MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with I
  • IBM Roadrunner

    The fastest supercomputer in the world developed for the Los Alamos National Laboratory in New Mexico. The system cost $100 million to develop. It's primary application will be work involving nuclear weapons, such as simulation of a nuclear attack.

  • IBM Security AppScan

    IBM® Security AppScan® enhances web and mobile application security program management and strengthens regulatory compliance. By scanning your web and mobile applications prior to deployment, AppScan enables you to identify security vulnerabilities and generate reports and fix recommendations. AppScan standard helps organizations decrease the likelihood of web application attacks and costly data breaches by automating application security vulnerability testing. IBM Security AppScan Standard can be used to reduce risk by permitting you to test applications prior to deployment and for ongoing risk assessment in production environments.

  • IBM Security Systems

    IBM Internet Security Systems is a security software provider which was founded in 1994 as Internet Security Systems, and is often known simply as ISS or ISSX.

  • IBM Watson supercomputer

    An IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a “question answering" machine. The supercomputer is named for IBM founder, Thomas J. Watson.

  • IBM Worklight

    IBM Worklight is designed to provide an open, comprehensive platform to build, run and manage HTML5, hybrid, native mobile apps and extend your business to mobile devices. IBM Worklight can help you reduce both app development and maintenance costs, improve time-to-market and enhance mobile app governance and security.

  • iCloud

    iCloud is an Apple email, storage and data synchronization subscription service that provides 5GB of storage for free. iCloud allows subscribers to save their address book, calendar, notes, Safari bookmarks and photos on Apple's servers.

  • ICMP bug (Ping of Death)

    On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol. 

  • iCrime (Apple picking)

    iCrime, also known as "Apple picking," is the theft of Apple devices such as iPhones, iPods and iPads. The crime also includes illegal acts associated with the thefts, which have included assault and murder. 

  • Identity and Access Management

    Identity and access management (IAM) is the security discipline that facilitates the right individuals to access the right resources at the right times for the right reasons. IAM technology can be used to initiate, capture, record and manage user identities and their related access permissions in an automated fashion. This ensures that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized and audited. Enterprises need to manage access to information and applications scattered across internal and external application systems. Moreover, they must provide this access for a growing number of identities, both inside and outside the organization, without compromising security or exposing sensitive information.

  • Identity as a Service (IDaaS)

    An authentication infrastructure that is built, hosted and managed by a third-party service provider. IDaaS can be thought of as single sign-on (SSO) for the cloud.  

  • Identity Chaos (Password Chaos)

    A situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or devices which may be subject to different rules, different security levels, and expire on different dates.

  • Identity Management

    In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.

    IT Courses & Reviews (3)
  • Identity Theft

    Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.

  • IDoc (Intermediate Document)

    A standard data structure for Electronic Data Interchange (EDI) between application programs written for the popular SAP business system or between an SAP application and an external program. 

  • IEEE

    The world's largest technical professional society promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.

  • IEEE 1284 parallel interface standard

    The prevalent standard for connecting a computer to a printer or certain other devices over a parallel (eight bits of data at a time) physical and electrical interface . The physical connection is similar to the older Centronics interface.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to