Browse Definitions by Alphabet
- I/O (input/output) - I/O (input/output), pronounced "eye-oh," describes any operation, program or device that transfers data to or from a computer.
- IBM (International Business Machines Corporation) - IBM (International Business Machines Corporation) is a multinational technology company headquartered in Armonk, N.
- IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
- IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
- IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
- IBM Roadrunner - Roadrunner was a supercomputer developed by IBM at the Los Alamos National Laboratory in New Mexico.
- IBM Watson supercomputer - Watson was a supercomputer designed and developed by IBM.
- ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
- ICD-10 (International Classification of Diseases, 10th Revision) - The International Classification of Diseases, 10th Revision (ICD-10), is a global standard for classifying and coding mortality and morbidity data.
- ICD-10-CM (Clinical Modification) - The ICD-10-CM (International Classification of Diseases, 10th Revision, Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures related to inpatient and outpatient medical care in the United States.
- ICD-10-PCS (International Classification of Diseases, 10th Revision, Procedure Coding System) - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is an American adaptation of the World Health Organization's ICD-10 system, tailored for procedural coding in inpatient and hospital settings.
- iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
- icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
- ICT (information and communications technology or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
- ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is a decentralized movement dedicated to making access to digital technologies more equitable, with the goals of bridging the digital divide and advancing global economic development.
- IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
- identity management (ID management) - Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.
- identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
- identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
- identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
- IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
- IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
- IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
- IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
- IEEE 802 wireless standards - IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless.
- IEEE 802.3 - 802.3, or IEEE 802.
- ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
- image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
- image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
- image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in digital images.
- image-based backup - Image-based backup creates a copy of an operating system and all the data associated with it, including the system state and application configurations.
- IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
- IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
- immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
- immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they can suspend disbelief and fully engage with the created environment.
- immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
- impact mapping - Impact mapping is a visual planning technique that aligns project processes with business objectives.
- imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
- implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
- implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
- implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
- improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
- in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
- in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
- in-memory analytics - In-memory analytics is an approach to querying data residing in a computer's random access memory (RAM) as opposed to querying data stored on physical drives.
- in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
- inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created internet content, thereby having potential customers come to the organization rather than marketers vying for their attention.
- Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
- incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
- incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
- incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
- incremental backup - An incremental backup is a backup type that only copies data that has been changed or created since the previous backup activity was conducted.
- incumbent local exchange carrier (ILEC) - An incumbent local exchange carrier (ILEC) is a type of U.
- Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
- indicators of compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
- Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
- inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
- inductor - An inductor is a passive electronic component that temporarily stores energy in a magnetic field when electric current flows through the inductor's coil.
- industrial control system (ICS) - In industrial settings, industrial control system (ICS) is a term used to describe the integration of hardware and software with network connectivity to support production processes in manufacturing or critical infrastructure.
- industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
- industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.
- Industry 4.0 - Industry 4.0 refers to the fourth industrial revolution and the cyber-physical transformation of manufacturing.
- InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
- infinite loop (endless loop) - An infinite loop -- sometimes called an endless loop -- is a piece of code that lacks a functional exit so that it repeats indefinitely.
- infographic - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
- infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
- information - Information is the output that results from analyzing, contextualizing, structuring, interpreting or in other ways processing data.
- Information Age - The Information Age is the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
- Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
- information asset - An information asset is a collection of knowledge or data that is organized, managed and valuable.
- information assurance (IA) - Information assurance (IA) is the practice of protecting physical and digital information and the systems that support the information.
- information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
- information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
- information lifecycle management (ILM) - Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, starting with its creation and acquisition through when it becomes obsolete and is deleted.
- information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
- information security (infosec) - Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information.
- information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
- information society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
- information technology (IT) - Information technology (IT) is the use of computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- information technology (IT) director - An information technology (IT) director is the person in charge of technology within an organization.
- Information Technology Amendment Act 2008 (IT Act 2008) - The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act 2000.
- infrared radiation (IR) - Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nm to 1 mm.
- infrastructure as code (IaC) - Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.
- ingress filtering - Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network.
- initial program load (IPL) - IPL (initial program load) is a mainframe term for the loading of the operating system into the computer's main memory.
- initial public offering (IPO) - An initial public offering (IPO) is the event when a privately held organization initially offers stock shares in the company on a public stock exchange.
- initialization vector - An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.
- injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
- inkjet printer - An inkjet printer is a computer peripheral that produces hard copies of a text document or photo by spraying droplets of ink onto paper.
- inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
- inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
- innovation culture - Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.
- innovation management - Innovation management involves the process of managing an organization's innovation procedure, starting at the initial stage of ideation, to its final stage of successful implementation.
- innovation manager - An innovation manager is an employee whose responsibilities focus on the development of new products, services or processes.
- input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
- insecure deserialization - Insecure deserialization is a vulnerability in which untrusted or unknown data is used to inflict a denial-of-service attack, execute code, bypass authentication or otherwise abuse the logic behind an application.
- insider threat - An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
- insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
- Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
- Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.