Browse Definitions :

Browse Definitions by Alphabet

TEX - TOT

  • text - In information technology, text is a human-readable sequence of characters and the words they form that can be encoded into computer-readable formats such as ASCII.
  • text editor - A text editor is a computer program that lets a user enter, change, store, and usually print text (characters and numbers, each encoded by the computer and its input and output devices, arranged to have meaning to users or to other programs).
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • text tagging - Text tagging is the process of manually or automatically adding tags or annotation to various components of unstructured data as one step in the process of preparing such data for analysis.
  • texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.
  • The Green Grid Performance Indicator (PI) - The Green Grid Performance Indicator (PI) is a set of metrics designed to help information technology (IT) teams assess current and future data center cooling performance.
  • The history of DevOps: A visual timeline - This infographic shows the evolution of DevOps over time.
  • The Open Group Architecture Framework (TOGAF) - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • the Open19 project - The Open19 project is aimed at standardizing servers, storage and networking components into a common set of form factors for any Electronic Industries Association (EIA) 19-inch data center rack.
  • The role of IT4IT in cloud service management (CSM) - In his book 'Cloud Service Management and Governance -- Smart Service Management in Cloud Era,' author Enamul Haque explains how IT4IT can help the reader create a plan for CSM and ensure managers understand the value each cloud service provides their organization.
  • The Three Ways (The Phoenix Project) - The Three Ways is a set of business principles that encourage organizations to value a corporate culture in which feedback loops are short, everyone understands how different parts of the business interrelate and employees are encouraged to continuously learn.
  • Theory of Constraints (TOC) - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.
  • theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.
  • thermal grease (thermal paste or thermal compound) - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal imaging - Thermal imaging is a method of improving visibility of objects in a dark environment by detecting the objects' infrared radiation and creating an image based on that information.
  • thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.
  • thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thick provision eager zeroed - Thick provision eager zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provision lazy zeroed - Thick provision lazy zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provisioning - Thick provisioning pre-allocates storage capacity on a disk rather than on an as-needed basis.
  • thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources.
  • thin provisioning (TP) - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.
  • thin server - In the computer industry, a thin server is a PC that contains just enough hardware and software to support a particular function that users can share in a network, such as access to files on a storage device, access to CD-ROM drives, printing, or Internet access.
  • thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • Thing hacking - Thing hacking is an attack that exploits a vulnerability in a connected non-computing device – a Thing, in the Internet of Things -- to gain control of the device or access to a network it connects to.
  • thingbot - A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet.
  • think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.
  • Thinnet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • third party - A third party is an entity that is involved in some way in an interaction that is primarily between two other entities.
  • third-party cookie - A third-party cookie is a cookie that is placed on a user's hard disk by a website from a domain other than the one a user is visiting.
  • thought leader (thought leadership) - A thought leader is a person who or organization that is widely recognized as an expert in a given field and whose opinions are in high demand.
  • thrashing - Thrashing is computer activity that makes little or no progress, usually because memory or other resources have become exhausted or too limited to perform needed operations.
  • thread - On the Internet in Usenet newsgroups and similar forums, a thread is a sequence of responses to an initial message posting.
  • threat actor - A threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.
  • threat ignorance - Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack.
  • threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is information collected from various sources about current or potential attacks that threaten an organization.
  • threat intelligence feed (TI feed) - A threat intelligence feed (TI feed) is an ongoing stream of data related to potential or current threats to an organization's security.
  • threat intelligence service (TI service) - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.
  • threat modeling - Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent or mitigate the effects of threats to the system.
  • three-factor authentication (3FA) - Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors – typically, the knowledge, possession and inherence categories.
  • three-phase commit (3PC) - Three-phase commit (3PC) is a protocol that consists of a distributed algorithm used to ensure all transactions in a system are agreed upon and are committed to.
  • throughput - Throughput is a term used in information technology that indicates how many units of information can be processed in a set amount of time.
  • thumbnail - Thumbnail is a term used by graphic designers and photographers for a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Thunder (Salesforce Thunder) - Salesforce Thunder is a big data pipeline and rules engine designed to capture, filter and respond to events in real time; the platform was created to operate in streaming scenarios such as machine-to-machine (M2M) and Internet of Things (IoT) environments.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).
  • tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.
  • tier - In general, a tier (pronounced TEE-er ; from the medieval French tire meaning rank, as in a line of soldiers) is a row or layer in a series of similarly arranged objects.
  • Tier 0 - Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • Tier 1 storage - Tier 1 storage is a reference to the higher performing systems in a tiered storage environment.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • tiered storage - Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage costs and improve the performance and availability of mission-critical applications.
  • TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time management - Time management is the coordination of people's tasks and activities to maximize the effectiveness of their efforts.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series database (TSDB) - A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • time to value (TtV) - Time to value (TtV) is a business term that describes the period of time between a request for a specific value and the initial delivery of the value requested.
  • time-based one-time password (TOTP) - A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timebox - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • timeboxing - A timebox is a strictly-enforced limit on how long a given task or project can take: There is no allowance made for the possibility of extension.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • times interest earned (TIE) - Times interest earned (TIE) is a metric used to measure a company’s manageable debt limits; by its ability to pay the monthly interest on it’s debts.
  • timeshifting - Timeshifting is the process of recording and storing data for later viewing, listening, or reading.
  • timestamp - A timestamp is the current time of an event that a computer records.
  • timing attack - A timing attack looks at how long it takes a system to do something and allows the attacker, through statistical analysis, to learn enough about the system to find the decryption key needed to gain access to it.
  • TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
  • tipping point - The tipping point is the critical point in an evolving situation that leads to a new and irreversible development.
  • Tizen - Tizen is an open source mobile operating system built on the Linux kernel and offered in versions for multiple platforms, including smartphones, tablets, wearable computers, netbooks, digital televisions and in-vehicle systems.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
  • TMN (Telecommunications Management Network) - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • token ring - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
  • tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
  • TOLED (transparent organic light-emitting device) - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • Tomcat - Tomcat is an application server from the Apache Software Foundation that executes Java servlets and renders Web pages that include Java Server Page coding.
  • tooling - Tooling, also known as machine tooling, is the process of acquiring the manufacturing components and machines needed for production.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Top 9 Highest IT salaries in 2021 - Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.
  • Top searches of 2008 - What were people searching the WhatIs.
  • top-of-rack switching - Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
  • toroid - A toroid is a coil of insulated or enameled wire wound on a donut-shaped form made of powdered iron.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
  • ToS;DR - ToS;DR is a user rights initiative that breaks down good and bad points about the terms of service (ToS) and privacy policies for prominent websites and gives them an overall rating from Class A (very good) to Class E (very bad).
  • TOSCA (Topology and Orchestration Specification for Cloud Applications) - The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an open-source language used to describe the relationships and dependencies between services and applications that reside on a cloud computing platform.
  • total benefit of ownership (TBO) - Total benefit of ownership is the sum of measurable and intangible returns that a company receives from investing in assets and/or personnel.
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close