MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with I
  • Internet/Online marketing

    The act of promoting products and services through the Internet using online/software tools and methodologies. 

  • Internetwork Packet Exchange (IPX)

    A networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers. IPX is a datagram or packet protocol. IPX works at the Network layer of communication protocols and is connectionless.

  • Internetworking

    A term used by Cisco, BBN, and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.

  • Interpreted program (Script)

    A program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter. In turn, the command interpreter requests services from the operating system. 

  • Interprocess Communication (IPC)

    A set of programming interfaces that allow a programmer to coordinate activities among different program processes that can run concurrently in an operating system. This allows a program to handle many user requests at the same time. 

  • Interrupt request (IRQ)

    An assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation. 

  • InterSystems Caché

    InterSystems Caché is an advanced database management system and rapid application development environment that provides multiple modes of data access. Data is only described once in a single integrated data dictionary and is instantly available using object access, high-performance SQL, and powerful multidimensional access – all of which can simultaneously access the same data. Caché comes with several built-in scripting languages, and is compatible with the most popular development tools.

  • Intranet ROI

    A method to measure the precise dollar of the Intranet.

  • Intrusion Detection (ID)

    A type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches.

  • Intrusion Detection System (IDS)

    An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some of the types of IDS include network based (NIDS) and host based (HIDS) intrusion detection systems. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts.

  • Intrusion prevention

    A preemptive approach to network security used to identify potential threats and respond to them swiftly. It monitors network traffic, and is able to take quick action after an attack, based on a set of rules established by the network administrator. 

  • Intrusion Prevention System

    Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.

  • Inventory Management Software

    Inventory Management Software is a computer-based enterprise software for tracking inventory levels, order, sales and deliveries. In manufacturing industry, an inventory management software can also help to create work order, bill of materials (BOM) and other production related documents. Companies use inventory management software to prevent the inventory from becoming too high, or dwindling to levels that could put the operation of the company into jeopardy.

  • Inverse multiplexing

    Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels and are then reconstructed at the other end.

  • Inverse multiplexing over ATM (IMA)

    A method of optimizing the data transfer rate for individual subscribers in networks that use Asynchronous Transfer Mode (ATM) by dividing the data into multiple concurrent streams sent across separate channels and reconstructed at the destination.

  • Inversion of Control (IoC)

    In software engineering, inversion of control (IoC) describes a design in which custom-written portions of a computer program receive the flow of control from a generic, reusable library. A software architecture with this design inverts control as compared to traditional procedural programming: in traditional programming, the custom code that expresses the purpose of the program calls into reusable libraries to take care of generic tasks, but with inversion of control, it is the reusable code that calls into the custom, or task-specific, code.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to