Browse Definitions by Alphabet
IOT - WHA
- IoT gateway - An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
- IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
- IoT policy (Internet of Things policy) - An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
- IoT security (internet of things security) - IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.
- IP address (Internet Protocol address) - Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
- IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
- IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
- IP SLA (Cisco) - IP SLA (Internet protocol service level agreement) is a feature of the Cisco IOS (Internetwork Operating System) that allows an IT professional to collect information about network performance in real time.
- IP spoofing - Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from.
- IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
- iPad - The iPad is a touchscreen tablet PC made by Apple.
- iPad Air - Apple's iPad Air is a tablet that is lighter and thinner than Apple's previous tablets.
- iPhone - The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
- iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
- IPsec (Internet Protocol Security) - IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
- IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
- IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
- IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
- IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
- IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
- IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
- ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
- ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.
- ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
- ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system that allows records to be accessed either sequentially or randomly.
- iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
- iSCSI initiator - An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.
- iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device.
- island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
- ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
- ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO).
- ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
- ISO 22317 (International Standards Organization 22317) - ISO 22317 is the first formal standard to address the business impact analysis process.
- ISO 27001 - ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard created by the International Organization for Standardization (ISO), which provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS).
- ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
- ISO 31000 Risk Management - The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for risk management from the International Organization for Standardization.
- ISO 50001 (International Organization for Standardization 50001) - ISO 50001 (International Organization for Standardization 50001) is a voluntary standard for designing, implementing and maintaining an energy management system.
- ISO 9000 - ISO 9000 is a series of standards, developed and published by the International Organization for Standardization (ISO).
- ISO date format - The International Organization for Standardization (ISO) date and time format is a standard way to express a numeric calendar date -- and optionally time -- in a format that eliminates ambiguity between entities.
- ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
- Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
- ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
- IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
- IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
- IT asset disposition (ITAD) - IT asset disposition (ITAD) is an industry term and practice built around reusing, recycling, repairing or disposing of unwanted IT equipment in a safe and environmentally responsible way.
- IT asset management (ITAM) - IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
- IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology, operations and controls.
- IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
- IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
- IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
- IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
- IT cost structure - IT cost structure is the relationship of different types of costs within a larger IT budget.
- IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
- IT incident management - IT incident management is an area of IT service management (ITSM) wherein IT teams return a service to normal as quickly as possible after a disruption with as little negative impact on the business as possible.
- IT incident report - An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled.
- IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
- IT leadership (information technology leadership) - IT leadership (information technology leadership) refers to the senior management in an organization responsible for driving business strategy via IT infrastructure and applications.
- IT modernization - IT modernization is the process of updating an organization's information technology infrastructure, practices and systems to keep up with emerging technologies.
- IT monitoring - IT monitoring is a process that gathers metrics on the operations of an IT environment.
- IT operations (IT ops) - The term IT operations (IT ops) describes the many processes and services that an IT department administers.
- IT operations management (ITOM) - IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs.
- IT organization (information technology organization) - An IT organization (information technology organization) is the department within a company that's charged with establishing, monitoring and maintaining information technology systems and services.
- IT performance management - IT performance management is the supervision of an organization's IT infrastructure to ensure key performance indicators, service levels and budgets comply with the organization's goals.
- IT project management - Every IT project should begin with two questions: What business problem are we trying to solve? And does everyone agree it's worth the effort to solve it?.
- IT project manager - An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.
- IT service catalog - An IT service catalog is a list of technology resources and offerings available from the IT service provider within an organization.
- IT service delivery - IT service delivery is the way a corporation provides users access to IT services, such as applications, data storage and other business resources.
- IT service management (ITSM) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT.
- IT skills from the last century still in high demand - IT skills related to legacy technologies and products are still in demand and employers are looking to hire.
- IT solution - An information technology (IT) solution is a set of related software programs and/or services that are sold as a single package.
- IT strategic plan (information technology strategic plan) - An IT strategic plan outlines a company's technology-enabled business management processes that it uses to guide operations and prioritize business goals.
- IT strategy (information technology strategy) - IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.
- IT systems management - Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.
- IT transformation - IT transformation is a complete reassessment and overhaul of an organization's IT systems to improve the efficiency and delivery in a digital economy.
- IT4IT - IT4IT is a reference architecture for information technology (IT) management.
- ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important U.
- ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
- iteration - In agile software development, an iteration is a single development cycle, usually measured as one week or two weeks.
- iterative - In the world of IT and computer programming, the adjective iterative refers to a process where the design of a product or application is improved by repeated review and testing.
- iterative development - Iterative development is a way of breaking down the software development lifecycle (SDLC) of a large application into smaller chunks.
- iterative DNS query - An iterative DNS query is a request for a website name or URL.
- ITIL (Information Technology Infrastructure Library) - ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance and overall lifecycle of IT services within a business.
- ITIL v3 - ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).
- iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
- technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
- The importance of IT frameworks - IT frameworks lay out guidelines, best practices and operating principles to help IT organizations achieve objectives defined in business terms.
- What is identity and access management? Guide to IAM - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
- What is incident response? Plans, teams and tools - Incident response is an organized, strategic approach to detecting and managing cyber attacks in ways that minimize damage, recovery time and total costs.
- What is integrated risk management (IRM)? - Integrated risk management (IRM) is a set of coordinated business practices and supporting software tools that contribute to an organization's ability to understand and manage risk holistically across all departments and third-party dependencies.
- What is iPaaS? Guide to integration platform as a service - This guide explains all about integration platform as a service (iPaaS), a set of automated tools that integrate software applications that are deployed in different environments.
- What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.