MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
  • ICT Design Fundamentals

    ICT Design Fundamentals by BICSI

  • Identity and Access Management

    Identity and access management (IAM) is the security discipline that facilitates the right individuals to access the right resources at the right times for the right reasons. IAM technology can be used to initiate, capture, record and manage user identities and their related access permissions in an automated fashion. This ensures that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized and audited. Enterprises need to manage access to information and applications scattered across internal and external application systems. Moreover, they must provide this access for a growing number of identities, both inside and outside the organization, without compromising security or exposing sensitive information.

    IT Blogs (6) IT Courses & Reviews (9)
  • Identity as a Service (IDaaS)

    An authentication infrastructure that is built, hosted and managed by a third-party service provider. IDaaS can be thought of as single sign-on (SSO) for the cloud.  

    IT Blogs (2)
  • Identity Chaos (Password Chaos)

    A situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or devices which may be subject to different rules, different security levels, and expire on different dates.

  • Identity Management

    In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.

    IT Blogs (4) IT Courses & Reviews (15)
  • Identity Theft

    Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.

    IT Blogs (6) IT Reviews (1) IT Courses & Reviews (9)
  • IEEE

    The world's largest technical professional society promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members.

    IT Blogs (1)
  • IEEE 1284 parallel interface standard

    The prevalent standard for connecting a computer to a printer or certain other devices over a parallel (eight bits of data at a time) physical and electrical interface . The physical connection is similar to the older Centronics interface.

  • IEEE 802 Wireless Standards

    The IEEE 802 Standard comprises a family of networking standards that cover the physical layer specifications of technologies from Ethernet to wireless. IEEE 802 is subdivided into 22 parts that cover the physical and data-link aspects of networking.

    IT Blogs (2)
  • IEEE 802.16

    A group of broadband wireless communications standards for metropolitan area networks (MANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). 

  • IFC (IASA Foundation Certification)

    IASA Foundation Certification (IFC) by IASA

  • IFrame (Inline Frame)

    A HTML document embedded inside another HTML document on a website. The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. 

    IT Challenges (1)
  • IIW

    IBM Insurance Information Warehouse (IIW) is a development blueprint that enables insurance companies to build Data Warehouse solutions to suit to their specific needs.

  • IM bot

    A chatterbot program that uses instant messaging (IM) as an application interface. IM users can add the name of the IM bot to their buddy list the same way they add co-workers, family, and friends. 

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to