Browse Definitions :

Browse Definitions by Alphabet

  • initialization vector - An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.
  • injectable ID chip (biochip transponder) - An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copies of a text document or photo by spraying droplets of ink onto paper.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
  • innovation culture - Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application.
  • innovation management - Innovation management involves the process of managing an organization's innovation procedure, starting at the initial stage of ideation, to its final stage of successful implementation.
  • innovation manager - An innovation manager is an employee whose responsibilities focus on the development of new products, services or processes.
  • input validation attack - An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field.
  • insecure deserialization - Insecure deserialization is a vulnerability in which untrusted or unknown data is used to inflict a denial-of-service attack, execute code, bypass authentication or otherwise abuse the logic behind an application.
  • insider threat - An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
  • insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
  • Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • instance - In object-oriented programming (OOP), an instance is a specific realization of any object.
  • instant app (Google Android instant app) - A Google Android instant app is a small software program that enables users to test out a portion of a native Android app without installing it on a device.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a standalone application or embedded software.
  • instantiation - In programming, instantiation is the creation of a real instance or particular realization of an abstraction or template, such as a class of objects or a computer process.
  • instruction set - An instruction set is a group of commands for a central processing unit (CPU) in machine language.
  • integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
  • integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
  • integrated business planning (IBP) - Integrated business planning (IBP) is a strategy for connecting the planning functions of each department in an organization to align operations and strategy with the organization's financial performance.
  • integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip, microchip or microelectronic circuit, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, diodes and transistors are fabricated.
  • integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
  • integrated risk management (IRM) - Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions.
  • integration - Integration is the act of bringing together smaller components or information stored in different subsystems into a single functioning unit.
  • integration as a service (IaaS) - Integration as a service (IaaS) is a cloud-based delivery model that strives to connect on-premises data with data located in cloud-based applications.
  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • integration testing or integration and testing (I&T) - Integration testing -- also known as integration and testing (I&T) -- is a type of software testing in which the different units, modules or components of a software application are tested as a combined entity.
  • Intel - Intel is the world's largest manufacturer of central processing units and semiconductors.
  • intellectual property (IP) - Intellectual property (IP) is a term for any intangible asset that is the product of someone's mind.
  • intellectual property core (IP core) - An intellectual property core (IP core) is a functional block of logic or data used to make a field-programmable gate array (FPGA) or application-specific integrated circuit for a product.
  • intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
  • intelligent character recognition (ICR) - Intelligent character recognition (ICR) is the computer translation of manually entered text characters into machine-readable characters.
  • intelligent power management (IPM) - Intelligent Power Management (IPM) is a combination of hardware and software that optimizes the distribution and use of electrical power in computer systems and data centers.
  • intelligent process automation (IPA) - Intelligent process automation (IPA) is a combination of technologies used to manage and automate digital processes.
  • intelligent system - An intelligent system is an advanced computer system that can gather, analyze and respond to the data it collects from its surrounding environment.
  • intelligent workflow - Intelligent workflow is an orchestration method that integrates analytics, AI, machine learning and automation.
  • intent-based networking (IBN) - Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
  • interactive voice response (IVR) - Interactive voice response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
  • interactive whiteboard - An interactive whiteboard, commonly known as a 'smartboard,' is an advanced display tool that operates interactively, either directly or through other devices, serving as a technological advancement over traditional whiteboards.
  • interlaced display - An interlaced display, or interlaced scan video, is when a video only changes every other row of pixels in the image at each screen refresh.
  • intermediate distribution frame (IDF) - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between end-user devices and the main distribution frame (MDF).
  • intermittent reinforcement - Intermittent reinforcement is the delivery of a reward at irregular intervals, a method that has been determined to yield the greatest effort from the subject.
  • internal marketing - Internal marketing is the promotion of a company's objectives, products and services to employees within the organization.
  • International Data Encryption Algorithm (IDEA) - The International Data Encryption Algorithm (IDEA) is a symmetric key block cipher encryption algorithm designed to encrypt text to an unreadable format for transmission via the internet.
  • International Information Systems Security Certification Consortium (ISC)2 - (ISC)2, short for International Information Systems Security Certification Consortium, is a nonprofit organization that provides security training and certificates.
  • international private leased circuit (IPLC) - An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.
  • International System of Units (SI) - The International System of Units is a global standard for expressing the magnitudes or quantities of important natural phenomena.
  • International Telecommunication Union (ITU) - The International Telecommunication Union (ITU) is an agency of the United Nations (UN) whose purpose is to coordinate telecommunication operations and services throughout the world.
  • internationalization (I18N) - Internationalization is the process of designing and building a product so that it can be easily adapted to specific languages and cultures.
  • internet - The internet, sometimes simply called 'the net,' is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
  • Internet Engineering Task Force (IETF) - The Internet Engineering Task Force (IETF) is the body that defines standard operating internet protocols such as TCP/IP.
  • Internet Explorer (IE) - Internet Explorer (IE) is a web browser that formerly came bundled with the Microsoft Windows operating system.
  • Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • Internet Key Exchange (IKE) - Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
  • internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
  • internet of medical things (IoMT) or healthcare IoT - The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.
  • internet of things (IoT) - The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.
  • internet of things device management (IoT device management) - Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet connection from anywhere on any device.
  • internet of things privacy (IoT privacy) - Internet of things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment.
  • Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
  • Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • interoperability - Interoperability refers to the degree to which a software system, devices, applications or other entity can connect and communicate with other entities in a coordinated manner without effort from the end user.
  • interrupt - An interrupt is a signal emitted by a device attached to a computer or from a program within the computer.
  • interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
  • interrupt request (IRQ) - An interrupt request (IRQ) is a signal sent to a computer's processor to momentarily stop (interrupt) its operations.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • intrapreneur (intrapreneurship) - The term intrapreneur is a portmanteau of 'internal' and 'entrepreneur,' referring to employees within a company who apply entrepreneurial skills like creativity, initiative and risk-taking to their roles.
  • intrusion detection system (IDS) - An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered.
  • intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a cybersecurity tool that examines network traffic to identify potential threats and automatically take action against them.
  • inventory management - Inventory management is the supervision of noncapitalized assets -- or inventory -- and stock items.
  • inventory turns (inventory turnover) - Inventory turns, also referred to as inventory turnover and inventory turnover ratio, are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inversion of control (IoC) - Inversion of control, also known as the Hollywood Principle, changes the control flow of an application and allows developers to sidestep some typical configuration hassles.
  • invitation to tender (ITT) - An invitation to tender (ITT) is a formal document that is issued by a company or an organization inviting suppliers or contractors to submit a bid for a project or service.
  • IO.SYS - IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.
  • IOPS (input/output operations per second) - IOPS (input/output operations per second) is the standard unit of measurement for the maximum number of reads/writes to noncontiguous storage locations.
  • iOS software development kit (iOS SDK) - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system (OS).
  • IoT Cloud (Salesforce IoT Cloud) - IoT Cloud is a platform from Salesforce.
  • IoT devices (internet of things devices) - Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect wirelessly to a network and can transmit data.
  • IoT gateway - An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
  • IoT security (internet of things security) - IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.
  • IP address (Internet Protocol address) - Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP SLA (Cisco) - Internet protocol service level agreement (IP SLA) is a network performance monitoring (NPM) feature of the Cisco Internetwork Operating System (Cisco IOS) that enables an IT professional to collect information about network performance in real time.
  • IP spoofing - Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from.
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
  • iPad - The iPad is a touchscreen tablet PC made by Apple.
  • iPad Air - Apple's iPad Air is a tablet that is lighter and thinner than Apple's previous tablets.
  • iPhone - The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
  • iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
  • IPsec (Internet Protocol Security) - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
  • IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
  • IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close