Browse Definitions :

Browse Definitions by Alphabet

  • cyber threat hunter (cybersecurity threat analyst) - A cyber threat hunter, also called a cybersecurity threat analyst, proactively identifies security incidents that may go undetected by automated security tools such as malware detectors and firewalls.
  • T-shaped employee - A T-shaped employee, in the context of human resources, is an individual who has a depth of knowledge as well as skills in a particular area of specialization.
  • T-SQL (Transact-SQL) - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • table - A table in computer programming is a data structure used to organize information, just as it is on paper.
  • Tableau - Tableau is a software company that offers collaborative data visualization services for organizations working with business information analytics.
  • tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.
  • tabletop exercise (TTX) - A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.
  • tag management system - A tag management system (TMS) is a software solution used to manage the tags used in digital marketing.
  • tailgating (piggybacking) - Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises.
  • takedown request - A takedown request, also called a DMCA takedown or a notice and take down request, is a procedure for asking an internet service provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.
  • talent acquisition - Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business goals, identify and develop the best talent sources, then execute the strategy by recruiting, evaluating and onboarding candidates.
  • talent management - Talent management is a process used by companies to optimize how they recruit, train and retain employees.
  • talent management software (TM software) - Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage.
  • talent network - A talent network is a group of interconnected people with similar professional skills.
  • talent pipeline - A talent pipeline is a pool of candidates who are ready to fill a position.
  • talent pool - A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.
  • Taleo - Taleo is a cloud-based talent management software vendor that was acquired by Oracle in February 2012.
  • TAM SAM SOM - TAM SAM SOM is a set of acronyms used to quantify the business opportunity for a brand in a given market.
  • tape backup - Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge.
  • tape drive - A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes.
  • tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.
  • target function - A target function, in machine learning, is a method for solving a problem that an AI algorithm parses its training data to find.
  • targeted ad (targeted advertising) - A targeted ad, or targeted advertising, is a method of displaying advertisements to a specific group of people based on their demographics, behavior, interests, or other criteria.
  • Tata Consultancy Services (TCS) - Tata Consultancy Services (TCS) is one of the largest multinational IT service and consulting companies.
  • taxonomy - Taxonomy is the science of classification according to a predetermined system, with the resulting catalog used to provide a conceptual framework for discussion, analysis or information retrieval.
  • TCO (total cost of ownership) - Total cost of ownership (TCO) is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • TCPView - TCPView is a Windows network monitoring utility that shows a graphical representation of all currently active TCP and UDP endpoints on a system.
  • team collaboration - Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal participation to achieve objectives.
  • team collaboration tools - Team collaboration tools -- also known as team collaboration software -- is a term used to define the different types of software and online services available to companies and individuals that enable them to feasibly work together on common projects, regardless of their physical location.
  • tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe computing capacity.
  • technical debt - Technical debt -- or tech debt -- is the implied cost incurred when businesses do not fix problems that will affect them in the future.
  • technical requirements - Technical requirements, in the context of software development and systems engineering, are the factors required to deliver a desired function or behavior from a system to satisfy a user’s standards and needs.
  • technological convergence - Technological convergence is a term that describes bringing previously unrelated technologies together, often in a single device.
  • technology adoption lifecycle - The technology adoption lifecycle describes how different customers accept and adopt new technology, with early adopters enthusiastically embracing new products and services, and later adopters taking longer to make a purchase decision.
  • TED talk - A TED talk is a recorded public-speaking presentation that was originally given at the main TED (technology, entertainment and design) annual event or one of its many satellite events around the world.
  • telecommunications (telecom) - Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.
  • telecommuting - Telecommuting allows an employee to complete work assignments from outside the traditional workplace using telecommunications tools such as email, phone, chat and video apps.
  • teleconference - A teleconference is a live audio or audio-visual meeting with two or more participants.
  • telegraph - A telegraph is a communication system that sends information by making and breaking an electrical connection.
  • telehealth (telemedicine) - Telehealth, also referred to as telemedicine or e-medicine, is the remote delivery of healthcare services over the telecommunications infrastructure.
  • telematics - Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to transmit, store and receive information from devices to remote objects over a network.
  • telemetry - Telemetry is the automatic measurement and wireless transmission of data from remote sources.
  • teleoperations (telerobotics) - Teleoperation, also called telerobotics, is the technical term for the remote control of a robot.
  • Telephone Consumer Protection Act (TCPA) - The Telephone Consumer Protection Act (TCPA) of 1991 is a federal law that places restrictions on telephone solicitations and robocalls.
  • telephony - Telephony is technology associated with interactive communication between two or more physically distant parties via the electronic transmission of data.
  • telepresence robot - A telepresence robot is a remote-controlled, wheeled device that has wireless internet connectivity.
  • teletypewriter (TTY) - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.
  • Telnet - Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines.
  • template - A template is a form, mold or pattern used as a guide to make something.
  • Temporal Key Integrity Protocol (TKIP) - Temporal Key Integrity Protocol (TKIP) is an encryption protocol included in the Institute of Electrical and Electronics Engineers (IEEE) 802.
  • TensorFlow - TensorFlow is an open source framework developed by Google researchers to run machine learning, deep learning and other statistical and predictive analytics workloads.
  • Terabyte (TB) - A terabyte (TB) is a unit of digital data that is equal to about 1 trillion bytes.
  • terminal server - A terminal server, also known as a communication server, is a hardware device or server that provides terminals -- such as PCs, printers and other devices -- with a common connection point to a local or wide area network (WAN).
  • terms of service (ToS) - Terms of service (ToS) is a type of document stating details about what a service provider is responsible for as well as user obligations that must be adhered to for continuation of the service.
  • ternary content-addressable memory (TCAM) - Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle.
  • Terraform - HashiCorp Terraform is an infrastructure as code (IaC) software tool that allows DevOps teams to automate infrastructure provisioning using reusable, shareable, human-readable configuration files.
  • test case - A test case is a set of actions performed on a system to determine if it satisfies software requirements and functions correctly.
  • test harness - In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.
  • test marketing - Test marketing is a method that aims to explore consumer response to a product or marketing campaign by making it available on a limited basis to test markets before a wider release.
  • test-driven development (TDD) - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.
  • testing - In general, testing is finding out how well something works.
  • Testing as a Service (TaaS) - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • text tagging - Text tagging is the process of manually or automatically adding tags or annotation to various components of unstructured data as one step in the process of preparing such data for analysis.
  • texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.
  • The history of DevOps: A visual timeline - This infographic shows the evolution of DevOps over time.
  • The role of IT4IT in cloud service management (CSM) - In his book 'Cloud Service Management and Governance -- Smart Service Management in Cloud Era,' author Enamul Haque explains how IT4IT can help the reader create a plan for CSM and ensure managers understand the value each cloud service provides their organization.
  • The Three Ways (The Phoenix Project) - The Three Ways is a set of business principles that encourage organizations to value a corporate culture in which feedback loops are short, everyone understands how different parts of the business interrelate and employees are encouraged to continuously learn.
  • Theory of Constraints (TOC) - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.
  • theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.
  • thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.
  • thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources.
  • thing (in the internet of things) - A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.
  • think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.
  • third party - A third party is an entity that is involved in some way in an interaction that is primarily between two other entities.
  • third-party cookie - A third-party cookie is a cookie that's placed on a user's device -- computer, cellphone or tablet -- by a website from a domain other than the one the user is visiting.
  • thread - A thread is, fundamentally, a clear, well-defined theme, subject, topic or focus.
  • threat actor - A threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.
  • threat detection and response (TDR) - Threat detection and response (TDR) is the process of identifying potential threats and reacting to them before they impact the business.
  • threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is information collected from various sources about current or potential attacks that threaten an organization.
  • threat intelligence feed (TI feed) - A threat intelligence feed (TI feed) is an ongoing stream of data related to potential or current threats to an organization's security.
  • threat modeling - Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent or mitigate the effects of threats to the system.
  • three lines model - The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense.
  • three-factor authentication (3FA) - Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors -- typically, the knowledge, possession and inherence categories.
  • throughput - Throughput is a measure of how many units of information a system can process in a given amount of time.
  • thumbnail - A thumbnail is a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P-type and N-type materials (PNPN).
  • Tier 0 - Tier 0 is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • tiered storage - Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage costs and improve the performance and availability of mission-critical applications.
  • TikTok - TikTok is a social media platform that allows users to create, share and discover short-form videos.
  • tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time management - Time management is the coordination of tasks and activities to maximize the effectiveness of an individual's efforts.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series database (TSDB) - A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

CIO
  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close