Browse Definitions :

Browse Definitions by Alphabet

TTS - WHA

  • TTS - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • TTY - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • tumblelog - A tumblelog is a blog that supports short-form mixed media content.
  • Tumblr - Tumblr is a free microblogging site.
  • tunnel - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tunnel injection - Tunnel injection, also called Fowler-Nordheim tunnel injection, is the process by which data is written to NAND flash memory.
  • tunnel release - Tunnel release, also called Fowler-Nordheim tunnel release, is the process by which data is erased from NAND flash memory.
  • tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • TurboTax - TurboTax is tax preparation software for United States and Canadian tax returns.
  • Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • TURN - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.
  • turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.
  • turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • turnover - In a general context, churn is a synonym for agitation or turnover.
  • Tuxedo - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • TV/IP - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.
  • tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
  • tweak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweaker - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweet - A tweet is a post on Twitter.
  • tweet jam - A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • twentieth of a point - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • twin spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twin-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twip - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twips - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twisted nematic display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • twisted nematic display (TN display) - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • twisted pair - Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.
  • Twitch - Twitch (Twitch.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.
  • Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.
  • Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.
  • two dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • two pizza rule - The two pizza rule is a guideline for limiting the number of attendees at a meeting.
  • two spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • two-factor authentication (2FA) - Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.
  • two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.
  • two-speed IT - Two-speed IT is the concept that strategic planning for an IT department should include a fast track that allows some projects to be implemented quickly.
  • two-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-spindle system (twin-spindle system) - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-step verification - Two-step verification requires the sequential use of two authentication methods to verify that someone or something is who or what they are declared to be.
  • two-tier ERP - Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.
  • two-way authentication - Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other.
  • two-way pager - A two-way pager is a pager that allows you to send data as well as receive it.
  • Twofish - Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm.
  • TWT - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • Tyk - Tyk is an open source application program interface (API) gateway management tool.
  • type - A point is a standard measurement unit for type sizes.
  • Type 2 hypervisor - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.
  • Type 2 hypervisor (hosted hypervisor) - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.
  • type I error - False rejection, also called a type I error, is a mistake occasionally made by biometric security systems.
  • type II error - False acceptance, also called a type II error, is a mistake occasionally made by biometric security systems.
  • typeface - A typeface is a design for a set of printer or display font s, each for a set of characters, in a number of specific sizes.
  • What is Testing as a Service (TaaS)? - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close