Browse Definitions :

Browse Definitions by Alphabet

'TI - TCP

  • 'Tis (or t'is?) the season: A grammar quiz - There are a surprising number of pitfalls to holiday writing.
  • T - Temperature (symbolized T) is an expression of heat energy.
  • T - The tesla (symbolized T) is the standard unit of magnetic flux density.
  • T interface - In Integrated Services Digital Network (ISDN) service, a T interface is the electrical interface between a network terminating unit 1 (NT1) and a network terminating unit 2 (NT2) device, which typically is a private branch exchange (PBE).
  • T Rex - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.
  • T SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • T-carrier system - To see the relationship between T-carrier, E-carrier, and DS0 multiples, see digital signal X.
  • T-Rex - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.
  • T-shaped employee - A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across disciplines.
  • T-SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • T-SQL (Transact-SQL) - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • T.38 fax over IP (FoIP protocol) - T.38 is a protocol for sending faxes over a voice over IP (VoIP) network or the Internet in real time.
  • T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.
  • T9 - Text on nine keys (T9) is a system that lets fixed and mobile phone users send text messages by pressing a number key for each letter in the message -- effectively making a keyboard out of the nine numeric phone entry keys.
  • TA - A terminal adapter (TA) is a hardware interface between a computer and an Integrated Services Digital Network line.
  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • tabbed document interface - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • table - In computer programming, a table is a data structure used to organize information, just as it is on paper.
  • Table of Physical Constants - Quick look-up chart.
  • Table of Physical Units - Cheat sheet quick look-up for the table of physical units.
  • table space - In a database management system (DBMS), a tablespace is a logical group of data files in a database.
  • Tableau - Tableau is a software company that offers collaborative data visualization services for organizations working with business information analytics.
  • tablespace - In a database management system (DBMS), a tablespace is a logical group of data files in a database.
  • tablet - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • tablet computer - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • tabletop exercise (TTX) - A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.
  • TACACS - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
  • TACACS (Terminal Access Controller Access Control System) - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
  • TACACS+ - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
  • Taco Bell programming - Taco Bell programming is an approach to software development that places value on consistently using the same development tools and languages when creating solutions for new problems.
  • tag - A tag is a generic term for a language element descriptor.
  • Tag Image File Format - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • tag management system - A tag management system (TMS) is a software solution used to manage the tags used in digital marketing.
  • tag-jacking - Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • tagging - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • tags - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • Tahoe-LAFS (Tahoe Least-Authority File System) - Tahoe-LAFS (Tahoe Least-Authority File System) is a distributed storage system that offers provider-independent security for local or cloud storage.
  • tailgating (piggybacking) - Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.
  • TailsOS - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session.
  • take off - Take off, sometimes spelled as "take-off" or "takeoff," is a part of the cost estimating process in the construction industry.
  • take-down request - A take-down request, also called a notice and take down request, is a procedure for asking an Internet Service Provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.
  • talent acquisition - Talent acquisition refers to the process employers use for recruiting, tracking and interviewing job candidates, and onboarding and training new employees.
  • talent activation - Talent activation is a human resources strategy for improving team leadership and workgroup collaboration that involves using surveys and questionnaires to solicit employee feedback on a regular basis.
  • talent management software (TM software) - Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage.
  • talent network - A talent network is potentially anything that connects people of similar professional skills.
  • talent pipeline - A talent pipeline is a pool of candidates who are ready to fill a position.
  • talent pool - A talent pool is a database of potential job candidates.
  • Taleo - Taleo is a cloud-based talent management software vendor that was acquired by Oracle in February 2012.
  • talk time - In customer relationship management (CRM), talk time is the amount of time a call center agent spends with a caller during a transaction.
  • talkback - A talkback is a microphone-and-receiver system installed in a recording/mixing console for communication between people in the control room and performers in the recording studio.
  • talker - On the Internet, especially in the United Kingdom, a talker is a Web site that hosts online chatting or conversations entered at the keyboard.
  • talking translator - A talking translator is a program that translates words and phrases from one language to another language and delivers the translation to the user as audio information.
  • talking Trojan - A talking Trojan is a Trojan horse program that mocks the user of an infected PC with a repeating audio message while it deletes the entire contents of a hard drive.
  • TAM SAM SOM - TAM SAM SOM is a set of acronyms used to quantify the business opportunity for a brand in a given market.
  • Tamagotchi - A Tamagotchi (pronounced "tom-ah-GOT-chee") is a relatively inexpensive toy containing a small liquid crystal display display, a few touch-sensitive user controls, and a program in which the image of a small creature is visible.
  • TAN (transaction authentication number) - A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password.
  • tap - On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.
  • Tape ARchive - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.
  • tape backup - Tape can help fix an unstructured data backup issue and is a good archiving medium.
  • tape drive - A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes.
  • tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • tape shoe-shining or back-hitching - Tape shoe-shining (also known as tape back-hitching) refers to the back and forth motion a tape drive makes when the data stream to the drive is interrupted.
  • TAPI - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • TAPI - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • TAPI (Telephony Application Program Interface) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.
  • tar - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.
  • tar (Tape ARchive) - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.
  • tar archive - Tarball is a jargon term for a tar archive - a group of files collected together as one.
  • tarball - Tarball is a jargon term for a tar archive - a group of files collected together as one.
  • tarball (tar archive) - Tarball is a jargon term for a tar archive - a group of files collected together as one.
  • tarchitecture - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.
  • target function - A target function, in machine learning, is a method for solving a problem that an AI algorithm parses its training data to find.
  • targeted ad (targeted advertising) - A targeted ad, in online marketing, is an advertisement that is served to a specific audience, which could be a particular demographic, a group or an individual.
  • targeted attack - A targeted attack is one that seeks to breach the security measures of a specific individual or organization.
  • tarpitting - Tarpitting is the practice of slowing the transmission of e-mail messages sent in bulk, as a means of thwarting spammers.
  • task - In computer programming, a task is a basic unit of programming that an operating system controls.
  • task bar - In the graphical user interface (GUI) for a computer operating system or application, a taskbar is a visual device on the desktop that typically shows the user which applications (tasks) are currently active and running.
  • taskbar - In the graphical user interface (GUI) for a computer operating system or application, a taskbar is a visual device on the desktop that typically shows the user which applications (tasks) are currently active and running.
  • Tata Consultancy Services (TCS) - Tata Consultancy Services (TCS) is India's top software and services exporter.
  • taxonomy - Taxonomy is the science of classification according to a predetermined system, with the resulting catalog being used to provide a conceptual framework for discussion or analysis.
  • taxpayer Identification number - A taxpayer Identification number (TIN) is an employer identification number assigned by the Internal Revenue Service (IRS) when registering a company to do business in the United States.
  • TB - A Terabyte (TB) is a measure of computer storage capacity that is approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a trillion bytes.
  • TCB - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • TCG - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • Tcl - Tool Command Language (Tcl) is an interpreted script language developed by Dr.
  • Tcl - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).
  • Tcl Tk - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).
  • Tcl/Tk - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).
  • Tcl/Tk (Tool Command Language) - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).
  • TCO - Total cost of ownership is a calculation to assess direct and indirect expenses and benefits related to the purchase of a product or infrastructure component.
  • TCO (total cost of ownership) - Total cost of ownership is a calculation to assess direct and indirect expenses and benefits related to the purchase of a product or infrastructure component.
  • TCP - Definition: Learn what the Transmission Control Protocol is and the role it plays in the TCP/IP protocol suite.
  • TCP (Transmission Control Protocol) - Definition: Learn what the Transmission Control Protocol is and the role it plays in the TCP/IP protocol suite.
  • TCP IP - TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.
  • TCP offload engine - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.
  • TCP port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • TCP session hijacking - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close