Browse Definitions :

Browse Definitions by Alphabet

  • IQMS - IQMS introduced one of its newest services, WebIQ, in August 2016.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.
  • ISACA - ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.
  • ISAM (Indexed Sequential Access Method) - ISAM (Indexed Sequential Access Method) is a file management system developed at IBM that enables records to be accessed either sequentially, in the order they were entered or randomly with an index.
  • iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • iSCSI initiator - An Internet Small Computer System Interface initiator is software or hardware that lets a host computer send data to an external iSCSI-based storage array through an Ethernet network adapter over a TCP-based IP network.
  • island hopping attack - In this type of backdoor attack, the threat actor exploits a weakness downstream from the actual target and uses it as a launching point to reach the intended target.
  • ISO (International Organization for Standardization) - ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.
  • ISO 14000 and 14001 - ISO 14000 is a series of environmental management standards developed and published by the International Organization for Standardization (ISO).
  • ISO 22301 (International Organization of Standardization standard 22301) - International Organization of Standardization standard 22301 (ISO 22301) is a proposed standard that would call for meeting specific societal security requirements for disaster preparedness and business continuity management systems (BCMS).
  • ISO 27001 - ISO 27001, formally known as ISO/IEC 27001:2022, is an information security standard created by the International Organization for Standardization (ISO), which provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS).
  • ISO 27002 (International Organization for Standardization 27002) - The ISO 27002 standard is a collection of information security management guidelines that are intended to help an organization implement, maintain and improve its information security management.
  • ISO 31000 Risk Management - The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles for risk management.
  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 (International Organization for Standardization 50001) is a voluntary standard for designing, implementing and maintaining an energy management system.
  • ISO 9000 - ISO 9000 is a series of standards, developed and published by the International Organization for Standardization (ISO).
  • ISO date format - The International Organization for Standardization (ISO) date and time format is a standard way to express a numeric calendar date -- and optionally time -- in a format that eliminates ambiguity between entities.
  • ISO/TS 22317 (International Organization for Standardization Technical Standard 22317) - ISO/TS 22317 is the first formal standard to address the business impact analysis process.
  • ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
  • Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
  • IT asset disposition (ITAD) - IT asset disposition (ITAD) is an industry term and practice built around reusing, recycling, repairing or disposing of unwanted IT equipment in a safe and environmentally responsible way.
  • IT asset management (ITAM) - IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
  • IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology, operations and controls.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT budget - IT budget is the amount of money spent on an organization's information technology systems and services.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
  • IT cost structure - IT cost structure refers to the relationship between different types of expenditures within a larger IT budget.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT incident management - IT incident management is a component of IT service management (ITSM) that aims to rapidly restore services to normal following an incident while minimizing adverse effects on the business.
  • IT incident report - An IT incident report is documentation of an event that disrupted the normal operations of an IT system or had the potential to do so as well as how the situation was handled.
  • IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
  • IT modernization - IT modernization is the process of updating an organization's information technology infrastructure, practices and systems to keep up with emerging technologies.
  • IT monitoring - IT monitoring is a process that gathers metrics on the operations of an IT environment.
  • IT operations (IT ops) - The term IT operations (IT ops) describes the many processes and services an IT department manages and maintains within an organization.
  • IT operations management (ITOM) - IT operations management (ITOM) is a strategic approach to managing an organization's information technology needs.
  • IT organization (information technology organization) - An IT organization (information technology organization) is the department within a company that's charged with establishing, monitoring and maintaining information technology systems and services.
  • IT performance management - IT performance management is the supervision of an organization's IT infrastructure to ensure key performance indicators, service levels and budgets comply with the organization's goals.
  • IT project management - IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.
  • IT project manager - An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.
  • IT service catalog - An IT service catalog is a list of technology resources and offerings available from the IT service provider within an organization.
  • IT service delivery - IT service delivery is the way a corporation provides users access to IT services, such as applications, data storage and other business resources.
  • IT service management (ITSM) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use IT.
  • IT skills from the last century still in high demand - IT skills related to legacy technologies and products are still in demand and employers are looking to hire.
  • IT strategic plan (information technology strategic plan) - An IT strategic plan is a document that details the comprehensive technology-enabled business management processes an organization uses to guide operations.
  • IT strategy (information technology strategy) - IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.
  • IT systems management - Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.
  • IT transformation - IT transformation is a complete reassessment and overhaul of an organization's IT systems to improve the efficiency and delivery in a digital economy.
  • IT4IT - IT4IT is a reference architecture for information technology (IT) management.
  • ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important U.
  • ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
  • iteration - In agile software development, an iteration is a single development cycle, usually measured as one week or two weeks.
  • iterative - In the world of IT and computer programming, the adjective iterative refers to a process where the design of a product or application is improved by repeated review and testing.
  • iterative development - Iterative development is a way of breaking down the software development lifecycle (SDLC) of a large application into smaller chunks.
  • iterative DNS query - An iterative DNS query is a request for a website name or URL.
  • ITIL (Information Technology Infrastructure Library) - ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance and overall lifecycle of IT services within a business.
  • ITIL V3 - ITIL V3 is the third version of the Information Technology Infrastructure Library (ITIL), a globally recognized collection of best practices for managing IT and for implementing IT service management (ITSM) practices.
  • iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
  • The importance of IT frameworks - IT frameworks lay out guidelines, best practices and operating principles to help IT organizations achieve objectives defined in business terms.
  • What is identity and access management? Guide to IAM - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • What is incident response? A complete guide - Incident response is an organized, strategic approach to detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs.
  • What is iPaaS? Guide to integration platform as a service - This guide explains all about integration platform as a service (iPaaS), a set of automated tools that integrate software applications that are deployed in different environments.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is the inception score (IS)? - The inception score (IS) is a mathematical algorithm used to measure or determine the quality of images created by generative AI through a generative adversarial network (GAN).
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close