Browse Definitions :

Browse Definitions by Alphabet

TER - THI

  • terminal services - A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN).
  • terminate and stay resident - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • terminate and stay resident (TSR) - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • terminology management - Terminology management is the systematized collection of concepts and terms with the purpose of unifying and standardizing technical documentation.
  • terms of service (ToS) - Terms of service (ToS) is a type of document stating details about what a service provider is responsible for as well as user obligations that must be adhered to for continuation of the service.
  • ternary content-addressable memory (TCAM) - Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle, with the term “ternary” referring to its ability to store and query data using three different inputs: 0, 1 and X.
  • Terraform - Terraform is an open source infrastructure as code software tool that allows DevOps engineers to programmatically provision the physical resources an application requires to run.
  • Terrestrial Trunked Radio - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.
  • tesla - The tesla (symbolized T) is the standard unit of magnetic flux density.
  • tesla (T) - The tesla (symbolized T) is the standard unit of magnetic flux density.
  • Tesla Powerpack - Tesla Powerpack and Powerwall are, respectively, the company’s business and residential market rechargeable battery products, designed for large-scale energy storage for off-grid and supplemental power systems.
  • Tesla Powerwall - Powerwall, which is aimed at the residential market, is designed to store power generated by solar panels or wind turbines at peak time for use during power outages and out-of-peak time, including night.
  • tessellation - A tessellation is a design that uses repeating interlocking shapes without overlapping or gaps.
  • test case - A test case is a set of actions performed on a system to determine if it satisfies software requirements and functions correctly.
  • test driven development - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • test harness - In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.
  • test marketing - Test marketing is a marketing method that aims to explore consumer response to a product or marketing campaign by making it available on a limited basis before a wider release.
  • test-driven design - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • test-driven development - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • test-driven development (TDD) - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • testing - In general, testing is finding out how well something works.
  • Testing as a Service - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
  • testing your bandwidth - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • tethering - Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.
  • TETRA - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.
  • TETRA (Terrestrial Trunked Radio) - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.
  • texel - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.
  • texel (texture element) - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.
  • text - In information technology, text is a human-readable sequence of characters and the words they form that can be encoded into computer-readable formats such as ASCII.
  • text editor - A text editor is a computer program that lets a user enter, change, store, and usually print text (characters and numbers, each encoded by the computer and its input and output devices, arranged to have meaning to users or to other programs).
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • text messaging - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • text on nine keys - Text on nine keys (T9) is a system that lets fixed and mobile phone users send text messages by pressing a number key for each letter in the message -- effectively making a keyboard out of the nine numeric phone entry keys.
  • text online - Fortunately, there is a way to find out whether a given book exists online as viewable text:The On-line Books Page (http://digital.
  • text reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • text tagging - Text tagging is the process of manually or automatically adding tags or annotation to various components of unstructured data as one step in the process of preparing such data for analysis.
  • text telephone - A Telecommunications Display Device (TDD), also known as a text telephone, is a telephone equipped with a keyboard and a display for people who are hearing- or speech-impaired.
  • text to speech - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • text-to-speech - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • text-to-speech (TTS) - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • texting - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • Texting and Twitter Cheat Sheets - We've gathered resources to help you communicate effectively whether you`re texting, instant messaging or tweeting.
  • texture element - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.
  • texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.
  • TFT - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • TFT - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • TFTP - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • TGT - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • the - The Singularity is the hypothetical future creation of superintelligent machines.
  • The 10 Most Misunderstood Terms in IT - Here are the ten terms that we believe are currently the "most misunderstood" by those who work in information technology.
  • The Computer Fraud and Abuse Act - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • The Green Grid - The Green Grid is a nonprofit consortium whose mission is to become the global authority on resource efficiency in information technology and data centers.
  • The Green Grid Performance Indicator (PI) - The Green Grid Performance Indicator (PI) is a set of metrics designed to help information technology (IT) teams assess current and future data center cooling performance.
  • The history of DevOps: A visual timeline - This infographic shows the evolution of DevOps over time.
  • The Hitchhiker's Guide to the Galaxy - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • the Indian Computer Emergency Response Team - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • The Open Group - The Open Group is a software standards organization that is sponsored by a number of major software vendors.
  • The Open Group Architecture Framework - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • The Open Group Architecture Framework (TOGAF) - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • the Open19 project - The Open19 project is aimed at standardizing servers, storage and networking components into a common set of form factors for any Electronic Industries Association (EIA) 19-inch data center rack.
  • The Real Time Operating System Nucleus - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • The Real-Time Operating System Nucleus - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • The Remote Insight Board -- Lights Out Edition - The Remote Insight Board -- Lights Out Edition (RIBLOE) is a Peripheral Component Interconnect (PCI) card intended for the remote management of Compaq servers.
  • The role of IT4IT in cloud service management (CSM) - In his book 'Cloud Service Management and Governance -- Smart Service Management in Cloud Era,' author Enamul Haque explains how IT4IT can help the reader create a plan for CSM and ensure managers understand the value each cloud service provides their organization.
  • The Three Ways (The Phoenix Project) - The Three Ways is a set of business principles that encourage organizations to value a corporate culture in which feedback loops are short, everyone understands how different parts of the business interrelate and employees are encouraged to continuously learn.
  • The Vault of Tech Terror (quizzes) - Tech quizzes with a Halloween theme.
  • Theory of Constraints - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.
  • Theory of Constraints (TOC) - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.
  • theory of everything - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • Theory of Everything - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.
  • theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.
  • thermal compound - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal grease - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal grease (thermal paste or thermal compound) - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal imaging - Thermal imaging is a method of improving visibility of objects in a dark environment by detecting the objects' infrared radiation and creating an image based on that information.
  • thermal ink transfer printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.
  • thermal paste - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.
  • thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.
  • thermography - Thermography is a printing or imaging method.
  • thick client - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thick provision eager zeroed - Thick provision eager zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provision lazy zeroed - Thick provision lazy zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provisioning - Thick provisioning pre-allocates storage capacity on a disk rather than on an as-needed basis.
  • Thicknet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • Thickwire - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • thin client - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
  • thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
  • thin film transistor - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • thin film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thin hypervisor - A thin hypervisor is a stripped down hypervisor that allows multiple operating systems to run on one host.
  • thin provisioning - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.
  • thin provisioning (TP) - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.
  • thin server - In the computer industry, a thin server is a PC that contains just enough hardware and software to support a particular function that users can share in a network, such as access to files on a storage device, access to CD-ROM drives, printing, or Internet access.
  • thin-film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • ThinApp AppLink - VMware ThinApp AppLink is a packaging technology that makes one virtualized application dependent on another, so they can work together in one sandbox.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close