Browse Definitions :
Definition

TrueType

Created at Apple Computer, TrueType was designed to fill the need for an optimized, scalable font format. The format uses hinting , a technique that preserves a font's design, even at a small scale or on a display with low resolution. It was initially developed in response to the technical limitations of Adobe's Postscript and Type 1 font formats.

TrueType was first introduced in the Macintosh System 7 operating system in 1990. A year later, Apple licensed TrueType to Microsoft, and it was introduced in their Windows 3.1 operating system. After making some performance improvements to the format, they released version 1.5 in Windows NT 3.1, and have continued to update the format.

In order to view and print TrueType fonts on a computer, two components are necessary: the actual TrueType font file (with the extension TTF) and the TrueType raster graphics . The rasterizer is built into Windows and Mac operating systems.

If you use TrueType fonts on a Web page or in Word document, it is possible to embed them into the file, so that your fonts will still be viewable by people who do not have that font installed on their machine. Also keep in mind that the Macintosh and Windows versions of TrueType fonts are not compatible. When downloading TrueType fonts from the Internet (such as from a free fonts Web site), you must select the Mac or PC version. TrueType Font converters are available if a TrueType font is only available for one platform.

Microsoft's most recent font development is called OpenType. This font format ensures that fonts are compatible across the Windows and Apple Macintosh platforms and encompasses Adobe's Type 1 and PostScript technologies.

This was last updated in April 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close