Browse Definitions :

Browse Definitions by Alphabet

THE - TIM

  • theory of everything - Superstring theory - known less formally as "string theory" - is sometimes called the Theory of Everything (TOE), because it is a unifying physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • Theory of Everything - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.
  • theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.
  • thermal compound - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal grease - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal grease (thermal paste or thermal compound) - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal imaging - Thermal imaging is a method of improving visibility of objects in a dark environment by detecting the objects' infrared radiation and creating an image based on that information.
  • thermal ink transfer printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.
  • thermal paste - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thermal printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.
  • thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.
  • thermoelectric cooling - Thermoelectric cooling is a way to remove thermal energy from a medium, device or component by applying a voltage of constant polarity to a junction between dissimilar electrical conductors or semiconductors.
  • thermographic printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.
  • thermography - Thermography is a printing or imaging method.
  • thick client - A fat client (sometimes called a thick client) is a networked computer with most resources installed locally, rather than distributed over a network as is the case with a thin client.
  • thick provision eager zeroed - Thick provision eager zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provision lazy zeroed - Thick provision lazy zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.
  • thick provisioning - Thick provisioning pre-allocates storage capacity on a disk rather than on an as-needed basis.
  • Thicknet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • Thickwire - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • thin client - A thin client, sometimes called a lean client, is a low-cost, centrally-managed computer that relies heavily on a server for its computational role.
  • thin client (lean client) - A thin client, sometimes called a lean client, is a low-cost, centrally-managed computer that relies heavily on a server for its computational role.
  • thin film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thin film transistor - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.
  • thin hypervisor - A thin hypervisor is a stripped down hypervisor that allows multiple operating systems to run on one host.
  • thin provisioning - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.
  • thin provisioning (TP) - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.
  • thin server - In the computer industry, a thin server is a PC that contains just enough hardware and software to support a particular function that users can share in a network, such as access to files on a storage device, access to CD-ROM drives, printing, or Internet access.
  • thin-film disk - A thin-film disk is a hard disk storage medium with a very thin coating of a metallic alloy or glass instead of the usual carbon-based material found on other types of hard disks.
  • thin-film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • ThinApp AppLink - VMware ThinApp AppLink is a packaging technology that makes one virtualized application dependent on another, so they can work together in one sandbox.
  • Thing - A Thing is an interactive object for a Web page that is developed with an authoring tool called ThingMaker that is sold by the Parable Corporation.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • Thing hacking - Thing hacking is an attack that exploits a vulnerability in a connected non-computing device – a Thing, in the Internet of Things -- to gain control of the device or access to a network it connects to.
  • thingbot - A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet.
  • think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.
  • Thinnet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • Thinwire - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.
  • third party - A third party is an entity that is involved in some way in an interaction that is primarily between two other entities.
  • third party logistics - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • third party relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • third-party cookie - A third-party cookie is one that is placed on a user’s hard disk by a Web site from a domain other than the one a user is visiting.
  • third-party logistics - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • third-party relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • thought leader (thought leadership) - A thought leader is a person who or organization that is widely recognized as an expert in a given field and whose opinions are in high demand.
  • thought recognition - Thought recognition is the ability of a computer to recognize neural patterns in the brain as a form of input and control of computer processes.
  • thousands of lines of code - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • thrashing - Thrashing is computer activity that makes little or no progress, usually because memory or other resources have become exhausted or too limited to perform needed operations.
  • thread - On the Internet in Usenet newsgroups and similar forums, a thread is a sequence of responses to an initial message posting.
  • THREAD protocol - The THREAD protocol is a home automation device communication method owned by Nest, a subsidiary of Google.
  • thread-safe - In computer programming, thread-safe describes a program portion or routine that can be called from multiple programming threads without unwanted interaction between the threads.
  • threat actor - A threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.
  • threat hunter (cybersecurity threat analyst) - A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.
  • threat ignorance - Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack.
  • threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analyzed and refined information about current or potential attacks that could negatively affect an organization.
  • threat intelligence feed (TI feed) - A threat intelligence feed is an ongoing stream of data related to potential or current threats to an organization’s security.
  • threat intelligence service (TI service) - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.
  • threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.
  • threat modeling - Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.
  • three dimensions - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • three finger salute - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • Three Laws of Robotics (Isaac Asimov) - Science-fiction author Isaac Asimov is often given credit for being the first person to use the term robotics in a short story composed in the 1940s.
  • three-dimensional - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • three-factor authentication (3FA) - Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors – typically, the knowledge, possession and inherence categories.
  • three-phase commit (3PC) - Three-phase commit (3PC) is a protocol that consists of a distributed algorithm used to ensure all transactions in a system are agreed upon and are committed to.
  • throttled data transfer - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.
  • throughput - Throughput is a term used in information technology that indicates how many units of information can be processed in a set amount of time.
  • thumb drive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • thumbdrive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • thumbing - Thumbing is a method of typing on a small keyboard using the thumbs.
  • thumbnail - Thumbnail is a term used by graphic designers and photographers for a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Thunder (Salesforce Thunder) - Salesforce Thunder is a big data pipeline and rules engine designed to capture, filter and respond to events in real time; the platform was created to operate in streaming scenarios such as machine-to-machine (M2M) and Internet of Things (IoT) environments.
  • Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).
  • thunk - Thunk is programming that converts 16-bit memory address space into 32-bit memory address space and vice versa.
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).
  • THz - The terahertz, abbreviated THz, is a unit of electromagnetic (EM) wave frequency equal to one trillion hertz (1012 Hz).
  • TIA - Total Information Awareness (TIA) is the name of a massive U.
  • TIA-942 - TIA-942 is a standard developed by the Telecommunications Industry Association (TIA) to define guidelines for planning and building data centers, particularly with regard to cabling systems and network design.
  • Tibco - Tibco makes integration server software for enterprises.
  • TiBook - Titanium is the name of a popular laptop computer from Apple that is encased in titanium, the strong but light metal that is used in supersonic aircraft engines.
  • TIC - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • ticket-granting ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.
  • tier - In general, a tier (pronounced TEE-er ; from the medieval French tire meaning rank, as in a line of soldiers) is a row or layer in a series of similarly arranged objects.
  • Tier 0 - Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • Tier 1 storage - Tier 1 storage is a reference to the higher performing systems in a tiered storage environment.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • tiered storage - Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing the total cost of storage.
  • TIFF - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.
  • Tiger - Tiger is the the code name for Mac OS version 10.
  • tiger team - In the computer industry, a tiger team is a group of programmers or users who volunteer or are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
  • tilda - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • Tilded platform - The Tilded platform is a malicious software communicator specifically designed as a vessel for transmitting malware undetected.
  • Tim Berners-Lee - Tim Berners-Lee is the creator of the World Wide Web and director of the coordinating body for Web development, the W3C.
  • time - Time is an observed phenomenon, by means of which human beings sense and record changes in the environment and in the universe.
  • time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close