Browse Definitions :

Browse Definitions by Alphabet

THU - TUR

  • thumbnail - A thumbnail is a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).
  • Tier 0 - Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • tiered storage - Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage costs and improve the performance and availability of mission-critical applications.
  • tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.
  • time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time management - Time management is the coordination of people's tasks and activities to maximize the effectiveness of their efforts.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series database (TSDB) - A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • time to value (TtV) - Time to value (TtV) is a business term that describes the period of time between a request for a specific value and the initial delivery of the value requested.
  • time-based one-time password - A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timebox - In agile software development, a timebox is a defined period of time during which a task must be accomplished.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • timestamp - A timestamp is the current time of an event that a computer records.
  • timing attack - A timing attack looks at how long it takes a system to do something and allows the attacker, through statistical analysis, to learn enough about the system to find the decryption key needed to gain access to it.
  • TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
  • tipping point - The tipping point is the critical point in an evolving situation that leads to a new and irreversible development.
  • Tizen - Tizen is an open source mobile operating system built on the Linux kernel and offered in versions for multiple platforms, including smartphones, tablets, wearable computers, netbooks, digital televisions and in-vehicle systems.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • token ring - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
  • tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
  • tooling - Tooling, also known as machine tooling, is the process of acquiring the manufacturing components and machines needed for production.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Top 9 Highest IT salaries in 2021 - Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.
  • Top searches of 2008 - What were people searching the WhatIs.
  • top-of-rack switching - Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.
  • Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
  • toroid - A toroid is a coil of insulated or enameled wire wound on a donut-shaped form made of powdered iron.
  • torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.
  • TOSCA (Topology and Orchestration Specification for Cloud Applications) - The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an open-source language used to describe the relationships and dependencies between services and applications that reside on a cloud computing platform.
  • total benefit of ownership (TBO) - Total benefit of ownership is the sum of measurable and intangible returns that a company receives from investing in assets and/or personnel.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • total risk - Total risk is an assessment that identifies all of the risk factors, including potential internal and external threats and liabilities, associated with pursuing a specific plan or project or buying or selling an investment.
  • touch pad (touchpad) - A touch pad is a device for pointing (controlling input positioning) on a computer display screen.
  • touch screen - A touch screen is an electronic display screen that is also an input device.
  • Toyota Way - The Toyota Way is a comprehensive expression of the company's management philosophy, which is based on the two foundational principles of Continuous Improvement (kaizen) and Respect for People.
  • traceability - Traceability, in supply chain traceability, is the ability to identify, track and trace elements of a product or substance as it moves along the supply chain from raw goods to finished products.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • trackball - A trackball is a computer cursor control device used in many laptop computer keyboards and older versions of computer mice.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • transaction - In computer programming, a transaction usually means a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.
  • Transaction Processing Performance Council (TPC) - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.
  • transactional data - Transactional data, in the context of data management, is the information recorded from transactions.
  • transactional leadership - Transactional leadership, also known as managerial leadership, is a leadership style where leaders rely on rewards and punishments to achieve optimal job performance from their subordinates.
  • transactional marketing - Transactional marketing is a business strategy that focuses on single, "point of sale" transactions.
  • transceiver - A transceiver is a combination transmitter/receiver in a single package.
  • transconductance - Transconductance is an expression of the performance of a bipolar transistoror field-effect transistor (FET).
  • transcription error - A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs.
  • transducer - A transducer is an electronic device that converts energy from one form to another.
  • transfer learning - Transfer learning is the application of knowledge gained from completing one task to help solve a different, but related, problem.
  • transformational leadership - Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.
  • transformative technology - Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.
  • Transistor - A transistor is a miniature semiconductor that regulates or controls current or voltage flow.
  • transistor-to-transistor logic (TTL) - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.
  • translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.
  • Transmission Control Protocol (TCP) - Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
  • transparency - Transparency is the quality of being easily seen through, while transparency in a business or governance context refers to being open and honest.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • tree structure - A tree data structure is an algorithm for placing and locating files (called records or keys) in a database.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.
  • TrickBot malware - A TrickBot is malware designed to steal banking information.
  • trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • triple bottom line (TBL) - The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • troubleshooting - Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncate - To truncate is to shorten by cutting off.
  • truncation error - A truncation error is the difference between an actual and a truncated, or cut-off, value.
  • trunk (trunking) - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  • trunk-based development - In software development, a trunk is the base code into which all subsequent code is merged.
  • trusted computing base (TCB) - A trusted computing base (TCB) is everything in a computing system that provides a secure environment for operations.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
  • truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.
  • Tumblr - Tumblr is a free microblogging site.
  • tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close