MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with I
  • InterSystems Cache

    InterSystems Caché is an advanced database management system and rapid application development environment that provides multiple modes of data access. Data is only described once in a single integrated data dictionary and is instantly available using object access, high-performance SQL, and powerful multidimensional access – all of which can simultaneously access the same data. Caché comes with several built-in scripting languages, and is compatible with the most popular development tools.

    IT Blogs (1)
  • Intranet ROI

    A method to measure the precise dollar of the Intranet.

  • Intrusion Detection

    A type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches.

    IT Courses & Reviews (18)
  • Intrusion Detection System (IDS)

    An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some of the types of IDS include network based (NIDS) and host based (HIDS) intrusion detection systems. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts.

    IT Courses & Reviews (75)
  • Intrusion prevention

    A preemptive approach to network security used to identify potential threats and respond to them swiftly. It monitors network traffic, and is able to take quick action after an attack, based on a set of rules established by the network administrator. 

    IT Blogs (1)
  • Intrusion Prevention System

    Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.

  • Inventory Management Software

    Inventory Management Software is a computer-based enterprise software for tracking inventory levels, order, sales and deliveries. In manufacturing industry, an inventory management software can also help to create work order, bill of materials (BOM) and other production related documents. Companies use inventory management software to prevent the inventory from becoming too high, or dwindling to levels that could put the operation of the company into jeopardy.

    IT Blogs (4)
  • Inverse multiplexing

    Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels and are then reconstructed at the other end.

  • Inverse multiplexing over ATM (IMA)

    A method of optimizing the data transfer rate for individual subscribers in networks that use Asynchronous Transfer Mode (ATM) by dividing the data into multiple concurrent streams sent across separate channels and reconstructed at the destination.

  • Inversion of Control (IoC)

    In software engineering, inversion of control (IoC) describes a design in which custom-written portions of a computer program receive the flow of control from a generic, reusable library. A software architecture with this design inverts control as compared to traditional procedural programming: in traditional programming, the custom code that expresses the purpose of the program calls into reusable libraries to take care of generic tasks, but with inversion of control, it is the reusable code that calls into the custom, or task-specific, code.

  • Invision

    A wireframing and mock up tool for web and mobile with a focus on usability. 

  • IO.SYS

    In the Windows 95 operating system, IO.SYS is an executable binary file (in other words, a program) that, when the operating system is booted, processes instructions that tell the operating system how the computer is set up. 

  • IOException

    IOException is a type of error that typically occurs when ever you are performing read / write operations on a file and the file not available due to network connectivity or permissions or non availability of the file on the disk anymore.

  • ION

    ION is a global market leader in providing innovative, high performance, real-time solutions across multiple asset classes for electronic trading, position management, pricing, risk management and downstream processing to clients which range from global financial institutions to leading niche financial specialists. The ION.NET Interface is a desktop application based on the Microsoft .NET architecture that allows traders to operate in multiple Dealer-to-Dealer (D2D) and Dealer-to-Customer (D2C) markets. All markets connected using MarketView can be accessed using the ION.NET. The ION.NET supports trading for Cash, Future, Swaps, and Repo products. The layout of the ION.NET is highly configurable and allows each user to customize the look of the application using a rich set of preferences and docking of windows.

    IT Courses & Reviews (2)
  • Ionic

    Ionic is a complete open-source SDK for hybrid mobile app development. Built on top of AngularJS and Apache Cordova, Ionic provides tools and services for developing hybrid mobile apps using Web technologies like CSS, HTML5, and Sass. Apps can be built with these Web technologies and then distributed through native app stores to be installed on devices by leveraging Cordova.

    IT Blogs (7) IT Courses & Reviews (51)
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url