Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
i
- In-place Encryption Description: In-place encryption is a feature that allows data to be encrypted directly in storage without the need to create an additional(...) Read more
- In-line Policy Description: An inline policy in AWS IAM (Identity and Access Management) is a set of permissions that is applied directly to an IAM role or(...) Read more
- Input Parameter Description: An input parameter in the context of cloud formation templates is a variable passed to a template during its execution. These(...) Read more
- Infrastructure Stack Description: The Infrastructure Stack refers to a set of infrastructure resources that work together to support applications and services in a(...) Read more
- Instance Segmentation Description: Instance segmentation is a computer vision task that involves detecting and delineating objects in an image, assigning a unique(...) Read more
- Instance Optimization Description: Instance optimization in the cloud refers to the process of improving the performance and efficiency of virtual instances running(...) Read more
- Instance Scaling Policies Description: Scaling policies are a set of rules and guidelines that determine how and when computational resources in a cloud environment(...) Read more
- IP Set Description: A set of IP addresses is a group of addresses that can be used for various purposes, such as filtering traffic, managing access to(...) Read more
- Inbound Rule Description: The inbound rule in network management is an essential component that allows controlling incoming traffic to a specific resource(...) Read more
- IP Routing Description: IP routing is the process of selecting a path for traffic in a network, allowing data to be transmitted from a source to a(...) Read more
- IP Blacklisting Description: The IP blacklist is a cybersecurity practice that involves blocking specific IP addresses to prevent malicious traffic to a server(...) Read more
- Inter-region VPC Peering Description: Inter-region VPC peering is a feature that allows the connection between two Virtual Private Clouds (VPCs) located in different(...) Read more
- Identity and Access Management (IAM) Description: Identity and Access Management (IAM) is a framework of policies and technologies that ensures the right individuals access the(...) Read more
- Instance Limit Description: The instance limit in cloud computing services refers to the maximum number of instances that can be created in a specific region(...) Read more
- Inter-Region Latency Description: Inter-Region Latency refers to the time it takes for data to travel between different geographical regions within a cloud computing(...) Read more