Browse Definitions :

Browse Definitions by Alphabet

TRA - TTL

  • transistor - The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.
  • transistor to transistor logic - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • transistor-to-transistor logic - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • transistor-to-transistor logic (TTL) - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • transit - Transit is the connection to and use of a telecommunication path provided by a vendor.
  • transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.
  • translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.
  • Transmission Control Protocol - TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.
  • Transmission Control Protocol Internet Protocol - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.
  • Transmission Control Protocol/Internet Protocol - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.
  • transparency - Transparency, in the context of governance, means being open and honest in all official activities.
  • transparent - In computers, transparent means something a little different than its general meaning of having the quality of being easily seen through, coming closer to meaning invisible or undetectable.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
  • Transparent Interconnection of Lots of Links - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • transparent organic light emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • transparent organic light-emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • transparent page sharing - Transparent page sharing (TPS) is a memory management technology in virtualization.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport layer protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • Transport Layer Security - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • transport protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • transport protocols 0 to 4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • Transport Services Access Point - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • Transportation Management System - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • trap door - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • trapdoor - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • travel and expense software (T & E software) - Travel and expense (T&E) software is programming that allows an organization to track and approve reimbursement for the cost of a business trip.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • traveling wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • traveling-wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • Traversal Using Relay NAT - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.
  • treasury management - Treasury management is the administration of a company’s cash flow as well as the creation and governance of policies and procedures that ensure the company manages risk successfully.
  • tree map - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • tree structure - A tree structure is an algorithm for placing and locating files (called records or keys) in a database.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.
  • triangulation - Triangulation is a process by which the location of a radio transmitter can be determined by measuring either the radial distance, or the direction, of the received signal from two or three different points.
  • Trick or Treat Halloween Quiz - This WhatIs.
  • TrickBot malware - A TrickBot is malware designed to steal banking information.
  • trigger - A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.
  • TRILL - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • trillion-node network - A trillion-node network refers to a near future state wherein trillions of devices, people, organizations, places and things are connected to the Internet.
  • trinary - Trinary logic is three-level digital logic, with states represented by the numbers -1, 0, and 1.
  • trip unit - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • triple bottom line - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • triple bottom line (3BL) - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • triple homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triple-homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triplewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Trivial File Transfer Protocol - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trojan - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • troll - As used on the Internet: As a verb, the practice of trying to lure other Internet users into sending responses to carefully-designed incorrect statements or similar "bait.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • TRON - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • TRON (The Real-Time Operating System Nucleus) - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • tropo - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • trouble report - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • trouble ticket - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • true HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true multitasking - True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueCrypt - TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncate - To truncate is to shorten by cutting off.
  • truncation error - Truncation error is the difference between a truncated value and the actual value.
  • trunk - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.
  • trunk - A trunk, in the context of software development, is the base code from which a branch is taken to be worked with.
  • trunking - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.
  • Trusted Cloud Initiative - The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices.
  • trusted computing - Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications.
  • trusted computing base - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • trusted computing base (TCB) - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • Trusted Computing Group - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Internet Connections - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • trusted platform module - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.
  • TSAP - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • TSQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • TSR - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • TTL - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • TTL - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close