Browse Definitions :

Browse Definitions by Alphabet

I/O - IND

  • I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IANA (Internet Assigned Numbers Authority) - IANA (Internet Assigned Numbers Authority) is the organization that oversees the allocation of IP addresses to internet service providers (ISPs).
  • IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IAX (Inter-Asterisk Exchange Protocol) - IAX (Inter-Asterisk Exchange Protocol, pronounced "eeks") is a communications protocol for setting up interactive user sessions.
  • IBM - IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.
  • IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
  • IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IBM SoftLayer - IBM SoftLayer is a public cloud computing platform that offers a range of services for compute, networking, storage, security and application development.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • IBM TSM (IBM Tivoli Storage Manager) - IBM Tivoli Storage Manager (IBM TSM) is an enterprise class backup and archiving application.
  • IBM Watson supercomputer - Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a 'question answering' machine.
  • icacls - icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows Server 2003 SP2, Windows Server 2008, Windows Vista and Windows 7.
  • ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
  • ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
  • ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  • icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
  • ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
  • ICT (information and communications technology, or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
  • ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is an initiative aimed at bridging the digital divide (the disparity between technological "have" and "have not" geographic locations or demographic groups) and aiding economic development by ensuring equitable access to up-to-date communications technologies.
  • IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
  • ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • identity as a Service (IDaaS) - Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • identity governance - Identity governance is the policy-based centralized orchestration of user identity management and access control.
  • identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
  • identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
  • identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
  • IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • idoru - An idoru is a virtual (computer-created) media star.
  • IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
  • IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
  • IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
  • IEEE 1394 - IEEE 1394, High Performance Serial Bus, is an electronics standard for connecting devices to your personal computer.
  • IEEE 802 wireless standards - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
  • IEEE 802.3 - 802.3, or IEEE 802.
  • IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • IHRIM (International Association for Human Resource Information Management) - IHRIM (International Association for Human Resource Information Management) is a networking and education association for HRIS and HR technology professionals.
  • IIOP (Internet Inter-ORB Protocol) - IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet.
  • ILEC (incumbent local exchange carrier) - An ILEC (incumbent local exchange carrier) is a telephone company in the U.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
  • image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
  • image map - In Web page development, an image map is a graphic image defined so that a user can click on different areas of the image and be linked to different destinations.
  • image metadata - Image metadata is information about an image that is associated with the image file either automatically or deliberately added.
  • image of the early universe - An image of the early universe, showing irregularities in its brightness 380,000 years after its birth, has been produced by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • image-based backup - Image-based backup is a backup process for a computer or virtual machine (VM) that creates a copy of the operating system and all the data associated with it, including the system state, and application configurations and saves it as a single file.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • imaginary number - An imaginary number is a quantity of the form ix, where x is a real number and i is the positive square root of -1.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
  • IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
  • IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
  • immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-band signaling - In the public switched telephone network, (PSTN), in-band signaling is the exchange of signaling (call control) information on the same channel that the telephone call itself is using.
  • in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • in-memory database management system (IMDBMS) - An in-memory database management system (IMDBMS) stores, manages and provides access to data from main memory.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created Internet content, thereby having potential customers come to the company rather than marketers vying for their attention.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
  • incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
  • Incompleteness Theorem - The Incompleteness Theorem is a pair of logical proofs that revolutionized mathematics.
  • increment - An increment is a small, unspecified, nonzero change in the value of a quantity.
  • Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
  • incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
  • incubator - In the business world, an incubator is an enterprise that is set up to provide office space, equipment, and sometimes mentoring assistance and capital to new businesses that are just getting started.
  • Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
  • indemnification - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • indempotency - Based on our inferences about the only three uses of this term that we have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee, from Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no matter how much it is used or accessed by another thing or action.
  • Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
  • Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close