Browse Definitions :

Browse Definitions by Alphabet

I/O - INF

  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization that oversees the allocation of IP addresses to internet service providers (ISPs).
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
  • IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
  • icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
  • ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
  • ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • identity as a Service (IDaaS) - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • identity governance - Identity governance is the policy-based centralized orchestration of user identity management and access control.
  • identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
  • identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
  • identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
  • identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
  • IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
  • IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
  • IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • IEEE 1394 - IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.
  • IEEE 802 wireless standards - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
  • IEEE 802.3 - 802.3, or IEEE 802.
  • IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • IIOP (Internet Inter-ORB Protocol) - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • ILEC (incumbent local exchange carrier) - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • image metadata - Image metadata is information about an image that is associated with the image file either automatically or deliberately added.
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • image-based backup - Image-based backup creates a copy of an operating system and all the data associated with it, including the system state and application configurations.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
  • inductive argument - An inductive argument is an assertion that uses specific premises or observations to make a broader generalization.
  • inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
  • inductor - An inductor is a passive electronic component that storesenergy in the form of a magnetic field.
  • industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
  • industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
  • industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
  • industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
  • Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
  • inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed and/or direction).
  • InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
  • infinite loop (endless loop) - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • Infinite Monkey Theorem - The Infinite Monkey Theorem is a proposition that an unlimited number of monkeys, given typewriters and sufficient time, will eventually produce a particular text, such as Hamlet or even the complete works of Shakespeare.
  • infinite sequence - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
  • Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • Information Age - The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
  • Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
SearchNetworking
  • routing table

    A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an ...

  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

SearchSecurity
  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close