Browse Definitions by Alphabet
- integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero.
- integrated accounting system - An integrated accounting system is a type of software that combines major financial accounting functions into one application.
- integrated circuit (IC) - An integrated circuit (IC), sometimes called a chip, microchip or microelectronic circuit, is a semiconductor wafer on which thousands or millions of tiny resistors, capacitors, diodes and transistors are fabricated.
- integrated development environment (IDE) - An integrated development environment (IDE) is a software suite that consolidates basic tools required to write and test software.
- integrated risk management (IRM) - Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions.
- integration - Integration is the act of bringing together smaller components or information stored in different subsystems into a single functioning unit.
- integration as a service (IaaS) - Integration as a service (IaaS) is a cloud-based delivery model that strives to connect on-premises data with data located in cloud-based applications.
- integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
- Intel - Intel is the world's largest manufacturer of central processing units and semiconductors.
- intellectual property (IP) - Intellectual property (IP) is a term for any intangible asset that is the product of someone's mind.
- intellectual property core (IP core) - An intellectual property core (IP core) is a functional block of logic or data used to make a field-programmable gate array (FPGA) or application-specific integrated circuit for a product.
- intelligent process automation (IPA) - Intelligent process automation (IPA) is a combination of technologies used to manage and automate digital processes.
- intelligent system - An intelligent system is an advanced computer system that can gather, analyze and respond to the data it collects from its surrounding environment.
- intelligent workflow - Intelligent workflow is an orchestration method that integrates analytics, AI, machine learning and automation.
- intent-based networking (IBN) - Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
- interactive voice response (IVR) - Interactive voice response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
- interactive whiteboard - An interactive whiteboard, commonly known as a 'smartboard,' is an advanced display tool that operates interactively, either directly or through other devices, serving as a technological advancement over traditional whiteboards.
- interlaced display - An interlaced display, or interlaced scan video, is when a video only changes every other row of pixels in the image at each screen refresh.
- intermediate distribution frame (IDF) - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between end-user devices and the main distribution frame (MDF).
- intermittent reinforcement - Intermittent reinforcement is the delivery of a reward at irregular intervals, a method that has been determined to yield the greatest effort from the subject.
- internal marketing - Internal marketing is the promotion of a company's objectives, products and services to employees within the organization.
- International Data Encryption Algorithm (IDEA) - The International Data Encryption Algorithm (IDEA) is a symmetric key block cipher encryption algorithm designed to encrypt text to an unreadable format for transmission via the internet.
- International Information Systems Security Certification Consortium (ISC)2 - (ISC)2, short for International Information Systems Security Certification Consortium, is a nonprofit organization that provides security training and certificates.
- international private leased circuit (IPLC) - An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.
- International System of Units (SI) - The International System of Units is a global standard for expressing the magnitudes or quantities of important natural phenomena.
- internationalization (I18N) - Internationalization is the process of designing and building a product so that it can be easily adapted to specific languages and cultures.
- internet - The internet, sometimes simply called 'the net,' is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
- Internet Engineering Task Force (IETF) - The Internet Engineering Task Force (IETF) is the body that defines standard operating internet protocols such as TCP/IP.
- Internet Explorer (IE) - Internet Explorer (IE) is a web browser that formerly came bundled with the Microsoft Windows operating system.
- Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
- Internet Key Exchange (IKE) - Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
- internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
- Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
- Internet of Everything (IoE) - The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
- internet of medical things (IoMT) or healthcare IoT - The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.
- internet of things (IoT) - The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.
- internet of things device management (IoT device management) - Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet connection from anywhere on any device.
- internet of things privacy (IoT privacy) - Internet of things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment.
- Internet porn - Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.
- Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
- interoperability - Interoperability refers to the degree to which a software system, devices, applications or other entity can connect and communicate with other entities in a coordinated manner without effort from the end user.
- interrupt marketing - Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.
- interrupt request (IRQ) - An interrupt request (IRQ) is a signal sent to a computer's processor to momentarily stop (interrupt) its operations.
- interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
- intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
- intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
- intrapreneur (intrapreneurship) - The term intrapreneur is a portmanteau of 'internal' and 'entrepreneur,' referring to employees within a company who apply entrepreneurial skills like creativity, initiative and risk-taking to their roles.
- intrusion prevention system (IPS) - An intrusion prevention system (IPS) is a cybersecurity tool that examines network traffic to identify potential threats and automatically take action against them.
- inventory turns (inventory turnover) - Inventory turns, also referred to as inventory turnover and inventory turnover ratio, are a popular measurement used in inventory management to assess operational and supply chain efficiency.
- invitation to tender (ITT) - An invitation to tender (ITT) is a formal document that is issued by a company or an organization inviting suppliers or contractors to submit a bid for a project or service.
- IO.SYS - IO.SYS is a hidden executable binary file that processes instructions that tell the operating system (OS) how the computer is set up when it is booted or started.
- IOPS (input/output operations per second) - IOPS (input/output operations per second) is the standard unit of measurement for the maximum number of reads/writes to noncontiguous storage locations.
- iOS software development kit (iOS SDK) - The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system (OS).
- IoT attack surface - The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
- IoT botnet (Internet of Things botnet) - An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.
- IoT devices (internet of things devices) - Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect wirelessly to a network and can transmit data.
- IoT gateway - An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
- IoT security (internet of things security) - IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.
- IP address (Internet Protocol address) - Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
- IP SLA (Cisco) - Internet protocol service level agreement (IP SLA) is a network performance monitoring (NPM) feature of the Cisco Internetwork Operating System (Cisco IOS) that enables an IT professional to collect information about network performance in real time.
- IP spoofing - Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from.
- IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
- iPad - The iPad is a touchscreen tablet PC made by Apple.
- iPad Air - Apple's iPad Air is a tablet that is lighter and thinner than Apple's previous tablets.
- iPhone - The iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
- iPhone Configuration Utility - The iPhone Configuration Utility is free software for Windows and Mac OS X that lets an administrator control how an iOS device works within an enterprise IT network.
- IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
- IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
- IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
- IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
- ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.
- ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
- ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that enables records to be accessed either sequentially, in the order they were entered or randomly with an index.
- iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
- iSCSI initiator - An Internet Small Computer System Interface initiator is software or hardware that lets a host computer send data to an external iSCSI-based storage array through an Ethernet network adapter over a TCP-based IP network.
- island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
- ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
- ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO).
- ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
- ISO 27001 - ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard created by the International Organization for Standardization (ISO), which provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS).
- ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security management guidelines that are intended to help an organization implement, maintain and improve its information security management.
- ISO 31000 Risk Management - The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management.
- ISO 50001 (International Organization for Standardization 50001) - ISO 50001 (International Organization for Standardization 50001) is a voluntary standard for designing, implementing and maintaining an energy management system.
- ISO 9000 - ISO 9000 is a series of standards, developed and published by the International Organization for Standardization (ISO).
- ISO date format - The International Organization for Standardization (ISO) date and time format is a standard way to express a numeric calendar date -- and optionally time -- in a format that eliminates ambiguity between entities.
- ISO/TS 22317 (International Organization for Standardization Technical Standard 22317) - ISO/TS 22317 is the first formal standard to address the business impact analysis process.
- ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
- ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
- IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
- IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
- IT asset disposition (ITAD) - IT asset disposition (ITAD) is an industry term and practice built around reusing, recycling, repairing or disposing of unwanted IT equipment in a safe and environmentally responsible way.
- IT asset management (ITAM) - IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
- IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology, operations and controls.
- IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
- IT budget - IT budget is the amount of money spent on an organization's information technology systems and services.
- IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
- IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
- IT cost structure - IT cost structure refers to the relationship between different types of expenditures within a larger IT budget.
- IT incident management - IT incident management is a component of IT service management (ITSM) that aims to rapidly restore services to normal following an incident while minimizing adverse effects on the business.
- IT incident report - An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled.