies psychological research, principles and practices to improve the functioning and experience of people in the workplace.
industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
Industrial Internet Consortium (IIC) - The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.
industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.
industrial strength - In information technology, industrial strength is a characteristic sometimes ascribed to a hardware or software product or a system to describe its ability to work capably and dependably in the operational world of business.
Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
Industry Standard Architecture - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
iNet - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
InfiniBand - InfiniBand is an architecture and specification for data flow between processors and I/O devices.
infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
infinite series - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
infinity - In general, infinity is the quality or state of endlessness or having no limits in terms of time, space, or other quantity.
inflection point - An inflection point, in a general sense, is a decisive moment in the course of some entity, event or situation; typically, an inflection point marks a significant change.
influencer (social influencer) - An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have.
influencer marketing - Influence marketing can be broken down into a few stages.
InfoCard - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
infomercial - On television, an infomercial is a short or regular-length television program that combines information presentation with an integrated suggestion to buy a particular product or service.
infonomics - Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it.
Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
information - Information is stimuli that has meaning in some context for its receiver.
Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
information and communications technologies - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
Information and Communications Technologies for Development - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
information and communications technology - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
Information and Content Exchange - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
information appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
information arbitrage - Information arbitrage is an instrument for creating opportunities in the marketplace by identifying trends ahead of others and acting on them.
information architecture - In technical writing, information architecture is the set of ideas about how all information in a given context should be treated philosophically and, in a general way, how it should be organized.
information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
Information Assurance Standard 6 - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
Information Awareness Office - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
Information Awareness Office (IAO) - Created in response to the terrorist attack of September 11, 2001, the Information Awareness Office (IAO) is a branch of the United States Defense Advanced Research Agency (DARPA) that aims to gather massive amounts of intelligence through electronic sources in order to help avert terrorist acts in the future.
information blocking - Information blocking occurs when a person or entity purposely and unreasonably interferes with the sharing or use of electronic health information.
Information Commissioner's Office - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
information design - Information design is the detailed planning of specific information that is to be provided to a particular audience to meet specific objectives.
Information Display System - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
information filtering - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
information life cycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
information life cycle management (ILM) - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
information lifecycle management - Information life cycle management (ILM) is a comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
Information Management System - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
information radiator - An information radiator, also known as a Big Visible Chart (BVC), is a large graphical representation kept plainly in sight within an agile development team’s shared workspace.
information rights management (IRM) - Information rights management (IRM) technologies help control, secure and manage content from unwanted access.
information security (infosec) - Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of information.
Information Security Breaches Survey - The Information Security Breaches Survey is an independent security research effort in the U.
information security management system - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
information service - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
information signature - To fight terrorism, the Information Awareness Office (IAO) of the U.
information silo - An information silo is a business division or group of employees within an organization that fails to communicate freely or effectively with other groups, including management.
Information Society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
information storage and retrieval system - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
information system - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
information technology - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
information technology (IT) - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
Information Technology Amendment Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
Information Technology Association of America - The ITAA (Information Technology Association of America) is a trade organization of corporations involved with all aspects of information technology.
information technology consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
Information Technology Information Sharing and Analysis Center - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
Information Technology Infrastructure Library - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
information theory - Information theory is a branch of mathematics that overlaps into communications engineering, biology, medical science, sociology, and psychology.
information war - According to the U.
information-centric security - Information-centric security is an approach to information security paradigm that emphasizes the security of the information itself rather than the security of networks, applications, or even simply data.
infosurfing - Infosurfing is using the Internet and World Wide Web so that you get maximum information in the shortest amount of time, which for many people means favoring textual content over images.
Infosys Technologies (Infosys Limited) - Infosys Technologies (now known as Infosys Limited) is a global IT consulting firm headquartered in Bangalore, India.
infotainment - Infotainment, combining information with entertainment, is a fairly recent neologism for a television program, Web site feature, or other presentation that combines information with entertainment.
infranet - The infranet is a proposed universal, public, packet-switched supplement to the Internet for businesses and high-demand private users that would provide guaranteed security, reliability, and quality of service (QoS).
Infranet Initiative - The Infranet Initiative is a collaborative effort to develop a high-performance universal public network that would serve as a supplement to the Internet for businesses and other high-demand users.
infrared - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
Infrared Data Association - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
infrared radiation - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
infrared radiation (IR) - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
infrared transmission - Infrared transmission refers to energy in the region of the electromagnetic radiation spectrum at wavelength s longer than those of visible light, but shorter than those of radio.
infrared wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
infrastructure (IT infrastructure) - Infrastructure is the foundation or framework that supports a system or organization.
Infrastructure as a Service - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
Infrastructure as a Service (IaaS) - Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.
infrastructure as code - Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.
infrastructure management - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
infrastructure management (IM) - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
Ingres - Ingres is a relational database management system (RDBMS) that evolved from a research project at the University of California at Berkeley in the 1970s.
ingress filtering - Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.
inherence factor - The inherence factor, in a security context, is a category of user authentication credentials consisting of elements that are integral to the individual in question, in the form of biometric data.
inherent risk - Inherent risk is a category of threat that describes potential losses or pitfalls that exist before internal security controls or mitigating factors are implemented.
inheritance - In object-oriented programming, inheritance is the concept that when a class of objects is defined, any subclass that is defined can inherit the definitions of one or more general classes.
INI - INI is a file name extension used in Microsoft Windows.
initial extent - The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.
initial program load - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
initial program load (IPL) - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
initialization - Initialization is the process of locating and using the defined values for variable data that is used by a computer program.
initialization vector - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
initialization vector (IV) - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
injectable ID chip - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
injection laser - A laser diode, also known as an injection laser or diode laser, is a semiconductor device that produces coherent radiation (in which the waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when current passes through it.
ink jet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
ink jet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
inkjet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
inkjet printers - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
Inline Frame - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
inline network device - An inline network device is one that receives packets and forwards them to their intended destination.
innovation culture - Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application.
innovation management - Innovation management is the process of managing an organization's innovation procedure, which helps increase competitive advantage and drives business growth.
innovation management software - Innovation management software, a subset of enterprise collaboration software, helps company digitally manage the generation, collection and evaluation and launch of new ideas from internal employees and external sources.
innovation manager - An innovation manager fosters the development of new products, services and processes.
innovation process management (IPM) - Innovation process management (IPM) a systematic approach to nurturing the creative capabilities of employees and creating a workplace environment that encourages new ideas for workflows, methodologies, services or products.
iNotes - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
iNotes (iNotes Web Access) - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
iNotes Web Access - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
input output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
input output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
input output operations per second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
input output supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
input/output - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
input/output fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
Input/Output Operations Per Second - IOPS measures the maximum number of reads and writes to non-contiguous storage.
Input/Output Supervisor - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
insect robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
insecure deserialization - Insecure deserialization is a vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.
insecure relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
insider threat - An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
insider trading - Insider trading is the buying and selling of securities based on information that has not been made available to the general public.
insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
inspection lots (SAP inspection lots) - An inspection lot within the SAP Quality Management module is a formal notification of the inspection of certain materials or goods at a plant.
Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
InstallAnywhere - InstallAnywhere is a program that can used by software developers to package a product written in Java so that it can be installed on any major operating system.
installation restore point - A restore point is a saved "snapshot" of a computer's data at a specific time.
Installfest - An Installfest is a special occasion when computer users get together to help each other install new programming, usually the Linux operating system and related programs, often together with experts and the resources to download programming from the Internet.
Installing Ubuntu/Linux OS to Hard Drive - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive.
Installing Ubuntu/Linux OS to Hard Drive - Part 1 - Instructional Screencast: Installing Ubuntu/Linux OS to Hard Drive - Part 1.
InstallShield - InstallShield is a product used by software developers to package software so that users can install it easily and safely.
instance - An instance, in object-oriented programming (OOP), is a specific realization of any object.
instant app (Google Android instant app) - A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.
instant message - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
instant messaging spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
Instant Messaging: Glossary - This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.
instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
instant spam - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
instant translation - Instant translation is the translation from one language to another of Web pages, e-mail, and online chat text by a computer program so that the translated results appear almost instantly.
instantiate - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template such as a class of objects or a computer process.
INSTEON protocol - INSTEON protocol is a communication language for home automation device control by Smartlabs.
Institute for Health Technology Transformation - Institute for Health Technology Transformation (iHT2) is an organization dedicated to fostering the use of technology within both the public and private sectors of the health care industry.
Institute of Electrical and Electronics Engineers - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
Institute of Electrical and Electronics Engineers Computer Society - IEEE-CS (Institute of Electrical and Electronics Engineers Computer Society) -- pronounced "EYE triple E- CA" -- is the IEEE society created to promote computer-related research and to disseminate technical information and standards to computing professionals around the world.
Institute of Electrical and Electronics Engineers Standards Association - IEEE-SA (Institute of Electrical and Electronics Engineers Standards Association) -- pronounced "EYE triple-E-SA" -- is the IEEE membership body concerned with standards and standardization issues.
Institute of Information Security Professionals - The IISP (Institute of Information Security Professionals) is a London-based professional membership association who describes its purpose as: "to set the standard for professionalism in information security, and to speak with an independent and authoritative voice on the subject.
instruction - An instruction is an order given to a computer processor by a computer program.
instruction set - An instruction set is a group of commands for a CPU in machine language.
insurance claims analysis - Insurance claims analysis is the inspection and judgment of merit in the requests for coverage of incidents in insurance customer claims.
int - "int" is one of the top-level domain names that can be used when choosing a domain name.
intangible asset - Intangible assets are those assets that are based off non-physical assets.
integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
integrated access management - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
integrated circuit - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip or microchip, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, and transistors are fabricated.
integrated circuit for encryption/decryption - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
Integrated Definition - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
integrated development environment - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
Integrated Digital Enhanced Network - iDEN (Integrated Digital Enhanced Network) is a wireless technology from Motorola combining the capabilities of a digital cellular telephone, two-way radio, alphanumeric pager and data/fax modem in a single network.
Integrated Drive Electronics - Integrated Drive Electronics (IDE) refers to the integration of the controller and drive.
integrated risk management (IRM) - Integrated risk management (IRM) is a set of coordinated business practices and supporting software tools that contribute to an organization's ability to understand and manage risk holistically across all departments and third-party dependencies.
integrated search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
Integrated Services Digital Network - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
integrated solar - Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later.
integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
integrated T-1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
integrated T1 - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
integrated T1 (channelized T1) - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
integrated threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.
integration - Integration is the act of bringing together smaller components into a single system that functions as one.
integration and testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
integration centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
integration server - An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.
integration testing - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
integration testing or integration and testing (I&T) - Integration testing, also known as integration and testing (I&T), is a software development process which program units are combined and tested as groups in multiple ways.
integration-centric BPM - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
integration-centric business process management suite - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
integrity check-value - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
Intel - Intel is the world’s largest manufacturer of PC microprocessors and the holder of the x86 processor architecture patent.
Intel 4004 - The Intel 4004 was one of the first microprocessors ever produced, released in 1971.
Intel 8008 - The Intel 8008, originally called the 1201, was one of the first microprocessors ever developed.
Intel 80286 - The Intel 80286 (often called simply the 286) was a 16-bit microprocessor chip introduced in 1982.
Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
Intel 80486 - Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor.
Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
Intel Atom - Atom is Intel's family of x86 and x86-64 processors that are optimized for small computing devices, such as smartphones and mobile Internet devices (MIDs).
Intel Bay Trail - Intel Bay Trail is the code name for a line of Atom processors manufactured by Intel Corp.
Intel Compute Card - Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices.
Intel Curie - Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE.
Intel Hub Architecture - Accelerated Hub Architecture (AHA) (also called Intel Hub Architecture) is an Intel 800-series chipset design that uses a dedicated bus to transfer data between the two main processor chips instead of using the Peripheral Component Interconnect (PCI) bus, which was used in previous chipset architectures.
Intel Quark - Intel Quark is an embedded system-on-a-chip (SoC) processor design intended for smaller mobile devices like wearable computers.
Intel Technology Provider - The Intel Technology Provider program is Intel Corp.
Intel VT - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
Intel Xeon D-2100 - The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.
intellectual capital - Intellectual capital is knowledge that can be exploited for some money-making or other useful purpose.
intellectual property - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
intellectual property (IP) - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
intellectual property core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
intelligence (intel) - According to the FBI, intelligence is both the information itself and the processes used to collect and analyze it.
intelligence community - The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.
intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
intelligent agent (AI) - An intelligent agent is an AI hardware and/or software system with some degree of autonomy and the capacity to make decisions and take actions.
intelligent character recognition - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
intelligent character recognition (ICR) - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
intelligent compression - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
intelligent content - Intelligent content is an adaptation of digital text, image, video, audio or multimedia data with coding added that allows it to be automatically processed.
intelligent database - An intelligent database is a full-text database that employs artficial intelligence (AI), interacting with users to ensure that returned items (hits) contain the most relevant information possible.
intelligent device - An intelligent device is any type of equipment, instrument, or machine that has its own computing capability.
intelligent electronic device (IED) - An intelligent electronic device (IED) is a device that is added to industrial control systems (ICS) to enable advanced power automation.
Intelligent Manufacturing Systems - IMS (Intelligent Manufacturing Systems) is the name of an international organization devoted to developing the next generation of manufacturing and processing technologies.
Intelligent Mobile Gateway - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
Intelligent Network - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
Intelligent Network (IN) - Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment.
intelligent peripheral interface - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
Intelligent Platform Management Interface (IPMI) - Intelligent Platform Management Interface (IPMI) is a specification for the equipment that monitors the physical environment and behavior of a server.
intelligent pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
intelligent power management - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
intelligent power management (IPM) - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
intelligent process automation (IPA) - Intelligent process automation (IPA) is a combination of technologies used to manage and automate digital processes.
intelligent switch - An intelligent switch is a high-level storage area network (SAN) routing switch that provides features such as storage virtualization, quality of service (QoS), remote mirroring, data sharing, protocol conversion, and advanced security.
intelligent system - An intelligent system is a machine with an embedded, Internet-connected computer that has the capacity to gather and analyze data and communicate with other systems.
intelligent transportation system (ITS) - Intelligent transportation system (ITS) is the application of sensing, analysis, control and communications technologies to ground transportation in order to improve safety, mobility and efficiency.
intelligent video - Intelligent video is digital video technology integrated with analytical software.
intelligent virtual agent - A virtual agent (sometimes called an intelligent virtual agent, virtual rep or chatbot) is a software program that uses scripted rules and, increasingly, artificial intelligence applications to provide automated service or guidance to humans.
intelligent workflow - Intelligent workflow is an orchestration method that integrates analytics, AI, machine learning and automation.
Intelligent workload management (IWM) - Intelligent workload management (IWM) is an approach to running IT systems in a way that rationally optimizes and maximizes use of computing resources and directing them toward better processing, workflow and delivery of services.
IntellJ IDEA - The free and open source IntellJ IDEA includes JUnit and TestNG, code inspections, code completion, support for multiple refactoring, Maven and Ant build tools, a visual GUI (graphical user interface) builder and a code editor for XML as well as Java.
intent-based networking (IBN) - Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
intentional programming - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
intentional programming (IP) - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
intentional software - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
Inter Asterisk Exchange Protocol - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
Inter IC bus - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
Inter-Asterisk Exchange Protocol - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
Inter-IC bus - The I2C (Inter-IC) bus is a bi-directional two-wire serial bus that provides a communication link between integrated circuits (ICs).
interaction diagram - A collaboration diagram, also known as a communication diagram, is an illustration of the relationships and interactions among software objects in the Unified Modeling Language (UML).
interaction management - Interaction management is a term some companies use to describe a class of Web services that support online relationships (called communities) and transactions between employees, customers, partners, and suppliers.
interactive agent - An IM bot is a chatterbot program that uses instant messaging (IM) as an application interface.
Interactive System Productivity Facility - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
interactive television - Interactive TV (ITV or iTV) is an approach to television advertising and programming that creates the opportunity for viewers to communicate with advertisers and programming executives by responding to a call to action.
interactive TV - Interactive TV (ITV or iTV) is an approach to television advertising and programming that creates the opportunity for viewers to communicate with advertisers and programming executives by responding to a call to action.
interactive TV (interactive television) - Interactive TV (ITV or iTV) is an approach to television advertising and programming that creates the opportunity for viewers to communicate with advertisers and programming executives by responding to a call to action.
interactive video - Interactive video (IV) is a multimedia recording that can take user input to perform some action.
Interactive Voice Response - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
Interactive Voice Response (IVR) - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
interactive whiteboard - An interactive whiteboard, also known as a smartboard, is an interactive display in the format of a whiteboard that reacts to user input either directly or through other devices.
interactivity - In computers, interactivity is the dialog that occurs between a human being (or possibly another live creature) and a computer program.
interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
interexchange carrier - An interexchange carrier (IXC) is a telephone company that provides connections between local exchanges in different geographic areas.
interexchange carrier (IXC) - An interexchange carrier (IXC) is a telephone company that provides connections between local exchanges in different geographic areas.
interface - As a noun, an interface is either:A user interface, consisting of the set of dials, knobs, operating system commands, graphical display formats, and other devices provided by a computer or a program to allow the user to communicate and use the computer or program.
interface definition language - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
interface device - An interface device (IDF) is a hardware component or system of components that allows a human being to interact with a computer or other communication device.
interface device (IDF) - An interface device (IDF) is a hardware component or system of components that allows a human being to interact with a computer or other communication device.
interim CIO (interim chief information officer) - An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.
Interior Gateway Protocol - An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).
Interior Gateway Routing Protocol - EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols.
interlace - An interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned alternately in two interwoven rasterized lines.
interlaced display - An interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned alternately in two interwoven rasterized lines.
interlaced GIF - An interlaced GIF (Graphics Interchange Format) is a GIF image that seems to arrive on your display like an image coming through a slowly-opening Venetian blind.
interlaced scan - Interlaced scanning is a display signal type in which one-half of the horizontal pixel rows are refreshed in one cycle and the other half in the next, meaning that two complete scans are required to display the screen image.
interlocking door controller - A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall.
intermediary - In general, an intermediary is a person or service that is involved as a third party between two or more end points in a communication or transaction.
intermediate distribution frame - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting the telecommunications cable between end user devices and a main distribution frame (MDF).
intermediate distribution frame (IDF) - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting the telecommunications cable between end user devices and a main distribution frame (MDF).
intermediate document - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
Intermediate System to Intermediate System protocol - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
Intermediate System-to-Intermediate System protocol - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
intermittent reinforcement - Intermittent reinforcement is the delivery of a reward at irregular intervals, a method that has been determined to yield the greatest effort from the subject.
internal audit (IA) - An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria.
internal cloud - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
internal cloud storage - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
internal control - An internal control is a business practice, policy or procedure that is established within an organization to create value or minimize risk.
internal marketing - Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization.
internal rate of return - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
internal rate of return (IRR) - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
International Accounting Standards Board - The International Accounting Standards Board is the independent standard-setting body of the IFRS Foundation.
International Business Machines - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
international callback - Callback, also known as international callback, is a system for avoiding regular phone company long-distance charges by having a call initiated from within the United States with the originating caller joining in a conference call.
International Classification of Diseases 10 - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
International Classification of Diseases 9 - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
International Data Encryption Algorithm - IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.
International Data Encryption Algorithm (IDEA) - IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.
International Electrotechnical Commission - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
International Electrotechnical Commission - On the Internet, "IEC" usually means the International Electrotechnical Commission.
International Electrotechnical Commission (IEC) - On the Internet, "IEC" usually means the International Electrotechnical Commission.
international financial reporting standards - International financial reporting standards (IFRS) are specific organizational and monetary standards and frameworks for financial reporting that have been adopted in 113 countries including India, Australia and the European Union.
International Financial Reporting Standards - IFRS (International Financial Reporting Standards) is a set of accounting standards developed by an independent, not-for profit organization called the International Accounting Standards Board (IASB).
international financial reporting standards (IFRS) - International financial reporting standards (IFRS) are specific organizational and monetary standards and frameworks for financial reporting that have been adopted in 113 countries including India, Australia and the European Union.
International Information Systems Security Certification Consortium (ISC)2 - The International Information Systems Security Certification Consortium -- (ISC)2 -- is a non-profit organization that provides security training and certificates.
International Institute of Business Analysis (IIBA) - International Institute of Business Analysis (IIBA) is a non-profit association that promotes and aids in the use of business analysis.
International Organization for Standardization - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
International Organization of Standardization standard 22301 - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
international private leased circuit - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
International Standard Book Number - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
International Standard Recording Code - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
International Standard Recording Code (ISRC) - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
international standardization organization - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
International Standards Organization - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
International System of Units - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
International System of Units (SI) - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
International Technical Support Organization - ITSO (International Technical Support Organization), a creation of IBM and its Lotus and Tivoli subsidiaries, provides information technology (IT) professionals and customers with technical information, assistance, guidance, and training.
International Telecommunication Union - The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world.
International Telecommunication Union (ITU) - The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world.
International Telecommunications - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
internationalisation - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
internationalization - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
internationalization (I18N) - Internationalization (sometimes shortened to "I18N, meaning "I - eighteen letters -N") is the process of planning and implementing products and services so that they can easily be adapted to specific local languages and cultures, a process called localization.
internesia - Internesia is an inability to remember which Web site or other Internet facility you saw an item of information on.
Internet - The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
Internet access provider - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
Internet Advertising Bureau - The IAB (Internet Advertising Bureau) is an organization that fosters the growth of advertising on the Internet.
Internet Advertising Bureau (IAB) - The IAB (Internet Advertising Bureau) is an organization that fosters the growth of advertising on the Internet.
Internet appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
Internet Architecture Board - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
Internet Assigned Numbers Authority - IANA (Internet Assigned Numbers Authority) is the organization under the Internet Architecture Board (IAB) of the Internet Society that, under a contract from the U.
Internet caller ID - Internet caller ID is an application that allows users to screen incoming telephone calls.
Internet commerce provider - An ICP (Internet commerce provider) is a company that sells software and services that enable a merchant with a Web site to build an online store on the merchant's own site or on the provider's site.
Internet Control Message Protocol - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
Internet Corporation for Assigned Names and Numbers - ICANN (Internet Corporation for Assigned Names and Numbers) is the private (non-government) non-profit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions, the services previously performed by the Internet Assigned Numbers Authority (IANA).
Internet Crime Complaint Center (IC3) - The Internet Crime Complaint Center (IC3) is a website and that offers users a standardized mechanism and interface to report suspected cybercrime or other illegal activity facilitated by the internet.
Internet definitions - This is a WhatIs.
Internet Engineering Task Force - The IETF (Internet Engineering Task Force) is the body that defines standard Internet operating protocols such as TCP/IP.
Internet Explorer - Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.
Internet Explorer (IE) - Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.
Internet Fibre Channel Protocol - iFCP (Internet Fibre Channel Protocol) is an emerging standard for extending Fibre Channel storage networks across the Internet.
Internet Group Management Protocol - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
Internet Group Management Protocol (IGMP) - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
internet history - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
Internet Information Server - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
Internet Inter ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
Internet Inter-ORB Protocol - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
Internet Key Exchange - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
Internet Key Exchange (IKE) - The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.
Internet mailer - A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
Internet map - An Internet map is any kind of map that attempts to portray all or some aspect of the Internet.
Internet maps - An Internet map is any kind of map that attempts to portray all or some aspect of the Internet.
internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
Internet Message Access Protocol - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
Internet metering - Internet metering is a service model in which an Internet service provider (ISP) tracks the customer's use of bandwidth and charges accordingly.
Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
Internet Network Information Center - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
internet of things (IoT) - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
Internet Open Trading Protocol - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
Internet presence provider - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
Internet presence provider and promoter - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
Internet Protocol Address - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
Internet Protocol Security - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
Internet Protocol telephony - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
Internet Protocol television - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.
Internet Protocol Version 6 - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
Internet Quizzes - We've gathered a collection of our quizzes on Internet-related topics.
Internet ratings - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.
Internet refrigerator - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
Internet refrigerator (Net fridge or Web-enabled refrigerator) - An Internet refrigerator (sometimes called a Net fridge) is a version of the familiar kitchen appliance with a built-in computer that can be connected to the Internet.
Internet Relay Chat - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
Internet Research Task Force - The IRTF is an activity of the of the Internet Society.
Internet Research Task Force (IRTF) - The IRTF is an activity of the of the Internet Society.
Internet Router in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
Internet Routing in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
Internet Routing in Space (IRIS) - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
Internet Routing Protocol in Space - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
Internet Security and Acceleration Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
Internet Server Application Program Interface - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
Internet service provider - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
internet shaming (online shaming) - Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization.
Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
Internet Small Computer System Interface - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
Internet Small Computer System Interface (iSCSI) adapter - An iSCSI adapter is a network interface card that enables the transmission of data between host computers and iSCSI-based storage arrays and typically handles the TCP/IP processing.
Internet Society - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
Internet Storm Center - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them.
Internet time - Internet time is the concept that events occur at a faster rate on the Internet than elsewhere or that, everywhere, the Internet is affecting the pace of change.
internet timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
Internet timeline - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.
Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
Internet Transaction Server - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
Internet Transaction Server (ITS) - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
Internet users' bill of rights - The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online.
Internet voting - E-voting is an election system that allows voters to record a secret ballot and have it tabulated electronically.
Internet.org - Internet.org is an initiative to make the Web affordable and accessible for people in developing and disadvantaged areas of the world.
Internet2 - Internet2 is a collaboration among more than 100 U.
Internetwork Packet Exchange - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
internetworking - Internetworking is a term used by Cisco, BBN, and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.
InterNIC - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
InterNIC (Internet Network Information Center) - Unitl recently, InterNIC (Internet Network Information Center), a cooperative activity between the U.
interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of different systems, devices, applications or products to connect and communicate in a coordinated way, without effort from the end user.
interpreted - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
interpreted (script) - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
interprocess communication - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
interprocess communication (IPC) - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
interrupt - An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.
interrupt latency - Interrupt latency, also called interrupt response time, is the length of time that it takes for a computer interrupt to be acted on after it has been generated.
interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
interrupt request - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
interruption science - Interruption science is the study of how disruptions from current tasks affect employees on the job.
intersection symbol - The intersection symbol denotes the intersection of two sets.
interstitial - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
interstitial (in between) - An interstitial (something "in between") is a page that is inserted in the normal flow of editorial content structure on a Web site for the purpose of advertising or promotion.
Intertainment - Intertainment is the name of an e-business initiative that encourages shopping malls and other public places to provide visitors with free high-speed Internet access.
intrabody signaling - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
intrapreneur (intrapreneurship) - Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.
intrusion - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
intrusion detection - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
intrusion detection system - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a network security and threat prevention tool.
inventory management - Inventory management is the supervision of noncapitalized assets -- or inventory -- and stock items.
inventory optimization - Inventory optimization (IO) is a strategy for balancing the amount of working capital that's tied up in inventory with service-level goals across multiple stock-keeping units (SKUs).
inventory turns - Inventory turns are a popular measurement used in inventory management to assess operational and supply chain efficiency.
inverse mapping - Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.
inverse mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
inverse multiplexing - Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels (such as a T-1 or E-1 lines) and are then reconstructed at the other end back into the original data stream.
inverse multiplexing over ATM - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
inverse multiplexing over ATM (IMA) - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.
invisible Internet - Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records and other content that is accessible over the Internet but is not crawled and indexed by search engines.
invitation to tender (ITT) - An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.
invocation ID - An invocation ID is an ID number that identifies databases within Active Directory and changes as AD is in a restore process.
invoice - An invoice is a document listing billed goods and/or services that a provider presents to a customer.
IO - I/O (input/output), pronounced "eye-oh," describes any operation, program, or device that transfers data to or from a computer.
io fencing - I/O (input/output) fencing is the isolation of a malfunctioning node from a cluster's shared storage to protect the integrity of data.
IO virtualization - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
IO.SYS - In the Windows 95 operating system, IO.
Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
IoMT (Internet of Medical Things) or healthcare IoT - The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.
ion - An ion is an atom or group of atoms in which the number of electrons is different from the number of proton s.
ion pump - An ion pump is a device that can cool, clean and filter air without the use of conventional fans or other moving parts.
ionizing radiation - Ionizing radiation, also (imprecisely) called radioactivity, is electromagnetic (EM) radiation whose waves contain energy sufficient to overcome the binding energy of electrons in atoms or molecule s, thus creating ion s.
IOPS - IOPS measures the maximum number of reads and writes to non-contiguous storage.
IOPS (input/output operations per second) - IOPS measures the maximum number of reads and writes to non-contiguous storage.
IOS - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
IOS (Input/Output Supervisor) - IOS (Input/Output Supervisor) is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output device drivers.
iOS 7 - iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch.
iOS 8 - IOS 8 is the eighth version of Apple’s mobile operating system.
iOS developer kit - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.
iOS Developer Program - The iOS Developer Program is a fee-based subscription that allows program members to publish approved apps to the Apple app store.
IoT analytics (Internet of Things analytics) - IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet of Things devices.
IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
IoT devices (internet of things devices) - IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
IoT gateway - An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
IoT OS (Internet of Things operating system) - An IoT OS is an operating system that is designed to perform within the constraints that are particular to Internet of Things devices, including restrictions on memory, size, power and processing capacity.
IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
IOTA - IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy.
IOTP - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
IOV - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
IP - Intentional programming (IP), also called intentional software, is the rendering of application intentions in a form that can be processed by a computer.
IP - Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.
IP - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
IP address - This definition is based on Internet Protocol Version 4.
IP address (Internet Protocol Address) - This definition is based on Internet Protocol Version 4.
IP address forgery - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
IP address management (IPAM) - Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network's Internet Protocol address (IP address) space.
IP addressing - 32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system).
IP camera - An IP camera is a networked digital video camera that transmits data over a Fast Ethernet link.
IP core - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
IP core (intellectual property core) - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
IP Multimedia Subsystem - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
IP Multimedia Subsystem (IMS) - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
IP PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
IP SAN - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
IP SLA (Cisco) - IP SLA (Internet protocol service level agreement) is a feature of the Cisco IOS (Internetwork Operating System) that allows an IT professional to collect information about network performance in real time.
IP Spoofing - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
IP spoofing - IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.
IP storage - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
IP storage area network - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
IP tables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
IP telephony - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
IP-PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
IP/PBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
iPaaS (integration platform as a service) - Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments.
iPad - The iPad is a touchscreen tablet PC made by Apple.
iPad 2 - The iPad 2 is a 9.
iPad Air - Apple’s iPad Air is an iOS tablet that is lighter and thinner than the company’s previous tablets.
IPC - Interprocess communication (IPC) is a set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system.
iPhone - IPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
IPI - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
IPI (Intelligent Peripheral Interface) - IPI (Intelligent Peripheral Interface) is a high-bandwidth interface between a computer and a hard disk or a tape device.
IPL - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
iPlanet - iPlanet is Sun Microsystem's solution for a Web server and related programs intended to allow an enterprise to take advantage of the Internet.
IPLC - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
IPLC (international private leased circuit) - An IPLC (international private leased circuit) is a point-to-point private line used by an organization to communicate between offices that are geographically dispersed throughout the world.
IPM - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
IPng - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
IPO - .
IPO (initial public offering) - .
iPod - The iPod is a combination portable digital media player and hard drive from Apple Computer.
IPP - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
IPP (Internet presence provider) - An Internet presence provider (IPP) is a company that provides the disk space, high-speed Internet connection, and possibly the Web site design and other services for companies, organizations, or individuals to have a visible presence (meaning Web site) on the Internet.
IPPBX - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
IPPP - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
IPPP (Internet presence provider and promoter) - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
IPS - An intrusion prevention system (IPS) is a network security and threat prevention tool.
IPsec - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
IPsec (Internet Protocol Security) - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
iptables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
IPTV - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.
IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.
IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
IPv6 - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
IPX - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
IR - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).
IR LED (infrared light-emitting diode) - An IR LED (infrared light emitting diode) is a solid state lighting (SSL) device that emits light in the infrared range of the electromagnetic radiation spectrum.
IR wireless - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
IR wireless (infrared wireless) - IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation.
IRC - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
IrDA - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
IrDA (Infrared Data Association) - 5IrDA (Infrared Data Association) is an industry-sponsored organization set up in 1993 to create international standards for the hardware and software used in infrared communication links.
Iris - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
iris recognition - Iris recognition is a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye.
IRIX - IRIX is a UNIX -based operating system from SGI that is optimized for applications that use 3-D visualization and virtual reality environments.
IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
Iron Python - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
IronPython - IronPython is an altered version of the Python programming language that runs on top of Microsoft's .
IRQ - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
IRR - Internal rate of return (IRR), also called the dollar-weighted rate of return or yield on project, is the interest rate that will bring a series of positive and/or negative cash flows to a net present value (NPV) of zero.
irrational number - An irrational number is a real number that cannot be reduced to any ratio between an integer p and a natural number q.
IRTF - The IRTF is an activity of the of the Internet Society.
IRU - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
IS - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
IS (information system or information services) - An information system (IS) is the collection of technical and human resources that provide the storage, computing, distribution, and communication for the information required by all or some part of an enterprise.
IS IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
IS-IS - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
IS-IS (Intermediate System-to-Intermediate System protocol) - One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known as intermediate systems exchange data about routing using a single metric to determine the network topology.
ISA - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
ISA Server (Internet Security and Acceleration Server) - Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.
ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
ISAE 3402 - ISAE (International Standards for Assurance Engagements) 3402 is a global assurance standard for reporting on controls at service organizations.
ISAM - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that allows records to be accessed either sequentially (in the order they were entered) or randomly (with an index).
ISAPI - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
ISAPI (Internet Server Application Program Interface) - ISAPI (Internet Server Application Program Interface) is a set of Windows program calls that let you write a Web server application that will run faster than a common gateway interface (CGI) application.
ISBN - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
ISBN (International Standard Book Number) - The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.
ISBS - The Information Security Breaches Survey is an independent security research effort in the U.
iSCSI - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
iSCSI Target Server - ISCSI Target Server is a server that lets administrators boot multiple computers to a network from a single operating system image in a central location.
ISDN - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
ISDN (Integrated Services Digital Network) - ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.
ISE - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
iSeries - iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises.
iSeries - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
iSeries Cheat Sheets - A collection of cheat sheets for iSeries (AS/400).
iSeries Quizzes - We've gathered a collection of our iSeries quizzes.
island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
ISMS - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO) for organizations.
ISO 20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
ISO 22301 - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
ISO 22317 (International Standards Organization 22317) - ISO 22317 is the first formal standard to address the business impact analysis process.
ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a specification for an information security management system (ISMS).
ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
ISO 9000 - (For the business server line from Hewlett-Packard, see HP 9000.
ISO 9660 - An ISO 9660 file system is a standard CD-ROM file system that allows you to read the same CD-ROM whether you're on a PC, Mac, or other major computer platform.
ISO date format - The International Organization for Standardization (ISO) date format is a standard way to express a numeric calendar date that eliminates ambiguity.
ISO IEC - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
ISO/IEC 15504 - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
ISO/IEC 17799: Code of Practice for Information Security Management - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
ISO/IEC 24734 - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
ISO/IEC 24734 (International Standards Organization/International Electrotechnical Commission) - International Standards Organization/International Electrotechnical Commission (ISO/IEC) 24734 is a standardized methodology for measuring the productivity of digital printers.
ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
ISO17799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
ISO20000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
ISOC - The Internet Society is an international non-profit organization that acts as a guide and conscience for the workings of the Internet.
isochronous - In information technology, isochronous (from the Greek "equal" and "time"; pronounced "eye-SAH-krun-us") pertains to processes that require timing coordination to be successful, such as voice and digital video transmission.
isolation - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
isotope - An isotope is a form of a chemical element whose atomic nucleus contains a specific number of neutron s, in addition to the number of protons that uniquely defines the element.
isotropic radiator - An isotropic radiator is a transducer that produces useful electromagnetic field output in all directions with equal intensity, and at 100-percent efficiency, in three-dimensional space.
ISP - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
ISP (Internet service provider) - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
ISPF - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
ISPF (Interactive System Productivity Facility) - ISPF (Interactive System Productivity Facility) is the user interface and supporting programs that come with IBM's OS/390 operating system and that allow a company to configure and manage its system, add new system or application programs and test them.
ISPs - An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting.
ISR G2 - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
ISRC - The International Standard Recording Code (ISRC) is an international code used to identify sound and audio-visual recordings on compact discs (CDs), music videos, and other media, primarily to ensure royalty payments.
ISRS - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
ISRS (information storage and retrieval system) - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
ISSA (Information Systems Security Association) - The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.
ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
issue tracking system - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
issue tracking system (ITS) - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
ISV - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
IT - Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
IT Act 2008 - The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA-2000).
IT aftermarket - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
IT aftermarket (tech secondary market) - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.
IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
IT asset disposition (ITAD) - IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.
IT asset lifecycle - The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership.
IT asset management (ITAM) - IT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.
IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
IT blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
IT blueprint - An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.
IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
IT centralization (information technology centralization) - IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.
IT chargeback / showback - IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
IT consumerization - IT consumerization is the blending of personal and business use of technology devices and applications.
IT continuity (information technology continuity) - IT continuity (information technology continuity) is the holistic management of technology systems toward the guarantee that essential business operations will proceed in the event of a major disruption.
IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
IT cost structure - IT cost structure is the relationship of different types of costs within a larger IT budget.
IT director (information technology director) - An IT director (information technology director) is an employee in charge of technology within an organization.
IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
IT elasticity - IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.
IT financial management - IT financial management is the oversight of expenditures required to deliver IT products and services.
IT Governance Institute (ITGI) - The IT Governance Institute (ITGI) is an arm of ISACA that provides research, publications and resources on IT governance and related topics.
IT incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
IT incident report - An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
IT Infrastructure Library - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
IT ISAC - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
IT leadership (information technology leadership) - IT leadership (information technology leadership) refers to the senior management in an organization responsible for driving business strategy via IT infrastructure and applications.
IT management - IT management is the process of overseeing all matters related to information technology operations and resources within an IT organization.
IT monitoring - IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.
IT MOOSE management - IT MOOSEmanagement is a term invented by Forrester Research for talking about the non-discretionary expenses that are required to keep an IT department running.
IT MOOSE management (maintain and operate the organization, systems and equipment) - IT MOOSEmanagement is a term invented by Forrester Research for talking about the non-discretionary expenses that are required to keep an IT department running.
IT Olympics - The IT Olympics (less formally known as the "Geek Games") is a parody Web site set up as the computer world's version of the Olympic contests.
IT Olympics (Geek Games) - The IT Olympics (less formally known as the "Geek Games") is a parody Web site set up as the computer world's version of the Olympic contests.
IT operations - IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.
IT operations analytics (ITOA) - IT operations analytics (ITOA) is the practice of monitoring systems and gathering, processing and interpreting data from various operations sources to guide decisions and predict potential issues.
IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
IT organization (information technology organization) - An IT organization (information technology organization) is the department within an organization charged with establishing, monitoring and maintaining information technology systems and services, and with strategic planning around current and future IT initiatives.
IT outsourcing strategy - An IT outsourcing strategy is a plan derived from assessing which IT functions are better performed by an IT outsourcing service provider than by an organization's internal IT department.
IT performance management (information technology performance management) - IT performance management includes purchasing decisions, the standardization of IT equipment and guidance on capital and human resources.
IT prioritization - IT prioritization is the process of initiating IT projects and procedures based on both the immediate and long-term needs of an organization.
IT process automation - IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.
IT procurement - IT procurement is the series of activities and procedures necessary to acquire information technology products or services.
IT procurement contract - An IT procurement contract is a document detailing the legally-binding agreement between a provider of IT products and services and the purchaser.
IT procurement software - IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.
IT productivity - IT productivity is a reference to the relationship between an organization's technology investments and its corresponding efficiency gains, or return on investment.
IT project management - Every IT project should begin with two questions: What business problem are we trying to solve? And does everyone agree it's worth the effort to solve it?.
IT project manager - An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.
IT reseller - An IT reseller is an intermediary entity in the distribution channel that purchases software and/or hardware from the manufacturer or some other entity, such as a wholesaler or a distributor, and sells it to consumers.
IT service catalog - An IT service catalog is a list of technology resources and offerings available from the IT service provider within an organization.
IT service delivery - IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.
IT Service Management - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
IT showback - An IT showback system tracks the data center utilization rates of an organization’s business units or end users.
IT skills gap (information technology skills gap) - In human resource management, an information technology (IT) skills gap is a mismatch between the capabilities an employer needs to meet business objectives and what the organization's employees know and can do.
IT solution - An information technology (IT) solution is a set of related software programs and/or services that are sold as a single package.
IT strategic plan (information technology strategic plan) - An IT strategic plan outlines a company's technology-enabled business management processes that it uses to guide operations and prioritize business goals.
IT strategist (information technology strategist) - An IT strategist (information technology strategist) is someone in an organization who is given the responsibility and authority to establish initiatives that affect the organization's IT and business strategy.
IT strategy (information technology strategy) - IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.
IT Survival Kit: Networking refreshers - Quick Network Security & Hardware Refreshers School is out for college students across the US, but the learning never stops for IT professionals.
IT systems management - Systems management is the administration of the information technology systems in an enterprise data center.
IT transformation - IT transformation is a complete reassessment and overhaul of an organization's information technology (IT) systems in order to improve the efficiency and delivery in a digital economy.
IT-ISAC - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
IT-ISAC (Information Technology Information Sharing and Analysis Center) - IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for security-related information.
IT/OT convergence - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
IT4IT - IT4IT is a reference architecture for information technology (IT) management.
IT4IT Foundation certification - IT4IT Foundation is a certification for the IT4IT reference architecture.
ITAA - The ITAA (Information Technology Association of America) is a trade organization of corporations involved with all aspects of information technology.
ITAA (Information Technology Association of America) - The ITAA (Information Technology Association of America) is a trade organization of corporations involved with all aspects of information technology.
Itanium - Itanium is Intel's first microprocessor that is based on the 64-bit architecture known as IA-64.
ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important United States export control laws that affect the manufacturing, sales and distribution of technology.
ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
item-level RFID (item-level radio frequency identification) - Item-level RFID involves individual unit tagging, as opposed to tagging cartons or pallets of items.
iteration - In agile software development, an iteration is a single development cycle, usually measured as one week or two weeks.
iterative - Iterative (prounounced IT-ter-a-teev) is an adjective that means repetitious.
iterative development - Iterative development is a way of breaking down the software development of a large application into smaller chunks.
iterative DNS query - An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.
ITIL - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
ITIL (Information Technology Infrastructure Library) - The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.
ITIL v3 - ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).
ITS - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
ITS - An issue tracking system (ITS) is a software application that allows an enterprise to record and follow the progress of every problem or "issue" that a computer system user identifies until the problem is resolved.
ITSM - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
ITSM (IT Service Management) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
ITSO - ITSO (International Technical Support Organization), a creation of IBM and its Lotus and Tivoli subsidiaries, provides information technology (IT) professionals and customers with technical information, assistance, guidance, and training.
ITSO (International Technical Support Organization) - ITSO (International Technical Support Organization), a creation of IBM and its Lotus and Tivoli subsidiaries, provides information technology (IT) professionals and customers with technical information, assistance, guidance, and training.
ITU - The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world.
ITU T - The ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union) is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
ITU X.225 (ISO 8327) - ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.
ITU-T - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
ITU-T - The ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union) is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
ITU-T (Telecommunication Standardization Sector of the International Telecommunications Union) - The ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union) is the primary international body for fostering cooperative standards for telecommunications equipment and systems.
iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
ITV - Interactive TV (ITV or iTV) is an approach to television advertising and programming that creates the opportunity for viewers to communicate with advertisers and programming executives by responding to a call to action.
IV - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
Ivanti - Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.
IVR - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
IVRS - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
Ivy Bridge - Ivy Bridge is the code name for Intel's third generation of Core processors.
IWSR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
IXC - An interexchange carrier (IXC) is a telephone company that provides connections between local exchanges in different geographic areas.