Browse Definitions :

Browse Definitions by Alphabet

TRI - TWI

  • TrickBot malware - A TrickBot is malware designed to steal banking information.
  • trigger - A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.
  • trigraph - A trigraph is a three-character replacement for a special or nonstandard character in a text file.
  • TRILL - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.
  • trillion-node network - A trillion-node network refers to a near future state wherein trillions of devices, people, organizations, places and things are connected to the Internet.
  • trinary - Trinary logic is three-level digital logic, with states represented by the numbers -1, 0, and 1.
  • trip unit - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • triple bottom line - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • triple bottom line (3BL) - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • triple homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triple-homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • triple-play network - A triple-play network is one in which voice, video and data are all provided in a single access subscription.
  • triplewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Trivial File Transfer Protocol - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trojan - In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • troll - As used on the Internet: As a verb, the practice of trying to lure other Internet users into sending responses to carefully-designed incorrect statements or similar "bait.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • TRON - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • TRON (The Real-Time Operating System Nucleus) - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.
  • tropo - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • trouble ticket (trouble report) - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • true HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • true multitasking - True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueCrypt - TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).
  • TrueType - Created at Apple Computer, TrueType was designed to fill the need for an optimized, scalable font format.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncate - To truncate is to shorten by cutting off.
  • truncation error - Truncation error is the difference between a truncated value and the actual value.
  • trunk - A trunk, in the context of software development, is the base code from which a branch is taken to be worked with.
  • trunk - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.
  • trunking - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.
  • Trusted Cloud Initiative - The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices.
  • trusted computing - Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications.
  • trusted computing base - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • trusted computing base (TCB) - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • Trusted Computing Group - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Internet Connections - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • trusted PC - The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure.
  • trusted platform module - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
  • truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.
  • TSAP - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • TSQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • TSR - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • TTL - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.
  • TTL - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • TTS - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • TTY - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • tty command - A tty command in Linux and other Unix-like operating systems is a shell command that can be entered interactively or as part of a script to determine whether the output for the script is a terminal (that is, to an interactive user) or to some other destination such as another program or a printer.
  • tumblelog - A tumblelog is a blog that supports short-form mixed media content.
  • Tumblr - Tumblr is a free microblogging site.
  • tunnel injection - Tunnel injection, also called Fowler-Nordheim tunnel injection, is the process by which data is written to NAND flash memory.
  • tunnel release - Tunnel release, also called Fowler-Nordheim tunnel release, is the process by which data is erased from NAND flash memory.
  • tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • TurboTax - TurboTax is tax preparation software for United States and Canadian tax returns.
  • Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • TURN - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.
  • turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.
  • turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • turnover - In a general context, churn is a synonym for agitation or turnover.
  • Turtle Firewall - Turtle Firewall is an open source firewall program written in Perl that supports Linux Kernels 2.
  • Tux - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • Tuxedo - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
  • tweak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • tweaker - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • TweakUI - TweakUI is a software utility that lets Windows 9x, Windows NT, and Windows 2000 users modify the desktop user interface and other system characteristics to their liking.
  • tweet - A tweet is a post on Twitter.
  • tweet jam - A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • twentieth of a point - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • twin spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twin-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.
  • twinaxial cable - Twinaxial cable is coaxial cable that contains two inner conducting wires rather than one.
  • twip - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twip (twentieth of a point) - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twips - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.
  • twisted nematic display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close