Browse Definitions :

Browse Definitions by Alphabet

TOT - TWI

  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • total risk - Total risk is an assessment that identifies all of the risk factors, including potential internal and external threats and liabilities, associated with pursuing a specific plan or project or buying or selling an investment.
  • touch pad (touchpad) - A touch pad is a device for pointing (controlling input positioning) on a computer display screen.
  • touch screen - A touch screen is a computer display screen that is also an input device.
  • Tower of Hanoi backups - Tower of Hanoi is a complex tape backup strategy that's useful for archiving data for an extended period of time in an economical manner by using a cycle of exponential retention periods instead of a large number of tapes.
  • tower server - A tower server is a computer intended for use as a server and built in an upright cabinet that stands alone.
  • Toyota Way - The Toyota Way is a comprehensive expression of the company's management philosophy, which is based on the two foundational principles of Continuous Improvement (kaizen) and Respect for People.
  • traceability - Traceability, in supply chain traceability, is the ability to identify, track and trace elements of a product or substance as it moves along the supply chain from raw goods to finished products.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • trackball - A trackball is a computer cursor control device used in many notebook and laptop computers.
  • tracking array - A tracking array is a collection of solar panels that turn to follow the path of the sun in order to maximize the solar radiation on the photovoltaic (PV) surface and convert light into electrical current.
  • TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • trademark - A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and sometimes legally registered as a representation of a company.
  • traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • tragedy of the commons - The tragedy of the commons is a problem that occurs when individuals exploit a shared resource to the extent that demand overwhelms supply and the resource becomes unavailable to some or all.
  • transaction - In computer programming, a transaction usually means a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.
  • transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.
  • Transaction Processing Performance Council (TPC) - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.
  • transactional data - Transactional data, in the context of data management, is the information recorded from transactions.
  • transactional leadership - Transactional leadership is a leadership style where the executive relies on rewards and punishments to achieve optimal job performance from his or her subordinates.
  • transactional marketing - Transactional marketing is a business strategy that focuses on single, "point of sale" transactions.
  • transceiver - A transceiver is a combination transmitter/receiver in a single package.
  • transconductance - Transconductance is an expression of the performance of a bipolar transistoror field-effect transistor (FET).
  • transcription error - A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs.
  • transducer - A transducer is an electronic device that converts energy from one form to another.
  • transfer learning - Transfer learning is the application of knowledge gained from completing one task to help solve a different, but related, problem.
  • transformational leadership - Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.
  • transformative technology - Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.
  • Transistor - A transistor is a miniature semiconductor that regulates or controls current or voltage flow.
  • transistor-to-transistor logic (TTL) - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.
  • translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.
  • Transmission Control Protocol (TCP) - Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
  • transparency - Transparency, in the context of governance, means being open and honest in all official activities.
  • transparent - In computers, transparent means something a little different than its general meaning of having the quality of being easily seen through, coming closer to meaning invisible or undetectable.
  • transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.
  • transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
  • transparent page sharing - Transparent page sharing (TPS) is a memory management technology in virtualization.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • treasury management - Treasury management is the administration of a company’s cash flow as well as the creation and governance of policies and procedures that ensure the company manages risk successfully.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • tree structure - A tree data structure is an algorithm for placing and locating files (called records or keys) in a database.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.
  • TrickBot malware - A TrickBot is malware designed to steal banking information.
  • trigraph - A trigraph is a three-character replacement for a special or nonstandard character in a text file.
  • trinary - Trinary logic is three-level digital logic, with states represented by the numbers -1, 0, and 1.
  • trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.
  • triple bottom line (TBL) - The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.
  • triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
  • tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • troubleshooting - Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.
  • true multitasking - True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another.
  • true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
  • TrueCrypt - TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).
  • TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
  • truncate - To truncate is to shorten by cutting off.
  • truncation error - Truncation error is the difference between a truncated value and the actual value.
  • trunk (trunking) - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  • trunk-based development - In software development, a trunk is the base code into which all subsequent code is merged.
  • Trusted Cloud Initiative - The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices.
  • trusted computing - Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications.
  • trusted computing base (TCB) - A trusted computing base (TCB) is everything in a computing system that provides a secure environment for operations.
  • Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
  • truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.
  • Tumblr - Tumblr is a free microblogging site.
  • tunnel injection - Tunnel injection, also called Fowler-Nordheim tunnel injection, is the process by which data is written to NAND flash memory.
  • tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • TurboTax - TurboTax is tax preparation software for United States and Canadian tax returns.
  • Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
  • turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.
  • turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
  • TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.
  • tweet - A tweet is a post on Twitter.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • twisted nematic display (TN display) - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • twisted pair - Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.
  • Twitch - Twitch (Twitch.
  • Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
  • Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.
  • Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.
  • Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close