IT Glossary
Key Terms To Know In The IT Industry
Internationalization (i18n)
The practice of designing and developing software applications in a way that makes them adaptable to various languages and regions without engineering changes.
You will find this term commonly used in Software Development, Localization
Internet Backbone
The principal data routes between large, strategically interconnected networks and core routers on the Internet. It is a collection of high-speed data transfer lines that connect major nodes or routing centers.
You will find this term commonly used in Networking, Internet Technology
Internet Exchange Point (IXP)
A physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks.
You will find this term commonly used in Networking
Internet Governance
The development and application by governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet.
You will find this term commonly used in Internet Technology, Policy
Internet Governance Forum (IGF)
A multi-stakeholder forum for policy dialogue on issues of internet governance, including the sustainability, robustness, security, stability, and development of the internet.
You will find this term commonly used in Networking, Internet Policy
Internet Health Report
An annual report that provides insights into the global condition of the internet, including security, connectivity, and innovation, aiming to improve the internet's ecosystem.
You will find this term commonly used in Networking, Internet Policy
Internet of Things (IoT)
The Internet of Things (IoT) refers to a network of interconnected devices or objects embedded with sensors, software, and connectivity features, enabling them to collect and exchange data, automate tasks, and interact with the environment.
You will find this term commonly used in IoT, Embedded Systems, Smart Devices
Internet Protocol Suite
The conceptual model and set of communications protocols used on the Internet and similar computer networks. Commonly known as TCP/IP.
You will find this term commonly used in Networking
Internet Protocol Television (IPTV) Technologies
Technologies used to deliver television services over the internet or local area networks (LANs), unlike traditional terrestrial, satellite signal, and cable television formats.
You will find this term commonly used in Networking, Telecommunications
Internet Service Manager (ISM)
A management tool provided by Microsoft for managing Internet Information Services (IIS) and other web services, allowing administrators to create and manage web sites, applications, and virtual directories.
You will find this term commonly used in Networking, Web Development
Internet Service Quality
The measurement and assessment of the performance and reliability of internet services, including speed, uptime, and user satisfaction.
You will find this term commonly used in Networking, Service Management
Interoperability
The ability of computer systems or software to exchange and make use of information without special effort from the user or the system.
You will find this term commonly used in Software Development, Networking
Interoperability Standards
Agreed-upon specifications for making systems and products work together. These standards enable different information technology systems and software applications to communicate and exchange data.
You will find this term commonly used in Software Development, Networking
Interoperability Testing
Testing that evaluates the interoperability of a software application or system with others, ensuring they can work together within the same environment.
You will find this term commonly used in Software Development, QA
Interpolation
A method of constructing new data points within the range of a discrete set of known data points.
You will find this term commonly used in Programming, Data Analysis
Interpretive Simulation
A type of simulation that runs models directly from high-level descriptions at runtime rather than compiling them into machine code, allowing for greater flexibility and ease of model changes.
You will find this term commonly used in AI, Development
Interstitial Advertisement
A full-page ad that appears before the actual webpage. In digital marketing, these ads are used to capture the user's attention while navigating between pages.
You will find this term commonly used in Digital Marketing, Web Development
Intraband Transition
In semiconductor physics, a transition of electrons within the same energy band, affecting the properties and behavior of semiconductors, relevant to the development of electronic and photonic devices.
You will find this term commonly used in Hardware, Development
Intranet Portal
A private network accessible only to an organization's staff, often consisting of a wide range of information and services from the organization's internal IT systems.
You will find this term commonly used in Networking, General IT
Intrusion Detection
The process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies.
You will find this term commonly used in Security, Cybersecurity
Intrusion Detection Policy
A set of rules and configurations designed to detect and respond to unauthorized access or anomalies in network traffic.
You will find this term commonly used in Security, Cybersecurity
Intrusion Detection System (IDS)
A device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.
You will find this term commonly used in Security, Cybersecurity
Intrusion Detection System (IDS) Types
Various forms of IDS, including network-based (NIDS), host-based (HIDS), and application-based (AIDS), each designed to detect and potentially thwart unauthorized access or misuse of systems.
You will find this term commonly used in Security, Cybersecurity
Intrusion Prevention System (IPS)
An IT security device that monitors network and/or system activities for malicious activities, logs information about these activities, attempts to block/stop them, and reports them to management.
You will find this term commonly used in Security, Cybersecurity
Intrusion Simulation
The practice of mimicking cyber attack tactics and techniques in a controlled environment to test the effectiveness of security measures and identify vulnerabilities.
You will find this term commonly used in Security, Cybersecurity
Inventory Management Software
Software solutions designed to help businesses manage their inventory levels, orders, sales, and deliveries. It often includes features for product categorization, stock level tracking, and forecasting.
You will find this term commonly used in Business Management, General IT
Inventory Management System
Software tools or physical practices used to track resources and inventory levels within an organization.
You will find this term commonly used in IT Management, Supply Chain
Inverse Multiplexing
The process of combining multiple signals or data streams into one signal over a shared medium.
You will find this term commonly used in Networking, Telecommunications
Inversion of Control (IoC)
A design principle in software engineering where the control of objects or portions of a program is transferred to a container or framework. It’s often used in the development of applications.
You will find this term commonly used in Software Development
Investigative Data Mining
The process of using data mining techniques to identify patterns or anomalies that could suggest misconduct or criminal activities.
You will find this term commonly used in Data Analysis, Security
Investment Analysis in IT
The process of evaluating and selecting IT projects and assets based on their potential to generate financial returns, considering factors like costs, benefits, risks, and strategic alignment.
You will find this term commonly used in IT Management, Finance
Investment Analysis Software
Tools and platforms used to analyze financial data, assess investment opportunities, and make informed decisions about portfolio management, including features for market analysis, simulation, and reporting.
You will find this term commonly used in Finance, Business Intelligence
Investment in IT Security
The allocation of resources towards protecting information systems and data from cyber threats, including the purchase of security tools, hiring of specialists, and implementation of security measures.
You will find this term commonly used in Security, IT Management
IoC (Inversion of Control) Container
A software design pattern that manages the instantiation and provides the dependencies of classes.
You will find this term commonly used in Software Development
IOPS (Input/Output Operations Per Second)
A performance measurement used to benchmark computer storage devices like hard disk drives (HDD), solid-state drives (SSD), and storage area networks (SAN).
You will find this term commonly used in Hardware, General IT
IoT (Internet of Things)
Refers to the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
You will find this term commonly used in Networking, General IT
IoT Device Management
The process of administering, monitoring, and managing the IoT devices deployed across different environments, including provisioning, firmware updates, and security management.
You will find this term commonly used in IoT, IT Management
IoT Gateway
A device or software application that serves as a connection point between the cloud and controllers, sensors, and intelligent devices in the Internet of Things (IoT). It processes and translates data between different protocols.
You will find this term commonly used in IoT, Networking
IoT Network Protocols
Protocols used in the networking of IoT devices, including MQTT, CoAP, and AMQP, designed for efficient communication in constrained environments or over long distances.
You will find this term commonly used in IoT, Networking
IoT Platform
A suite of components that enable development, deployment, and management of IoT applications and devices, often providing capabilities such as device management, data collection, processing, and analytics.
You will find this term commonly used in IoT, Development
IoT Security
Refers to the safety component tied to the Internet of Things, and involves the safeguarding of connected devices and networks in the IoT.
You will find this term commonly used in Security, Cybersecurity
IoT Security Standards
Guidelines and protocols designed to secure Internet of Things devices and ecosystems from cyber threats, ensuring data privacy and system integrity.
You will find this term commonly used in Security, IoT
IP Address
A unique address that identifies a device on the internet or a local network, allowing for communication between devices.
You will find this term commonly used in Networking
IP Address Assignment
The process of allocating IP addresses to devices on a network, either statically by manual configuration or dynamically using DHCP or similar protocols.
You will find this term commonly used in Networking, IT Management
IP Address Leasing
The dynamic allocation of IP addresses to devices on a network, typically through DHCP.
You will find this term commonly used in Networking, IT Management
IP Address Management (IPAM)
The method by which Internet Protocol (IP) networking addresses (IPv4 and IPv6) are tracked and managed within a network.
You will find this term commonly used in Networking, Security
IP Anycast
A networking technique where a single IP address is assigned to multiple devices on the network, and the network routes the traffic to the nearest device.
You will find this term commonly used in Networking, Internet Technology
IP Canonicalization
The process of redirecting multiple IP addresses to a single primary domain, improving website consistency and preventing duplicate content issues for SEO.
You will find this term commonly used in Networking, Web Development
IP Core
In semiconductor design, a reusable unit of logic or a chip layout design that can be licensed to multiple fabricators or integrators as a building block for different semiconductor products.
You will find this term commonly used in Hardware, Development
IP Fast Reroute (IPFRR)
Mechanisms designed to quickly reroute traffic in the event of a failure within an IP network, minimizing packet loss and downtime.
You will find this term commonly used in Networking, Security
Career Path?
Information Security Analyst Career Path
$129.00 $51.60
Pentester Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Web Designer Career Path
$129.00 $51.60
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
Certified Ethical Hacker Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Entry Level Information Security Specialist Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60