Browse Definitions :

Browse Definitions by Alphabet

THI - TOL

  • third-party relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • thought leader (thought leadership) - A thought leader is a person who or organization that is widely recognized as an expert in a given field and whose opinions are in high demand.
  • thousands of lines of code - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • thrashing - Thrashing is computer activity that makes little or no progress, usually because memory or other resources have become exhausted or too limited to perform needed operations.
  • thread - On the Internet in Usenet newsgroups and similar forums, a thread is a sequence of responses to an initial message posting.
  • THREAD protocol - The THREAD protocol is a home automation device communication method owned by Nest, a subsidiary of Google.
  • threat actor - A threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.
  • threat ignorance - Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack.
  • threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is information collected from various sources about current or potential attacks that threaten an organization.
  • threat intelligence feed (TI feed) - A threat intelligence feed (TI feed) is an ongoing stream of data related to potential or current threats to an organization's security.
  • threat intelligence service (TI service) - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.
  • threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.
  • threat modeling - Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent or mitigate the effects of threats to the system.
  • three dimensions - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • three finger salute - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • Three Laws of Robotics (Isaac Asimov) - Science-fiction author Isaac Asimov is often given credit for being the first person to use the term robotics in a short story composed in the 1940s.
  • three-dimensional - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • three-factor authentication (3FA) - Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors – typically, the knowledge, possession and inherence categories.
  • three-phase commit (3PC) - Three-phase commit (3PC) is a protocol that consists of a distributed algorithm used to ensure all transactions in a system are agreed upon and are committed to.
  • throughput - Throughput is a term used in information technology that indicates how many units of information can be processed in a set amount of time.
  • thumb drive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • thumbdrive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • thumbnail - Thumbnail is a term used by graphic designers and photographers for a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Thunder (Salesforce Thunder) - Salesforce Thunder is a big data pipeline and rules engine designed to capture, filter and respond to events in real time; the platform was created to operate in streaming scenarios such as machine-to-machine (M2M) and Internet of Things (IoT) environments.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).
  • THz - The terahertz, abbreviated THz, is a unit of electromagnetic (EM) wave frequency equal to one trillion hertz (1012 Hz).
  • TIA - Total Information Awareness (TIA) is the name of a massive U.
  • TIC - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • ticket-granting ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.
  • tier - In general, a tier (pronounced TEE-er ; from the medieval French tire meaning rank, as in a line of soldiers) is a row or layer in a series of similarly arranged objects.
  • Tier 0 - Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • Tier 1 storage - Tier 1 storage is a reference to the higher performing systems in a tiered storage environment.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • tiered storage - Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage costs and improve the performance and availability of mission-critical applications.
  • TIFF - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • tilda - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • time box - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • time division multiple access - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time division multiplexing - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time division synchronous code division multiple access - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.
  • time management - Time management is the coordination of people's tasks and activities to maximize the effectiveness of their efforts.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series database (TSDB) - A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • time shifting - Timeshifting is the process of recording and storing data for later viewing, listening, or reading.
  • time stamp - A timestamp is the current time of an event that is recorded by a computer.
  • time to live - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • time to value (TtV) - Time to value (TtV) is a business term that describes the period of time between a request for a specific value and the initial delivery of the value requested.
  • time value of money - Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.
  • time-based one-time password (TOTP) - A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems.
  • time-box - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • time-division multiplexing - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time-to-live - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timebox - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • timeboxing - A timebox is a strictly-enforced limit on how long a given task or project can take: There is no allowance made for the possibility of extension.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • times interest earned (TIE) - Times interest earned (TIE) is a metric used to measure a company’s manageable debt limits; by its ability to pay the monthly interest on it’s debts.
  • timeshifting - Timeshifting is the process of recording and storing data for later viewing, listening, or reading.
  • timestamp - A timestamp is the current time of an event that is recorded by a computer.
  • timing attack - A timing attack looks at how long it takes a system to do something and allows the attacker, through statistical analysis, to learn enough about the system to find the decryption key needed to gain access to it.
  • TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
  • TIN number - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
  • tipping point - The tipping point is the critical point in an evolving situation that leads to a new and irreversible development.
  • Tizen - Tizen is an open source mobile operating system built on the Linux kernel and offered in versions for multiple platforms, including smartphones, tablets, wearable computers, netbooks, digital televisions and in-vehicle systems.
  • Tk - Tool Kit (Tk) is a companion program to Tool Command Language (Tcl) for creating graphical user interfaces.
  • TKIP - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
  • TLD - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.
  • TLS - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • TLS VPN - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • TM - A triplecast (TM) is the simultaneous broadcast of a program on television, radio, and an Internet site or channel.
  • TMN - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.
  • TMN (Telecommunications Management Network) - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.
  • TMQL - Topic Map Query Language (TMQL) is an XML-based extension of Structured Query Language (SQL), a query language developed for use in meeting the specialized data access requirements of Topic Maps (TMs).
  • TMS - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • TN display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • TNIC - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.
  • TO-DDI - For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.
  • TOC - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.
  • TOE - The TCP/IP offload engine (TOE for short) is a technology that is gaining popularity in high-speed Ethernet systems for the purpose of optimizing throughput.
  • TOE - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • TOGAF - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • token ring - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
  • tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
  • TOLED - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close