Browse Definitions :

Browse Definitions by Alphabet

TUX - WHA

  • Tuxedo - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • TV/IP - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
  • tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
  • tweak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweaker - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweet - A tweet is a post on Twitter.
  • tweet jam - A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • twentieth of a point - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • twin spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twin-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twip - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twips - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twisted nematic display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • twisted nematic display (TN display) - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • twisted pair - Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.
  • Twitch - Twitch (Twitch.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.
  • Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.
  • Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.
  • two dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • two pizza rule - The two pizza rule is a guideline for limiting the number of attendees at a meeting.
  • two spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • two-factor authentication (2FA) - Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.
  • two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.
  • two-speed IT - Two-speed IT is the concept that strategic planning for an IT department should include a fast track that allows some projects to be implemented quickly.
  • two-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-spindle system (twin-spindle system) - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • two-step verification - Two-step verification requires the sequential use of two authentication methods to verify that someone or something is who or what they are declared to be.
  • two-tier ERP - Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.
  • two-way authentication - Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other.
  • Twofish - Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm.
  • TWT - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • Tyk - Tyk is an open source application program interface (API) gateway management tool.
  • type - A point is a standard measurement unit for type sizes.
  • Type 2 hypervisor - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.
  • Type 2 hypervisor (hosted hypervisor) - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.
  • type I error - False rejection, also called a type I error, is a mistake occasionally made by biometric security systems.
  • type II error - False acceptance, also called a type II error, is a mistake occasionally made by biometric security systems.
  • typeface - A typeface is a design for a set of printer or display font s, each for a set of characters, in a number of specific sizes.
  • What is Testing as a Service (TaaS)? - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk exposure

    Risk exposure is the quantified potential loss from business activities currently underway or planned.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close