I

ICMP(ICMP)

A supporting protocol in the Internet Protocol Suite used by network devices to send error messages and operational information.

network

Identity and Access Management(IAM)

A framework for ensuring that the right people have the appropriate access to technology resources.

security

Identity Security

A comprehensive approach to securing digital identities and managing access to resources across an organization.

security

Image Optimization

The practice of reducing the file size of images as much as possible without sacrificing quality to improve page load speed.

web

Image Registry

A centralized service for storing and distributing container images.

cloud

Image Segmentation

The process of partitioning a digital image into multiple segments or sets of pixels to simplify its representation and make it more meaningful for analysis.

ai

Immutability

The inability of a blockchain's history to be changed or deleted once it has been recorded.

web

Impermanent Loss(IL)

The temporary loss of funds experienced by liquidity providers in an AMM when asset prices change.

web

Incident Management

The process of responding to an unplanned event or service interruption and restoring the service to its operational state.

dev

Incident Response(IR)

An organized approach to addressing and managing the aftermath of a security breach or cyberattack.

security

Inclusive Cache

A cache hierarchy design where all data in a higher-level cache (e.g., L1) is also guaranteed to be present in the lower-level cache (e.g., L2).

hardware

Incremental Static Regeneration(ISR)

A hybrid approach that allows you to update static content after you've built your site, without needing to rebuild the entire site.

web

Indicators of Attack(IoA)

Evidence of an attacker's intent and the techniques they are using in real-time, focusing on the 'how' rather than the 'what'.

security

Indicators of Compromise(IoC)

Evidence or artifacts found on a network or operating system that indicate a high probability of a security breach.

security

Inference

The stage where a trained AI model is used to make predictions or generate outputs based on new, unseen input data.

ai

Inferential Statistics

The process of using data analysis to deduce properties of an underlying probability distribution.

ai

Information Security(InfoSec)

The practice of protecting information by mitigating information risks, ensuring confidentiality, integrity, and availability.

security

Infrastructure as a Service(IaaS)

A cloud model that provides on-demand access to fundamental computing resources like servers and storage.

cloud

Infrastructure as Code(IaC)

The management and provisioning of infrastructure through machine-readable definition files, rather than manual configuration or interactive tools.

cloud

Infrastructure as Code (IaC) Scanning

The process of analyzing infrastructure definition files (e.g., Terraform, CloudFormation) for security misconfigurations before they are deployed.

security

Infrastructure as Code (Networking)(IaC)

Managing and provisioning network infrastructure through machine-readable definition files rather than manual configuration.

network

Infrastructure Monitoring

The process of collecting and analyzing metrics and logs from cloud resources to ensure their health, performance, and availability.

cloud

Ingress

An API object that manages external access to services in a Kubernetes cluster, typically HTTP.

cloud

Initial Coin Offering(ICO)

A fundraising method where a new project sells its native tokens to early investors.

web

Initial DEX Offering(IDO)

A token launch conducted on a decentralized exchange (DEX).

web

Initial Exchange Offering(IEO)

A token sale managed by a centralized exchange (CEX) on behalf of a project.

web

In-Memory Cache

A high-speed data storage layer that stores a subset of data in RAM to serve future requests faster than accessing the primary database.

cloud

Input/Output(I/O)

The communication between an information processing system (such as a computer) and the outside world.

hardware

Instruction Level Parallelism(ILP)

A measure of how many instructions in a computer program can be executed simultaneously.

hardware

Instruction Set Architecture(ISA)

The abstract model of a computer that defines the set of basic operations a processor can perform.

hardware

Integrated Circuit(IC)

A set of electronic circuits on one small flat piece of semiconductor material, commonly called a 'chip'.

hardware

Integrated Services(IntServ)

A QoS architecture that reserves end-to-end network resources for specific traffic flows before data is sent.

network

Integration Testing

A level of software testing where individual units are combined and tested as a group.

dev

Interaction to Next Paint(INP)

A Core Web Vital that measures a page's overall responsiveness to user interactions throughout its entire lifecycle.

web

Interactive Application Security Testing (IAST)(IAST)

A security testing methodology that combines elements of SAST and DAST by using agents to monitor an application's internal execution during testing.

security

Interactive Visualization

A type of data visualization that allows users to manipulate and explore the data directly through the interface.

ai

Interconnect

The physical wiring that connects transistors and other components within an integrated circuit or between chiplets.

hardware

Internal Developer Portal(IDP)

A self-service interface that allows developers to discover and use the tools, services, and infrastructure provided by a platform engineering team.

dev

Internet Gateway(IGW)

A horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet.

cloud

Internet of Things Networking(IoT Networking)

The specialized networking technologies and protocols used to connect billions of physical devices to the internet and to each other.

network

Interrupt

A signal to the processor emitted by hardware or software indicating an event that needs immediate attention.

hardware

Interrupt Request(IRQ)

A signal sent to the CPU to temporarily stop a running program and allow a special piece of code (an ISR) to run instead.

hardware

Interrupt Service Routine(ISR)

A software routine that hardware invokes in response to an interrupt.

hardware

Intranet

A private network accessible only to an organization's staff, used for internal communication and collaboration.

network

Intrusion Detection System(IDS)

A device or software that monitors a network or systems for malicious activity.

security

Intrusion Prevention System(IPS)

A network security tool that monitors traffic for malicious activity and takes action to prevent it.

security

I/O Port

A specialized address used by the CPU to communicate with a specific hardware device.

hardware

I/O Wall

The performance bottleneck caused by the slow speed of input/output operations compared to the processor and memory.

hardware

IP Address(IP)

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

network

IPFIX(IPFIX)

An IETF standard protocol for exporting IP flow information from network devices.

network

IPFS(IPFS)

InterPlanetary File System; a peer-to-peer network for storing and sharing data in a distributed file system.

web

IPFS (Web)(IPFS)

The use of the InterPlanetary File System protocol within web browsers to store and access content in a decentralized, content-addressed manner.

web

IPv4

The fourth version of the Internet Protocol, using 32-bit addresses, which limits the total number of addresses to approximately 4.3 billion.

network

IPv6

The most recent version of the Internet Protocol, using 128-bit addresses to provide a vastly larger address space than IPv4.

network

IS-IS(IS-IS)

A link-state routing protocol used primarily by service providers to route traffic within large backbone networks.

network

ISO/IEC 27001

An international standard on how to manage information security, providing a framework for an Information Security Management System (ISMS).

security

Istio

An open-source service mesh that provides a uniform way to secure, connect, and monitor microservices.

cloud

ITIL

Information Technology Infrastructure Library (ITIL) is a set of detailed practices for IT service management (ITSM).

dev

ITX(ITX)

A family of small form factor motherboard specifications, most notably Mini-ITX.

hardware