Browse Definitions :

Browse Definitions by Alphabet

TRA - TUR

  • transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
  • Transparent Interconnection of Lots of Links - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • transparent organic light emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • transparent organic light-emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • transparent page sharing - Transparent page sharing (TPS) is a memory management technology in virtualization.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport layer protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • Transport Layer Security - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • transport protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • transport protocols 0 to 4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • Transport Services Access Point - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • Transportation Management System - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • trap door - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • trapdoor - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • travel and expense software (T & E software) - Travel and expense (T&E) software is programming that allows an organization to track and approve reimbursement for the cost of a business trip.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • traveling wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • traveling-wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • Traversal Using Relay NAT - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.
  • treasury management - Treasury management is the administration of a company’s cash flow as well as the creation and governance of policies and procedures that ensure the company manages risk successfully.
  • tree map - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • tree structure - A tree structure is an algorithm for placing and locating files (called records or keys) in a database.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.
  • triangulation - Triangulation is a process by which the location of a radio transmitter can be determined by measuring either the radial distance, or the direction, of the received signal from two or three different points.
  • Trick or Treat Halloween Quiz - This WhatIs.
  • TrickBot malware - A TrickBot is malware designed to steal banking information.
  • trigger - A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.
  • TRILL - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • trillion-node network - A trillion-node network refers to a near future state wherein trillions of devices, people, organizations, places and things are connected to the Internet.
  • trinary - Trinary logic is three-level digital logic, with states represented by the numbers -1, 0, and 1.
  • trip unit - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • triple bottom line - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • triple bottom line (TBL) - The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • triple homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triple-homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triplewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Trivial File Transfer Protocol - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trojan - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • TRON - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • tropo - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • trouble report - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • trouble ticket - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • true HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true multitasking - True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueCrypt - TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncate - To truncate is to shorten by cutting off.
  • truncation error - Truncation error is the difference between a truncated value and the actual value.
  • trunk (trunking) - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  • trunk-based development - In software development, a trunk is the base code into which all subsequent code is merged.
  • trunking - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  • Trusted Cloud Initiative - The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices.
  • trusted computing - Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications.
  • trusted computing base - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • trusted computing base (TCB) - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • Trusted Computing Group - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Internet Connections - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • trusted platform module - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.
  • TSAP - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • TSQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • TSR - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • TTL - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • TTL - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • TTS - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • TTY - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • Tumblr - Tumblr is a free microblogging site.
  • tunnel - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tunnel injection - Tunnel injection, also called Fowler-Nordheim tunnel injection, is the process by which data is written to NAND flash memory.
  • tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • TurboTax - TurboTax is tax preparation software for United States and Canadian tax returns.
  • Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • TURN - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.
  • turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.
  • turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • turnover - In a general context, churn is a synonym for agitation or turnover.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close