Browse Definitions :
Definition

transparent

In computers, transparent means something a little different than its general meaning of having the quality of being easily seen through , coming closer to meaning invisible or undetectable . Computer programs and procedures that are said to be transparent are typically those that the user is - or could be - unaware of. Transparency is considered to be especially desirable in situations where users that are not particularly technically inclined would tend to be confused by seeing or having to interact directly with programming components. The domain name system  (DNS), for example, operates in a transparent manner, resolving authorized domain names into Internet Protocol (IP) addresses, all without the user's knowledge. Transparent is also used to refer to a change or upgrade of hardware or software that is undetectable in subsequent uses of the system.

A secondary meaning of transparent refers to complete predictability, as, for example, in a transparent computer system or program, output is entirely predictable from knowing the input.

This was last updated in June 2010

Continue Reading About transparent

Join the conversation

5 comments

Send me notifications when other members comment.

Please create a username to comment.

I always struggled to understand this term as explained in here transparent in dictionary is completely different. Thanks a bunch for sorting this out for once and all.
Cancel
I believe this is a complete misuse of the word "transparent". Software engineers have mangled this word for over 30 years. They mean to say "opaque" or something equivalent. There is no legitimate reason for this egregious misuse of English. It should be corrected in the journals. Can anyone provide the origins of this specific use of "transparent"?
Cancel
I hear you, post 471034. I've always been a little bothered by this. We're using the word exactly opposite of its standard meaning. On the other hand, I also "get it". A window is transparent; you "don't even know it's there", but it serves the purpose of blocking wind and rain, so we could say that transparency allows an object to fulfils its purpose without being noticeable, like the NSA.
Cancel
I feel the same way, post 475265. The computer tech usage of "transparency" does make sense, but it's absolutely irritating that it's effectively its own opposite.

Something I found amusing was that post 471034 used the phrase "egregious misuse" in it. "Egregious" meant "remarkably good" before its usage became ironic and it changed definition to its opposite.
Cancel
Thanks for this clarification. The way this word is used by software engineers has bothered me for a long time just like the other commenters here!
It's like an optical illusion... I get both sides of it now.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close