Browse Definitions :

Browse Definitions by Alphabet

I.L - IN-

  • i.LINK - i.LINK is the Sony Corporation implementation of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IAB (Internet Architecture Board) - The IAB (Internet Architecture Board) is the Internet Society overseer of the technical evolution of the Internet.
  • IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization that oversees the allocation of IP addresses to internet service providers (ISPs).
  • IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM Cloud Functions - IBM Cloud Functions is the company’s software underlying cloud applications to provide granular access control to cloud resources.
  • IBM Daksh (IBM Global Process Services) - IBM Daksh, also known as IBM Global Process Services, is a business process outsourcing (BPO) firm that was formerly known as Daksh eServices.
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM i - IBM i is an operating system (OS) created to run on IBM’s Power Systems and Pure Systems for minicomputers and enterprise servers.
  • IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
  • IBM MobileFirst - IBM MobileFirst is a group of products designed to simplify and accelerate mobile adoption by offering mobile application development and management in a single package.
  • IBM MobileFirst Platform Foundation (formerly IBM Worklight) - IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.
  • IBM OpenPages - IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives.
  • IBM PartnerWorld - IBM PartnerWorld is a program run by IBM that outlines how the company works with IBM Business Partners such as VARs, systems integrators, managed service providers, consultants and independent software vendors.
  • IBM Power9 Server - IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IBM SmartCloud - IBM SmartCloud is a line of enterprise-class cloud computing technologies and services for building and using private, public and hybrid clouds.
  • IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
  • IBM Watson Assistant - IBM Watson Assistant is a white label cloud service that allows enterprise-level software developers to embed a virtual assistant (VA) in the software they are developing and brand the VA as their own.
  • IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
  • IC-BPMS (integration-centric business process management suite) - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
  • ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
  • ICD-11 - The International Classification of Disease, Eleventh Revision (ICD-11) is a system of medical coding created by the World Health Organization (WHO) for documenting diseases, signs and symptoms, diagnoses and social circumstances.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • Ice Lake - Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • ICM file (Image Color Matching file) - In Windows 95 and possibly other operating systems, an ICM (Image Color Matching) file contains a color system profile for a particular application or device such as a color printer or scanner.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • icon - In a computer's graphical user interface (GUI), an icon (pronounced EYE-kahn) is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user.
  • ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • identity as a Service (IDaaS) - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • identity governance - Identity governance is the policy-based centralized orchestration of user identity management and access control.
  • identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
  • identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
  • identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
  • IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
  • IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • IEEE 1394 - IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.
  • IEEE 802 wireless standards - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
  • IEEE 802.3 - 802.3, or IEEE 802.
  • IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • IHRIM (International Association for Human Resource Information Management) - IHRIM (International Association for Human Resource Information Management) is a networking and education association for HRIS and HR technology professionals.
  • IIOP (Internet Inter-ORB Protocol) - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • ILEC (incumbent local exchange carrier) - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • iMac - The iMac is a low-cost version of Apple Computer's Macintosh.
  • image - An image is a picture that has been created or copied and stored in electronic form.
  • image compression - Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level.
  • image content search - Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query.
  • image map - In Web page development, an image map is a graphic image defined so that a user can click on different areas of the image and be linked to different destinations.
  • image metadata - Image metadata is information about an image that is associated with the image file either automatically or deliberately added.
  • image of the early universe - An image of the early universe, showing irregularities in its brightness 380,000 years after its birth, has been produced by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • image replay attack - An image replay attack is the use of a picture to fool an authentication method.
  • image stitching - Image stitching is the combination of images with overlapping sections to create a single panoramic or high-resolution image.
  • image-based backup - Image-based backup is a backup process for a computer or virtual machine (VM) that creates a copy of the operating system and all the data associated with it, including the system state, and application configurations and saves it as a single file.
  • imagesetter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • imaging - Imaging is the capture, storage, manipulation, and display of images.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
  • immersive fitness - Immersive fitness is technology enhanced exercise typically including simulated audio/visual experiences and performance metrics.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immersive web - The immersive web is a version of the online world that incorporates advanced technologies to enhance user engagement and blur the line between the user's physical reality and the digital environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impact sourcing - Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.
  • impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution of any idea, model, or method; in IT, it refers to the process of setting up new software or hardware after a purchase is made.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • impression - In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
SearchNetworking
SearchSecurity
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

  • SYN flood attack

    A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.

SearchCIO
  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

  • business transformation

    Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close