Browse Definitions by Alphabet
I/O - INF
- I/O (input/output) - I/O (input/output), pronounced "eye-oh," describes any operation, program or device that transfers data to or from a computer.
- I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
- IBM (International Business Machines Corporation) - IBM (International Business Machines Corporation) is a multinational technology company headquartered in Armonk, N.
- IBM Cloud (formerly IBM Bluemix and IBM SoftLayer) - IBM Cloud is a suite of cloud computing services from IBM that offers both platform as a service (PaaS) and infrastructure as a service (IaaS).
- IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
- IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
- IBM Integrated Facility for Linux (IFL) - The Integrated Facility for Linux (IFL) is a specialty engine processor on IBM System z mainframe servers that is dedicated to Linux workloads.
- IBM Pureflex - IBM PureFlex is a combined hardware and software system for data centers that delivers infrastructure as a system (IaaS) optimized for scalable cloud computing.
- IBM Roadrunner - Roadrunner was a supercomputer developed by IBM at the Los Alamos National Laboratory in New Mexico.
- IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
- IBM Watson supercomputer - Watson was a supercomputer designed and developed by IBM.
- ICANN (Internet Corporation for Assigned Names and Numbers) - ICANN (Internet Corporation for Assigned Names and Numbers) is the private, non-government, nonprofit corporation with responsibility for IP address space allocation, protocol parameter assignment, domain name system management and root server system management functions.
- ICD-10 (International Classification of Diseases, Tenth Revision) - The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.
- ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
- ICD-10-PCS - The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.
- ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
- iCloud - Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.
- ICMP (Internet Control Message Protocol) - ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
- icon - In today's age of technological advancement, most people recognize the word 'icon' as referring to a small selectable or nonselectable image representing or leading to something else in a computer's graphical user interface (GUI) or on the web.
- ICS security (industrial control system security) - ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments.
- ICT (information and communications technology or technologies) - ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.
- ICT4D (Information and Communications Technologies for Development) - ICT4D (Information and Communications Technologies for Development) is a decentralized movement dedicated to making access to digital technologies more equitable, with the goals of bridging the digital divide and advancing global economic development.
- IDE (Integrated Drive Electronics) - IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.
- idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
- identity management (ID management) - Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
- identity provider - An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of login credentials that ensures the entity is who or what it says it is across multiple platforms, applications and networks.
- identity resolution - Identity resolution is a data management process that links a customer's online behavior to their unique identity by gathering different data sets and identifying non-obvious relationships.
- identity theft - Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.
- IDL (interface definition language) - IDL (interface definition language) is a generic term for a language that lets a program or object written in one language communicate with another program written in an unknown language.
- IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
- IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
- IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
- IEEE (Institute of Electrical and Electronics Engineers) - The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.
- IEEE 802 wireless standards - IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless.
- IEEE 802.3 - 802.3, or IEEE 802.
- IFS AB - IFS AB (Industrial and Financial Systems) is an ERP software vendor that specializes in asset-intensive, project-centric industries, such as manufacturing and distribution.
- IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
- ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
- image - An image is a visual representation of something, while a digital image is a binary representation of visual data.
- image compression - Image compression is a process applied to a graphics file to minimize its size in bytes without degrading image quality below an acceptable threshold.
- image metadata - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
- image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in digital images.
- image-based backup - Image-based backup creates a copy of an operating system and all the data associated with it, including the system state and application configurations.
- image-to-image translation - Image-to-image translation is a generative artificial intelligence (AI) technique that translates a source image into a target image while preserving certain visual properties of the original image.
- IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
- IMEI (International Mobile Equipment Identity) - IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone.
- immersive technology - Immersive technology is an integration of virtual content with the physical environment in a way that allows the user to engage naturally with the blended reality.
- immersive virtual reality (immersive VR) - Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.
- immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
- impedance - Impedance, denoted Z, is an expression of the opposition that an electronic component, circuit, or system offers to alternating and/or direct electric current.
- imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
- implementation - Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for doing something.
- implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
- implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
- improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
- in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
- in-database analytics - In-database analytics is a scheme for processing data within the database, avoiding the data movement that slows response time.
- in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
- in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
- inbound call - An inbound call is one that a customer initiates to a call center or contact center.
- inbound marketing - Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created internet content, thereby having potential customers come to the organization rather than marketers vying for their attention.
- Inbox Zero - Inbox Zero is a rigorous approach to email management that aims to keep an inbox empty -- or almost empty -- at all times.
- inception score (IS) - The inception score (IS) is a mathematical algorithm used to measure or determine the quality of images created by generative AI through a generative adversarial network (GAN).
- incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
- incident management plan (IMP) - An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that helps an organization return to normal as quickly as possible following an unplanned event.
- incident response team - An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational emergency.
- Incremental Backup - An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.
- incremental innovation - Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods.
- incumbent local exchange carrier (ILEC) - An incumbent local exchange carrier (ILEC) is a type of U.
- Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
- Indicators of Compromise (IOC) - Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor.
- Individual Retirement Account (IRA) - An Individual Retirement Account (IRA) is a retirement savings account set up with a financial institution or brokerage firm that offers tax breaks for those investing income for their retirement.
- inductive argument - An inductive argument is an assertion that uses specific premises or observations to make a broader generalization.
- inductive reasoning - Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.
- inductor - An inductor is a passive electronic component that temporarily stores energy in a magnetic field when electric current flows through the inductor's coil.
- industrial automation - Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.
- industrial control system (ICS) - An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated devices in manufacturing environments.
- industrial espionage - Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors to gain a business advantage.
- industrial internet of things (IIoT) - The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.
- Industry 4.0 - Industry 4.0, which refers to the fourth industrial revolution, is the cyber-physical transformation of manufacturing.
- InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
- infinite loop (endless loop) - An infinite loop -- sometimes called an endless loop -- is a piece of code that lacks a functional exit so that it repeats indefinitely.
- infographic - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
- infonesia - Infonesia is an inability to remember where you saw or heard an item of information.
- Infor - Infor is a New York-based vendor of ERP and other enterprise business software.
- information - Information is stimuli that has meaning in some context for its receiver.
- Information Age - The Information Age is the idea that access to and the control of information is the defining characteristic of this current era in human civilization.
- Information and Content Exchange (ICE) - Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.
- information asset - An information asset is a collection of knowledge or data that is organized, managed and valuable.
- information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
- information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
- information extraction (IE) - Information extraction (IE) is the automated retrieval of specific information related to a selected topic from a body or bodies of text.
- information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
- information lifecycle management (ILM) - Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, starting with its creation and acquisition through when it becomes obsolete and is deleted.
- information overload - Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing.
- information rights management (IRM) - Information rights management (IRM) is a discipline that involves managing, controlling and securing content from unwanted access.
- information security (infosec) - Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information.
- information security management system (ISMS) - An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization's sensitive data.
- information society - Information Society is a term for a society in which the creation, distribution, and manipulation of information has become the most significant economic and cultural activity.
- information systems (IS) - An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information.