Browse Definitions :

Browse Definitions by Alphabet

  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • time to value (TtV) - Time to value (TtV) is a business term that describes the period of time between a request for a specific value and the initial delivery of the value requested.
  • time-based one-time password - A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timebox - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • timeline - A timeline is a visual representation of a chronological sequence of events along a drawn line that helps a viewer understand time relationships.
  • timestamp - A timestamp is the current time of an event that a computer records.
  • timing attack - A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system.
  • TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
  • TL;DR (too long; didn't read) - TL;DR is an abbreviation for "too long; didn't read.
  • TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • token ring - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
  • tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Top 9 Highest IT salaries in 2021 - Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.
  • Top searches of 2008 - What were people searching the WhatIs.
  • top-of-rack switching - Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other switches located within the same or adjacent rack connect to an in-rack network switch.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
  • toroid - A toroid is a coil of insulated or enameled wire wound on a donut-shaped form made of powdered iron.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
  • TOSCA (Topology and Orchestration Specification for Cloud Applications) - The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an open source language used to describe the relationships and dependencies between services and applications that reside on a cloud computing platform.
  • Total Quality Management (TQM) - Total Quality Management (TQM) is a management framework based on the belief that an organization can build long-term success by having all its members -- from low-level workers to its highest-ranking executives -- focus on improving quality and, thus, delivering customer satisfaction.
  • total risk - Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.
  • touch screen - A touch screen is an electronic display screen that is also an input device.
  • Toyota Way - The Toyota Way is a comprehensive expression of the company's management philosophy, which is based on the two foundational pillars of Continuous Improvement, also known as kaizen, and Respect for People.
  • traceability - Traceability, in supply chain traceability, is the ability to identify, track and trace elements of a product or substance as it moves along the supply chain from raw goods to finished products.
  • traceroute - Traceroute is a command-line utility that returns information about the communication route between two nodes on an Internet Protocol (IP) network.
  • trackball - A trackball is a computer cursor control device used in many laptop computer keyboards and older versions of computer mice.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in Lenovo ThinkPad notebook computers.
  • traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • transaction - In computing, a transaction is a set of related tasks treated as a single action.
  • transactional data - In computing, transactional data is the information collected from transactions.
  • transactional leadership - Transactional leadership, also known as managerial leadership, is a leadership style where leaders rely on rewards and punishments to achieve optimal job performance from their subordinates.
  • transactional marketing - Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.
  • transceiver - A transceiver is a combination transmitter/receiver in a single package.
  • transconductance - Transconductance is an expression of the performance of a bipolar transistoror field-effect transistor (FET).
  • transcription error - A transcription error is a type of data entry error commonly made by human operators or by optical character recognition (OCR) programs.
  • transducer - A transducer is an electronic device that converts energy from one form to another.
  • transfer learning - Transfer learning is a machine learning method where a model already developed for a task is reused in another task.
  • transformational leadership - Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.
  • transformative technology - Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.
  • transformer model - A transformer model is a neural network architecture that can automatically transform one type of input into another type of output.
  • Transistor - A transistor is a miniature semiconductor that regulates or controls current or voltage flow.
  • transistor-to-transistor logic (TTL) - Transistor-to-transistor logic -- also known as simply transistor-transistor logic or TTL -- is a family of digital logic design built from a family of bipolar junction transistors that act on direct-current pulses.
  • transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.
  • translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a type of memory cache that stores recent translations of virtual memory to physical addresses to enable faster retrieval.
  • Transmission Control Protocol (TCP) - Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
  • transparency - Transparency is the quality of being easily seen through, while transparency in a business or governance context refers to being open and honest.
  • transponder - A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.
  • transport layer - The transport layer is Layer 4 of the Open Systems Interconnection (OSI) communications model.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • tree structure - A tree data structure is an algorithm for placing and locating files (called records or keys) in a database.
  • treemap - A treemap is a visual method for displaying hierarchical data that uses nested rectangles to represent the branches of a tree diagram.
  • triage in IT - Triage is a term referring to the assignment of priority levels to tasks or individuals to determine the most effective order in which to deal with them.
  • TrickBot malware - TrickBot is sophisticated modular malware that started as a banking Trojan but has evolved to support many different types of attacks, including ransomware.
  • triple bottom line (TBL) - The triple bottom line (TBL) is a sustainability-based accounting framework that includes social, environmental and financial factors as bottom-line categories.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • triple extortion ransomware - Triple extortion ransomware is a type of ransomware attack where a cybercriminal extorts their victim multiple times, namely by encrypting data, exfiltrating data to expose and threatening a third attack vector.
  • Trojan horse - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • troubleshooting - Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncation error - A truncation error is the difference between an actual and a truncated, or cut-off, value.
  • trunk (trunking) - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  • trunk-based development - In software development, a trunk is the base code into which all subsequent code is merged.
  • trusted computing base (TCB) - A trusted computing base (TCB) is everything in a computing system that provides a secure environment for operations.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system's main operating system (OS).
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
  • truth table - A truth table is a breakdown of all the possible truth values returned by a logical expression.
  • Tumblr - Tumblr is a free microblogging site.
  • tunneling or port forwarding - Tunneling or port forwarding is the transmission of data intended for use only within a private -- usually corporate -- network through a public network in such a way that the public network's routing nodes are unaware that the transmission is part of a private network.
  • tuple - A tuple, pronounced TUH-pul, is an ordered and finite list of elements in various fields of interest, including computing.
  • turbine - A turbine is a machine that plays a key role in transforming fluid or air energy into usable work or electricity.
  • Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
  • tweet - A tweet is a post on Twitter.
  • twisted pair - Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.
  • Twitch - Twitch (Twitch.
  • Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
  • Twitterbot - A Twitterbot is a software program designed to automatically follow Twitter users, like and retweet posts.
  • two pizza rule - The two pizza rule is a guideline for limiting the number of attendees at a meeting.
  • two-factor authentication (2FA) - Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.
  • two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.
  • two-step verification - Two-step verification is a process that involves two authentication steps performed one after the other to verify that someone or something requesting access is who or what they say they are.
  • two-tier ERP - Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.
  • Twofish - Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.
  • Tyk - Tyk is an open source application program interface (API) gateway management tool.
  • Type 2 hypervisor (hosted hypervisor) - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.
Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close