Glossary Letter T

T - The tesla (symbolized T) is the standard unit of magnetic flux density.

T - Temperature (symbolized T) is an expression of heat energy.

T 1 - Also see the T-carrier system, of which the T1 is a part.

T interface - In Integrated Services Digital Network (ISDN) service, a T interface is the electrical interface between a network terminating unit 1 (NT1) and a network terminating unit 2 (NT2) device, which typically is a private branch exchange (PBE).

T Model - A tModel is a data structure representing a service type (a generic representation of a registered service) in the UDDI (Universal Description, Discovery, and Integration) registry.

T Rex - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.

T SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

T-1 - Also see the T-carrier system, of which the T1 is a part.

T-carrier system - To see the relationship between T-carrier, E-carrier, and DS0 multiples, see digital signal X.

T-Rex - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.

T-shaped employee - A T-shaped employee, in the context of human resources, is an individual who has a depth of knowledge as well as skills in a particular area of specialization.

T-SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

T-SQL (Transact-SQL) - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

T.38 fax over IP (FoIP protocol) - T.38 is a protocol for sending faxes over a voice over IP (VoIP) network or the Internet in real time.

T1 - Also see the T-carrier system, of which the T1 is a part.

T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.

T3 - To see the relationship between T-carrier, E-carrier, and DS0 multiples, see digital signal X.

T9 - Text on nine keys (T9) is a system that lets fixed and mobile phone users send text messages by pressing a number key for each letter in the message -- effectively making a keyboard out of the nine numeric phone entry keys.

TA - A terminal adapter (TA) is a hardware interface between a computer and an Integrated Services Digital Network line.

TaaS - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.

tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.

tabbed document interface - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.

table - In computer programming, a table is a data structure used to organize information, just as it is on paper.

Table of Physical Constants - Quick look-up chart.

Table of Physical Units - Cheat sheet quick look-up for the table of physical units.

table space - In a database management system (DBMS), a tablespace is a logical group of data files in a database.

Tableau - Tableau is a software company that offers collaborative data visualization services for organizations working with business information analytics.

tablespace - In a database management system (DBMS), a tablespace is a logical group of data files in a database.

tablet - A tablet is a wireless, portable personal computer with a touchscreen interface.

tablet (tablet PC) - A tablet is a wireless, portable personal computer with a touchscreen interface.

tablet computer - A tablet is a wireless, portable personal computer with a touchscreen interface.

tabletop exercise (TTX) - A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.

TACACS - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.

TACACS (Terminal Access Controller Access Control System) - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.

TACACS+ - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.

Taco Bell programming - Taco Bell programming is an approach to software development that places value on consistently using the same development tools and languages when creating solutions for new problems.

tag - A tag is a generic term for a language element descriptor.

Tag Image File Format - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.

tag management system - A tag management system (TMS) is a software solution used to manage the tags used in digital marketing.

tag-jacking - Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware.

Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.

tagging - Social bookmarking is a user-defined taxonomy system for bookmark s.

tags - Social bookmarking is a user-defined taxonomy system for bookmark s.

Tahoe-LAFS (Tahoe Least-Authority File System) - Tahoe-LAFS (Tahoe Least-Authority File System) is a distributed storage system that offers provider-independent security for local or cloud storage.

tailgating (piggybacking) - Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.

TailsOS - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session.

take off - Take off, sometimes spelled as "take-off" or "takeoff," is a part of the cost estimating process in the construction industry.

take-down request - A take-down request, also called a notice and take down request, is a procedure for asking an Internet Service Provider (ISP) or search engine to remove or disable access to illegal, irrelevant or outdated information.

talent acquisition - Talent acquisition refers to the process employers use for recruiting, tracking and interviewing job candidates, and onboarding and training new employees.

talent activation - Talent activation is a human resources strategy for improving team leadership and workgroup collaboration that involves using surveys and questionnaires to solicit employee feedback on a regular basis.

talent management software (TM software) - Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage.

talent network - A talent network is potentially anything that connects people of similar professional skills.

talent pipeline - A talent pipeline is a pool of candidates who are ready to fill a position.

talent pool - A talent pool is a database of potential job candidates.

Taleo - Taleo is a cloud-based talent management software vendor that was acquired by Oracle in February 2012.

talk time - In customer relationship management (CRM), talk time is the amount of time a call center agent spends with a caller during a transaction.

talkback - A talkback is a microphone-and-receiver system installed in a recording/mixing console for communication between people in the control room and performers in the recording studio.

TAM SAM SOM - TAM SAM SOM is a set of acronyms used to quantify the business opportunity for a brand in a given market.

Tamagotchi - A Tamagotchi (pronounced "tom-ah-GOT-chee") is a relatively inexpensive toy containing a small liquid crystal display display, a few touch-sensitive user controls, and a program in which the image of a small creature is visible.

TAN (transaction authentication number) - A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password.

tap - On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.

Tape ARchive - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.

tape backup - Tape can help fix an unstructured data backup issue and is a good archiving medium.

tape drive - A tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes.

tape library - In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.

tape shoe-shining or back-hitching - Tape shoe-shining (also known as tape back-hitching) refers to the back and forth motion a tape drive makes when the data stream to the drive is interrupted.

TAPI - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

TAPI - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

TAPI (Telephony Application Program Interface) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

tar - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.

tar (Tape ARchive) - Tar (for "Tape ARchive") is a UNIX shell command that creates a single file called an "archive" from a number of specified files or extracts the files from such an archive.

tar archive - Tarball is a jargon term for a tar archive - a group of files collected together as one.

tarball - Tarball is a jargon term for a tar archive - a group of files collected together as one.

tarball (tar archive) - Tarball is a jargon term for a tar archive - a group of files collected together as one.

tarchitecture - A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration.

target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.

target function - A target function, in machine learning, is a method for solving a problem that an AI algorithm parses its training data to find.

targeted ad (targeted advertising) - A targeted ad, in online marketing, is an advertisement that is served to a specific audience, which could be a particular demographic, a group or an individual.

targeted attack - A targeted attack is one that seeks to breach the security measures of a specific individual or organization.

tarpitting - Tarpitting is the practice of slowing the transmission of e-mail messages sent in bulk, as a means of thwarting spammers.

task - In computer programming, a task is a basic unit of programming that an operating system controls.

task bar - In the graphical user interface (GUI) for a computer operating system or application, a taskbar is a visual device on the desktop that typically shows the user which applications (tasks) are currently active and running.

taskbar - In the graphical user interface (GUI) for a computer operating system or application, a taskbar is a visual device on the desktop that typically shows the user which applications (tasks) are currently active and running.

Tata Consultancy Services (TCS) - Tata Consultancy Services (TCS) is India's top software and services exporter.

taxonomy - Taxonomy is the science of classification according to a predetermined system, with the resulting catalog being used to provide a conceptual framework for discussion or analysis.

taxpayer Identification number - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).

TB - A Terabyte (TB) is a measure of computer storage capacity that is approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a trillion bytes.

TCB - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.

TCG - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.

Tcl - Tool Command Language (Tcl) is an interpreted script language developed by Dr.

Tcl - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).

Tcl Tk - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).

Tcl/Tk - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).

Tcl/Tk (Tool Command Language) - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).

TCO - Total cost of ownership is a calculation to assess direct and indirect expenses and benefits related to the purchase of a product or infrastructure component.

TCO (total cost of ownership) - Total cost of ownership is a calculation to assess direct and indirect expenses and benefits related to the purchase of a product or infrastructure component.

TCP - TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.

TCP (Transmission Control Protocol) - TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.

TCP IP - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

TCP offload engine - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.

TCP port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).

TCP session hijacking - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.

TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.

TCP/IP - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

TCP/IP (Transmission Control Protocol/Internet Protocol) - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

TCP/IP accelerator network interface card - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.

TCP/IP offload engine - The TCP/IP offload engine (TOE for short) is a technology that is gaining popularity in high-speed Ethernet systems for the purpose of optimizing throughput.

tcpdump - Tcpdump is an open source command-line tool for monitoring (sniffing) network traffic.

TCPIP - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

TCPView - TCPView is a Windows network monitoring utility that shows a graphical representation of all currently active TCP and UDP endpoints on a system.

TD SCDMA - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.

TD-SCDMA - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.

TD-SCDMA (time division synchronous code division multiple access) - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.

TDD - A Telecommunications Display Device (TDD), also known as a text telephone, is a telephone equipped with a keyboard and a display for people who are hearing- or speech-impaired.

TDD - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

TDI - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.

TDL-4 - TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.

TDL-4 (TDSS or Alureon) - TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.

TDM - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

TDMA - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.

TDMA (time division multiple access) - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.

tdss - TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.

teach box - A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system.

team based approach - Whole-team approach, also called team-based approach, is a strategy for project management in which everyone on the project team is held equally responsible for the quality and success of the project.

team collaboration - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.

team collaboration - Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal participation to achieve objectives.

team collaboration tools - Team collaboration tools -- also known as team collaboration software -- is a term used to define the different types of software and online services available to companies and individuals that enable them to feasibly work together on common projects, regardless of their physical location.

team-based approach - Whole-team approach, also called team-based approach, is a strategy for project management in which everyone on the project team is held equally responsible for the quality and success of the project.

tebi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.

tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe computing capacity.

tech ethicist - Tech ethicist is a corporate role that involves examining a company’s technologies to ensure that they meet ethical standards, that they do not exploit user vulnerabilities, for example, or infringe upon user rights.

tech secondary market - The IT aftermarket(also called the tech secondary market) is an industry segment of tech resellers and active consumers that are buying and selling IT equipment outside of the channel endorsed by manufacturers.

tech support phone scam - A tech support phone scam is an exploit in which an attacker calls offering support for problems they claim were detected on the victim's computer.

technical debt - In software development, technical debt is a metaphor equating Extreme Programming’s incremental, get-something-started approach with the easy acquisition of money through fast loans.

technical errata - Technical errata are the details of unintended faults in hardware and software components.

Technical Office Protocol - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.

Technical Office Protocol (TOP) - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.

techno-fiend - In information technology, a techno-fiend is someone who is addicted to finding out and knowing how things work in one or more aspects of cyberspace.

technographic targeting (technographics) - Technographics targeting, is a business-to-business (B2B) marketing strategy that focuses attention on potential customers who use a specific hardware or software stack.

technological convergence - Technological convergence is a term that describes the layers of abstraction that enable different technologies to interoperate efficiently as a converged system.

technology buying team - A technology buying team is a committee within a company whose members are responsible for making software and hardware buying decisions.

technology-assisted review (TAR) - Technology-assisted review (TAR) uses software to search and sort through documents that are relevant for the purposes of e-discovery.

TechTarget Featured Topics - A Featured Topic is a collection of resources designed to bring you up to speed quickly on a particular IT subject.

TechTarget Porfolio of Web Sites - TechTarget Porfolio of Web Sites.

TED - The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture.

Ted Codd - E. F.

TED talk - A TED talk is a presentation at the main TED (technology, entertainment, design) conference or one of its many satellite events around the world.

teen buzz - The Mosquito is a device that creates a high-pitched noise like an amplified version of its namesake.

teergrube - A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.

telco - In the United States and possibly other countries, "telco" is a short form for telephone company.

telco (telephone company) - In the United States and possibly other countries, "telco" is a short form for telephone company.

telecentre - A telecenter (US spelling) or telecentre (UK spelling) is a work location usually in a different place than the organization's main office that provides convenient occasional access for telecommuting to work equipment that they don't have at home or on the road.

telechir - A telechir is a complex robot that is remotely controlled by a human operator in a telepresence system, which gives a person the sense of being on location in a remote, dangerous, or alien environment.

telecine - Cinema pulldown 3:2 is an algorithm for matching the slower frame rate of film to the faster refresh rate of a 60 Hz television.

telecom cloud provider - A telecom cloud provider is a telecommunications company that has shifted a significant part of its business from landline service to devote resources to providing cloud services.

Telecom Regulatory Authority of India (TRAI) - Telecom Regulatory Authority of India (TRAI) is an independent regulatory body established by the Telecom Regulatory Authority of India Act 1997 to oversee the telecommunications industry in India.

Telecommunication Standardization Sector - The CCITT, now known as the ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union), is the primary international body for fostering cooperative standards for telecommunications equipment and systems.

Telecommunication Standardization Sector of the International Telecommunications Union - The ITU-T (for Telecommunication Standardization Sector of the International Telecommunications Union) is the primary international body for fostering cooperative standards for telecommunications equipment and systems.

telecommunications (telecom) - Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.

Telecommunications Act of 1996 - The Telecommunications Act of 1996, enacted by the U.

Telecommunications Display Device - A Telecommunications Display Device (TDD), also known as a text telephone, is a telephone equipped with a keyboard and a display for people who are hearing- or speech-impaired.

Telecommunications Management Network - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.

telecommute - Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.

telecommuter - Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.

telecommuting - Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.

teleconference - A teleconference is a telephone meeting among two or more participants involving technology more sophisticated than a simple two-way phone connection.

telegram - A telegraph is a system in which information is communicated over a wire with a series of electrical current pulses, usually in the form of Morse code.

telegraph - A telegraph is a system in which information is communicated over a wire with a series of electrical current pulses, usually in the form of Morse code.

telehealth - Telehealth is the transmission of health-related services or information over the telecommunications infrastructure.

telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.

telemedicine (telehealth) - Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

telemetry - Telemetry is the wireless transmission and reception of measured quantities for the purpose of remotely monitoring environmental conditions or equipment parameters.

teleoperation - Teleoperation, also called telerobotics, is the technical term for the remote control of a robot.

teleoperations (telerobotics) - Teleoperation, also called telerobotics, is the technical term for the remote control of a robot.

telepathology - Telepathology is the area of telemedicine involving the transmission of pathological specimen images for remote study and diagnosis of disease.

telephone company - In the United States and possibly other countries, "telco" is a short form for telephone company.

Telephone Consumer Protection Act (TCPA) - The Telephone Consumer Protection Act (TCPA) of 1991 is a federal law that places restrictions on telephone solicitations and robocalls.

telephone jacks - In the U. S.

telephone network standards - The V Series Recommendations from the ITU-TS are summarized in the table below.

telephony - Telephony is technology associated with interactive communication between two or more physically distant parties via the electronic transmission of speech or other data.

Telephony Application Program Interface - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

Telephony Application Program Interface - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

Telephony Application Program Interface (TAPI) - TAPI (Telephony Application Program Interface) is a standard program interface that lets you and your computer "talk" over telephones or video phones to people or phone-connected resources elsewhere in the world.

teleportation - Teleportation is the duplication or re-creation of physical objects or their properties using light beams, according to researchers at the California Institute of Technology.

telepresence - Telepresence is a sophisticated form of robotic remote control in which a human operator has a sense of being in a remote location so that the experience resembles virtual reality (VR).

telepresence robot - A telepresence robot is a remote-controlled, wheeled device that has wireless internet connectivity.

telepresence room - A telepresence room is a conference space dedicated to high-end videoconferencing.

telerobotics - Teleoperation, also called telerobotics, is the technical term for the remote control of a robot.

telestroke - Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital.

telestroke (telestroke services) - Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital.

telestroke services - Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital.

teletraffic engineering - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.

teletypewriter - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.

teletypewriter (TTY) - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.

television over IP - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

telework - Telecommuting is an arrangement to work outside the traditional office or workplace, usually at home or in a mobile situation.

Telnet - Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.

temperature - Temperature (symbolized T) is an expression of heat energy.

temperature (T) - Temperature (symbolized T) is an expression of heat energy.

temperature, standard - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.

Tempest - Tempest was the name of a classified (secret) U.

Tempest-shielding - Tempest was the name of a classified (secret) U.

template - A template is a form, mold, or pattern used as a guide to making something.

Temporal Key Integrity Protocol - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.

TensorFlow - TensorFlow is an open source framework developed by Google researchers to run machine learning, deep learning and other statistical and predictive analytics workloads.

TensorFlow Playground - TensorFlow Playground is an interactive web app that allows users to test artificial intelligence (AI) algorithms with Google’s TensorFlow machine learning libraries.

terabit - In measuring data transmission speed, a terabit is one trillion binary digit s, or 1,000,000,000,000 (that is, 10 12) bits.

terabyte - A Terabyte (TB) is a measure of computer storage capacity that is approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a trillion bytes.

Terabyte (TB) - A Terabyte (TB) is a measure of computer storage capacity that is approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a trillion bytes.

teraflop - A teraflop is a measure of a computer's speed and can be expressed as: A trillion floating point operations per second 10 to the 12th power floating-point operations per second 2 to the 40th power flops Today's fastest parallel computing operations are capable of teraflop speeds.

terahertz - The terahertz, abbreviated THz, is a unit of electromagnetic (EM) wave frequency equal to one trillion hertz (1012 Hz).

Teraplex - Teraplex (short for Teraplex Integration Center) is the name IBM has given to its 'real life' testing centers whose purpose is to allow IBM customers and business partners to test very large database (VLDB) applications on a full-scale basis by using.

Teraplex (Teraplex Integration Center) - Teraplex (short for Teraplex Integration Center) is the name IBM has given to its 'real life' testing centers whose purpose is to allow IBM customers and business partners to test very large database (VLDB) applications on a full-scale basis by using.

Teraplex Integration Center - Teraplex (short for Teraplex Integration Center) is the name IBM has given to its 'real life' testing centers whose purpose is to allow IBM customers and business partners to test very large database (VLDB) applications on a full-scale basis by using.

term boosting - Term boosting is the ability to assign higher importance to specific words in a search engine query.

terminal - In data communications, a terminal is any device that terminates one end (sender or receiver) of a communicated signal.

Terminal Access Controller Access Control System - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.

terminal adapter - A terminal adapter (TA) is a hardware interface between a computer and an Integrated Services Digital Network line.

terminal adapter (TA) - A terminal adapter (TA) is a hardware interface between a computer and an Integrated Services Digital Network line.

terminal emulation - Terminal emulation is the ability to make one computer terminal, typically a PC, appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.

terminal proxy server - A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets.

terminal server - A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN).

Terminal Server product - The Microsoft Windows Terminal Server (WTS) is a server program running on its Windows NT 4.

Terminal Server product or Microsoft Windows Terminal Server (WTS) - The Microsoft Windows Terminal Server (WTS) is a server program running on its Windows NT 4.

terminal services - A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN).

terminate and stay resident - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.

terminate and stay resident (TSR) - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.

terminology management - Terminology management is the systematized collection of concepts and terms with the purpose of unifying and standardizing technical documentation.

terms of service (ToS) - Terms of service (ToS) is a type of document stating details about what a service provider is responsible for as well as user obligations that must be adhered to for continuation of the service.

ternary content-addressable memory (TCAM) - Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle, with the term “ternary” referring to its ability to store and query data using three different inputs: 0, 1 and X.

Terraform - Terraform is an open source infrastructure as code software tool that allows DevOps engineers to programmatically provision the physical resources an application requires to run.

Terrestrial Trunked Radio - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.

tesla - The tesla (symbolized T) is the standard unit of magnetic flux density.

tesla (T) - The tesla (symbolized T) is the standard unit of magnetic flux density.

Tesla Powerpack - Tesla Powerpack and Powerwall are, respectively, the company’s business and residential market rechargeable battery products, designed for large-scale energy storage for off-grid and supplemental power systems.

Tesla Powerwall - Powerwall, which is aimed at the residential market, is designed to store power generated by solar panels or wind turbines at peak time for use during power outages and out-of-peak time, including night.

tessellation - A tessellation is a design that uses repeating interlocking shapes without overlapping or gaps.

test case - A test case is a set of actions performed on a system to determine if it satisfies software requirements and functions correctly.

test driven development - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

test harness - In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.

test marketing - Test marketing is a marketing method that aims to explore consumer response to a product or marketing campaign by making it available on a limited basis before a wider release.

test-driven design - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

test-driven development - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

test-driven development (TDD) - Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

testing - In general, testing is finding out how well something works.

Testing as a Service - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.

testing your bandwidth - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).

tethering - Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.

TETRA - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.

TETRA (Terrestrial Trunked Radio) - TETRA (Terrestrial Trunked Radio) is a set of standards developed by the European Telecommunications Standardisation Institute (ETSI) that describes a common mobile radio communications infrastructure throughout Europe.

texel - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.

texel (texture element) - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.

text - In information technology, text is a human-readable sequence of characters and the words they form that can be encoded into computer-readable formats such as ASCII.

text editor - A text editor is a computer program that lets a user enter, change, store, and usually print text (characters and numbers, each encoded by the computer and its input and output devices, arranged to have meaning to users or to other programs).

Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.

text messaging - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

text on nine keys - Text on nine keys (T9) is a system that lets fixed and mobile phone users send text messages by pressing a number key for each letter in the message -- effectively making a keyboard out of the nine numeric phone entry keys.

text online - Fortunately, there is a way to find out whether a given book exists online as viewable text:The On-line Books Page (http://digital.

text reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.

text tagging - Text tagging is the process of manually or automatically adding tags or annotation to various components of unstructured data as one step in the process of preparing such data for analysis.

text telephone - A Telecommunications Display Device (TDD), also known as a text telephone, is a telephone equipped with a keyboard and a display for people who are hearing- or speech-impaired.

text to speech - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.

text-to-speech - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.

text-to-speech (TTS) - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.

texting - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

Texting and Twitter Cheat Sheets - We've gathered resources to help you communicate effectively whether you`re texting, instant messaging or tweeting.

texture element - In computer graphics, a texel (texture element) represents the smallest graphical element in two-dimensional (2-D) texture mapping to "wallpaper" the rendition of a three-dimensional (3-D) object to create the impression of a textured surface.

texture mapping - Texture mapping is a graphic design process in which a two-dimensional (2-D) surface, called a texture map, is "wrapped around" a three-dimensional (3-D)object.

texture sensing - Texture sensing is the ability of a robot end effector to determine whether a surface is smooth or rough.

TFT - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.

TFT - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).

TFTP - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.

TGT - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.

thang - A thang, a jargon variant of "thing" based on regional U.

the - The Singularity is the hypothetical future creation of superintelligent machines.

The 10 Most Misunderstood Terms in IT - Here are the ten terms that we believe are currently the "most misunderstood" by those who work in information technology.

The Computer Fraud and Abuse Act - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.

The Green Grid - The Green Grid is a nonprofit consortium whose mission is to become the global authority on resource efficiency in information technology and data centers.

The Green Grid Performance Indicator (PI) - The Green Grid Performance Indicator (PI) is a set of metrics designed to help information technology (IT) teams assess current and future data center cooling performance.

The history of DevOps: A visual timeline - This infographic shows the evolution of DevOps over time.

The Hitchhiker's Guide to the Galaxy - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.

the Indian Computer Emergency Response Team - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.

The Open Group - The Open Group is a software standards organization that is sponsored by a number of major software vendors.

The Open Group Architecture Framework - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.

The Open Group Architecture Framework (TOGAF) - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.

the Open19 project - The Open19 project is aimed at standardizing servers, storage and networking components into a common set of form factors for any Electronic Industries Association (EIA) 19-inch data center rack.

The Real Time Operating System Nucleus - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.

The Real-Time Operating System Nucleus - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.

The Remote Insight Board -- Lights Out Edition - The Remote Insight Board -- Lights Out Edition (RIBLOE) is a Peripheral Component Interconnect (PCI) card intended for the remote management of Compaq servers.

The role of IT4IT in cloud service management (CSM) - In his book 'Cloud Service Management and Governance -- Smart Service Management in Cloud Era,' author Enamul Haque explains how IT4IT can help the reader create a plan for CSM and ensure managers understand the value each cloud service provides their organization.

The Three Ways (The Phoenix Project) - The Three Ways is a set of business principles that encourage organizations to value a corporate culture in which feedback loops are short, everyone understands how different parts of the business interrelate and employees are encouraged to continuously learn.

The Vault of Tech Terror (quizzes) - Tech quizzes with a Halloween theme.

Theory of Constraints - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.

Theory of Constraints (TOC) - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.

Theory of Everything - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.

theory of everything - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.

theory of relativity - Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, published as The Foundation of the General Theory of Relativity in 1916.

thermal compound - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.

thermal grease - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.

thermal grease (thermal paste or thermal compound) - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.

thermal imaging - Thermal imaging is a method of improving visibility of objects in a dark environment by detecting the objects' infrared radiation and creating an image based on that information.

thermal ink transfer printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.

thermal paste - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.

thermal printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.

thermal transfer printer - A thermal transfer printer is a non-impact printer that uses heat to register an impression on paper.

thermoelectric cooling - Thermoelectric cooling is a way to remove thermal energy from a medium, device or component by applying a voltage of constant polarity to a junction between dissimilar electrical conductors or semiconductors.

thermographic printing - Thermographic printing is an application of thermography in which heat is used to create images on paper.

thermography - Thermography is a printing or imaging method.

thick client - A thick client (sometimes called a fat client) is a form of client-server architecture.

thick client (fat client) - A thick client (sometimes called a fat client) is a form of client-server architecture.

thick provision eager zeroed - Thick provision eager zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.

thick provision lazy zeroed - Thick provision lazy zeroed is a provisioning format for a virtual machine (VM) disk that creates a virtual disk in a default thick format.

thick provisioning - Thick provisioning pre-allocates storage capacity on a disk rather than on an as-needed basis.

Thicknet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.

Thickwire - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.

thin client - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.

thin client (lean client) - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.

thin film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).

thin film transistor - Active matrix (also known as thin film transistor or TFT) is a technology used in the flat panel liquid crystal displays of notebook and laptop computers.

thin hypervisor - A thin hypervisor is a stripped down hypervisor that allows multiple operating systems to run on one host.

thin provisioning - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.

thin provisioning (TP) - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.

thin server - In the computer industry, a thin server is a PC that contains just enough hardware and software to support a particular function that users can share in a network, such as access to files on a storage device, access to CD-ROM drives, printing, or Internet access.

thin-film disk - A thin-film disk is a hard disk storage medium with a very thin coating of a metallic alloy or glass instead of the usual carbon-based material found on other types of hard disks.

thin-film transistor - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).

thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).

ThinApp AppLink - VMware ThinApp AppLink is a packaging technology that makes one virtualized application dependent on another, so they can work together in one sandbox.

thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.

Thing hacking - Thing hacking is an attack that exploits a vulnerability in a connected non-computing device – a Thing, in the Internet of Things -- to gain control of the device or access to a network it connects to.

thingbot - A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet.

think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.

Thinnet - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.

Thinwire - Thicknet and Thinnet (sometimes called ThickWire and ThinWire) are commonly used terms for the larger and smaller size of coaxial cable used in Ethernet local area networks.

third generation of mobile telephony - 3G refers to the third generation of cellular technology that enables mobile telephony.

third party - A third party is an entity that is involved in some way in an interaction that is primarily between two other entities.

third party logistics - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.

third party relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.

third-party cookie - A third-party cookie is a cookie that is placed on a user's hard disk by a website from a domain other than the one a user is visiting.

third-party logistics - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.

third-party relay - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.

thought leader (thought leadership) - A thought leader is a person who or organization that is widely recognized as an expert in a given field and whose opinions are in high demand.

thought recognition - Thought recognition is the ability of a computer to recognize neural patterns in the brain as a form of input and control of computer processes.

thousands of lines of code - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.

thrashing - Thrashing is computer activity that makes little or no progress, usually because memory or other resources have become exhausted or too limited to perform needed operations.

thread - On the Internet in Usenet newsgroups and similar forums, a thread is a sequence of responses to an initial message posting.

THREAD protocol - The THREAD protocol is a home automation device communication method owned by Nest, a subsidiary of Google.

thread-safe - In computer programming, thread-safe describes a program portion or routine that can be called from multiple programming threads without unwanted interaction between the threads.

threat actor - A threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.

threat ignorance - Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack.

threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analyzed and refined information about current or potential attacks that could negatively affect an organization.

threat intelligence feed (TI feed) - A threat intelligence feed is an ongoing stream of data related to potential or current threats to an organization’s security.

threat intelligence service (TI service) - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.

threat management - Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels.

threat modeling - Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.

three dimensions - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.

three finger salute - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).

Three Laws of Robotics (Isaac Asimov) - Science-fiction author Isaac Asimov is often given credit for being the first person to use the term robotics in a short story composed in the 1940s.

three-dimensional - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.

three-factor authentication (3FA) - Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors – typically, the knowledge, possession and inherence categories.

three-phase commit (3PC) - Three-phase commit (3PC) is a protocol that consists of a distributed algorithm used to ensure all transactions in a system are agreed upon and are committed to.

throttled data transfer - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.

throughput - Throughput is a term used in information technology that indicates how many units of information can be processed in a set amount of time.

thumb drive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.

thumbdrive - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.

thumbnail - Thumbnail is a term used by graphic designers and photographers for a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.

Thunder (Salesforce Thunder) - Salesforce Thunder is a big data pipeline and rules engine designed to capture, filter and respond to events in real time; the platform was created to operate in streaming scenarios such as machine-to-machine (M2M) and Internet of Things (IoT) environments.

Thunderbolt - Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).

thunk - Thunk is programming that converts 16-bit memory address space into 32-bit memory address space and vice versa.

thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).

THz - The terahertz, abbreviated THz, is a unit of electromagnetic (EM) wave frequency equal to one trillion hertz (1012 Hz).

TIA - Total Information Awareness (TIA) is the name of a massive U.

TIA-942 - TIA-942 is a standard developed by the Telecommunications Industry Association (TIA) to define guidelines for planning and building data centers, particularly with regard to cabling systems and network design.

TIC - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.

ticket-granting ticket - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.

tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.

tier - In general, a tier (pronounced TEE-er ; from the medieval French tire meaning rank, as in a line of soldiers) is a row or layer in a series of similarly arranged objects.

Tier 0 - Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.

Tier 1 storage - Tier 1 storage is a reference to the higher performing systems in a tiered storage environment.

tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.

tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.

tiered storage - Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing the total cost of storage.

TIFF - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.

TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for exchanging raster graphics (bitmap) images between application programs, including those used for scanner images.

tiger team - In the computer industry, a tiger team is a group of programmers or users who volunteer or are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

tilda - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.

tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.

Tilded platform - The Tilded platform is a malicious software communicator specifically designed as a vessel for transmitting malware undetected.

Tim Berners-Lee - Tim Berners-Lee is the creator of the World Wide Web and director of the coordinating body for Web development, the W3C.

time - Time is an observed phenomenon, by means of which human beings sense and record changes in the environment and in the universe.

time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.

time bank - A time bank is a reciprocity-based work trading system in which hours are the currency.

time box - In agile software development, a timebox is a defined period of time during which a task must be accomplished.

time division multiple access - TDMA (time division multiple access) is a technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.

time division multiplexing - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

time division synchronous code division multiple access - TD-SCDMA (time division synchronous code division multiple access) is a mobile telephone standard for wireless network operators who want to move from a second generation (2G) wireless network to a third-generation (3G) one.

time management - Time management is the coordination of people's tasks and activities to maximize the effectiveness of their efforts.

time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.

time series database (TSDB) - A time series database (TSDB) is a software system optimized to sort and organize information measured by time.

time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.

time shifting - Timeshifting is the process of recording and storing data for later viewing, listening, or reading.

time stamp - A timestamp is the current time of an event that is recorded by a computer.

time to live - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.

time to value (TtV) - Time to value (TtV) is a business term that describes the period of time between a request for a specific value and the initial delivery of the value requested.

time value of money - Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.

time-based one-time password (TOTP) - A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems.

time-box - In agile software development, a timebox is a defined period of time during which a task must be accomplished.

time-division multiplexing - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

time-to-live - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.

time-to-live (TTL) - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.

timebox - In agile software development, a timebox is a defined period of time during which a task must be accomplished.

timeboxing - A timebox is a strictly-enforced limit on how long a given task or project can take: There is no allowance made for the possibility of extension.

timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.

timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.

times interest earned (TIE) - Times interest earned (TIE) is a metric used to measure a company’s manageable debt limits; by its ability to pay the monthly interest on it’s debts.

timeshifting - Timeshifting is the process of recording and storing data for later viewing, listening, or reading.

timestamp - A timestamp is the current time of an event that is recorded by a computer.

timing attack - A timing attack looks at how long it takes a system to do something and allows the attacker, through statistical analysis, to learn enough about the system to find the decryption key needed to gain access to it.

TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).

TIN number - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).

tin whiskers - Tin whiskers are individual crystals of tin that grow spontaneously from a tinned surface, usually as a result of stress of some sort.

tipping point - The tipping point is the critical point in an evolving situation that leads to a new and irreversible development.

TiVo - TiVo is a company offering a branded subscription-based interactive television service that lets viewers program and control which television shows they watch, and when.

Tivoli - Tivoli Systems is an IBM-owned company that develops software that allows a business to manage its computing environment.

Tizen - Tizen is an open source mobile operating system built on the Linux kernel and offered in versions for multiple platforms, including smartphones, tablets, wearable computers, netbooks, digital televisions and in-vehicle systems.

Tk - Tool Kit (Tk) is a companion program to Tool Command Language (Tcl) for creating graphical user interfaces.

TKIP - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.

TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.

tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.

TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.

TLD - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.

TLS - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.

TLS VPN - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.

TM - A triplecast (TM) is the simultaneous broadcast of a program on television, radio, and an Internet site or channel.

TMN - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.

TMN (Telecommunications Management Network) - TMN (Telecommunications Management Network) originated formally in 1988 under the auspices of the International Telecommunication Union (ITU-TS) as a strategic goal to create or identify standard interfaces that would allow a network to be managed consistently across all network element suppliers.

tModel - A tModel is a data structure representing a service type (a generic representation of a registered service) in the UDDI (Universal Description, Discovery, and Integration) registry.

TMQL - Topic Map Query Language (TMQL) is an XML-based extension of Structured Query Language (SQL), a query language developed for use in meeting the specialized data access requirements of Topic Maps (TMs).

TMS - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.

TN display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.

TNIC - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.

TO-DDI - For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.

TOC - The Theory of Constraints (TOC) is a philosophy of management and continuous improvement originally developed by Dr.

TOE - Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.

TOE - The TCP/IP offload engine (TOE for short) is a technology that is gaining popularity in high-speed Ethernet systems for the purpose of optimizing throughput.

ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.

TOGAF - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.

token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.

token ring - A token ring network connects computers in a ring or star topology to prevent the collision of data between two computers sending messages simultaneously.

tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.

TOLED - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).

TOLED (transparent organic light-emitting device) - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).

Tomcat - Tomcat is an application server from the Apache Software Foundation that executes Java servlets and renders Web pages that include Java Server Page coding.

tool bar - In the graphical user interface (GUI) for a computer, a toolbar is a horizontal row or vertical column of selectable image "buttons" that give the user a constantly visible reminder of and an easy way to select certain desktop or other application functions, such as saving or printing a document or moving pages forwards or backwards within a Web browser.

Tool Command Language - Tool Command Language (Tcl) is an interpreted script language developed by Dr.

Tool Command Language - Tcl is an interpreted script language from Sun Microsystems and Tcl is companion program for creating a Tcl graphical user interface (GUI).

Tool Command Language (Tcl) - Tool Command Language (Tcl) is an interpreted script language developed by Dr.

Tool Kit - Tool Kit (Tk) is a companion program to Tool Command Language (Tcl) for creating graphical user interfaces.

Tool Kit (Tk) - Tool Kit (Tk) is a companion program to Tool Command Language (Tcl) for creating graphical user interfaces.

toolbar - In the graphical user interface (GUI) for a computer, a toolbar is a horizontal row or vertical column of selectable image "buttons" that give the user a constantly visible reminder of and an easy way to select certain desktop or other application functions, such as saving or printing a document or moving pages forwards or backwards within a Web browser.

tooling - Tooling, also known as machine tooling, is the process of acquiring the manufacturing components and machines needed for production.

toothing - Toothing (sometimes called Bluetoothing) is the practice of contacting strangers via a Bluetooth wireless connection to flirt.

toothing - Bluejacking is the practice of sending messages between mobile users using a Bluetooth wireless connection.

toothing (Bluetoothing) - Toothing (sometimes called Bluetoothing) is the practice of contacting strangers via a Bluetooth wireless connection to flirt.

TOP - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.

Top 10 Spyware Threats - Visit our spyware feature page to learn more about this problem and how SMBs can beat it.

Top 9 Highest IT salaries in 2021 - Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.

top level domain - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.

top line - Top line is a number that represents a company’s gross revenue or sales from products or services; this figure is so-named because it appears at the top of an income statement.

top-level domain - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.

top-level domain (TLD) - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.

top-of-rack switching - Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.

Topic Map Query Language - Topic Map Query Language (TMQL) is an XML-based extension of Structured Query Language (SQL), a query language developed for use in meeting the specialized data access requirements of Topic Maps (TMs).

Topic Map Query Language (TMQL) - Topic Map Query Language (TMQL) is an XML-based extension of Structured Query Language (SQL), a query language developed for use in meeting the specialized data access requirements of Topic Maps (TMs).

topsite - A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.

Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.

toroid - A toroid is a coil of insulated or enameled wire wound on a donut-shaped form made of powdered iron.

torque - Torque is a twisting or turning force that tends to cause rotation around an axis; it can also be thought of as the ability of something that is rotating, such as a gear or a shaft, to overcome turning resistance.

torture test - A torture test is an evaluation of an item's ability to withstand extreme conditions.

Torvalds, Linus - Linus Torvalds, the creator of the Linux kernel, was born in Helsinki, Finland, on December 28, 1969.

ToS;DR - ToS;DR is a user rights initiative that breaks down good and bad points about the terms of service (ToS) and privacy policies for prominent websites and gives them an overall rating from Class A (very good) to Class E (very bad).

TOSCA (Topology and Orchestration Specification for Cloud Applications) - The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an open-source language used to describe the relationships and dependencies between services and applications that reside on a cloud computing platform.

Toslink connector - Toslink is a connector format for fiber optic digital audio cables.

Toslink plug - Toslink is a connector format for fiber optic digital audio cables.

total benefit of ownership (TBO) - Total benefit of ownership is the sum of measurable and intangible returns that a company receives from investing in assets and/or personnel.

total cost of ownership - Total cost of ownership is a calculation to assess direct and indirect expenses and benefits related to the purchase of a product or infrastructure component.

Total Information Awareness - Total Information Awareness (TIA) is the name of a massive U.

Total Information Awareness (TIA) - Total Information Awareness (TIA) is the name of a massive U.

Total Quality Management - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

total risk - Total risk is an assessment that identifies all of the risk factors, including potential internal and external threats and liabilities, associated with pursuing a specific plan or project or buying or selling an investment.

touch pad - A touch pad is a device for pointing (controlling input positioning) on a computer display screen.

touch pad (touchpad) - A touch pad is a device for pointing (controlling input positioning) on a computer display screen.

touch screen - A touch screen is a computer display screen that is also an input device.

touchpad - A touch pad is a device for pointing (controlling input positioning) on a computer display screen.

Tower of Hanoi backups - Tower of Hanoi is a complex tape backup strategy that's useful for archiving data for an extended period of time in an economical manner by using a cycle of exponential retention periods instead of a large number of tapes.

tower server - A tower server is a computer intended for use as a server and built in an upright cabinet that stands alone.

Toyota Way - The Toyota Way is a comprehensive expression of the company's management philosophy, which is based on the two foundational principles of Continuous Improvement (kaizen) and Respect for People.

TP - Thin provisioning (TP) is a method of optimizing the efficiency with which the available space is utilized in storage area networks.

TP0 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP0 TP4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP0-TP4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP1 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP2 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP3 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TP4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

TPC - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.

TPM - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.

TPS - A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets.

TQM - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

trace route - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.

traceability - Traceability, in supply chain management, is the ability to identify, track and trace elements of a product or substance as it moves along the supply chain from raw goods to finished products.

traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.

track back - TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts.

Track Points - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.

TrackBack - TrackBack is a technical specification for an Internet program that allows a blogger to know when another blogger has commented upon one of his posts.

trackball - A trackball is a computer cursor control device used in many notebook and laptop computers.

tracking array - A tracking array is a collection of solar panels that turn to follow the path of the sun in order to maximize the solar radiation on the photovoltaic (PV) surface and convert light into electrical current.

tracking software - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

TrackPoint - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.

TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.

trademark - A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and sometimes legally registered as a representation of a company.

traffic engineering - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.

traffic management - Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network.

traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

tragedy of the commons - The tragedy of the commons is a problem that occurs when individuals exploit a shared resource to the extent that demand overwhelms supply and the resource becomes unavailable to some or all.

Transact SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

transact-SQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

transaction - In computer programming, a transaction usually means a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.

transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.

Transaction Processing Performance Council - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.

Transaction Processing Performance Council (TPC) - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.

Transaction Server - This definition is generally duplicated under Viper.

Transaction Server (Viper) - This definition is generally duplicated under Viper.

transactional data - Transactional data, in the context of data management, is the information recorded from transactions.

transactional leadership - Transactional leadership is a leadership style where the executive relies on rewards and punishments to achieve optimal job performance from his or her subordinates.

transactional marketing - Transactional marketing is a business strategy that focuses on single, "point of sale" transactions.

Transactions for UNIX Enhanced for Distributed Operation - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.

transceiver - A transceiver is a combination transmitter/receiver in a single package.

transcendental number - A transcendental number is a real number that is not the solution of any single-variable polynomial equation whose coefficients are all integers.

transcoding - Transcoding is the ability to adapt digital files so that content can be viewed on different playback devices.

transconductance - Transconductance is an expression of the performance of a bipolar transistoror field-effect transistor (FET).

transcription error - A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs.

transducer - A transducer is an electronic device that converts energy from one form to another.

transfer learning - Transfer learning is the application of knowledge gained from completing one task to help solve a different, but related, problem.

transformational leadership - Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.

transformative technology - Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.

transient cookie - On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.

transient cookie (session cookie) - On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.

transistor - The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.

transistor to transistor logic - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.

transistor-to-transistor logic - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.

transistor-to-transistor logic (TTL) - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.

transit - Transit is the connection to and use of a telecommunication path provided by a vendor.

transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.

transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.

translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.

Transmission Control Protocol - TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.

Transmission Control Protocol Internet Protocol - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

Transmission Control Protocol/Internet Protocol - TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

transparency - Transparency, in the context of governance, means being open and honest in all official activities.

transparent - In computers, transparent means something a little different than its general meaning of having the quality of being easily seen through, coming closer to meaning invisible or undetectable.

transparent addressing - On a wide area network (WAN), transparent addressing is a method of network addressing in which all intermediate node addresses are spoofed, so the client and server see each other's addresses and port configurations as if there were no intermediate nodes.

transparent aluminum - Transparent aluminum is a form of aluminum that is see-through.

transparent computing - Transparent computing is a characteristic of pervasive computing, the possible future state in which we will be surrounded by computers everywhere in the environment that respond to our needs without our conscious use.

transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.

Transparent Interconnection of Lots of Links - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.

Transparent Interconnection of Lots of Links (TRILL) - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.

transparent organic light emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).

transparent organic light-emitting device - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).

transparent page sharing - Transparent page sharing (TPS) is a memory management technology in virtualization.

transparent semiconductor - A transparent semiconductor is a substance that can be used to manufacture see-through electronic components and circuits.

transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.

transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.

Transport layer protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

Transport Layer Security - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.

Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.

transport protocols - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

transport protocols 0 to 4 - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.

Transport Services Access Point - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.

Transportation Management System - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.

transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.

trap - In a Web site, a trap is a page that does not allow the reader to back up a previous page (the Back button on the toolbar is inoperable).

trap door - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

trapdoor - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

Travan - Travan is a linear magnetic tape product developed by the 3M Company.

travel and expense software (T & E software) - Travel and expense (T&E) software is programming that allows an organization to track and approve reimbursement for the cost of a business trip.

traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.

traveling wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.

traveling-wave tube - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.

traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.

Traversal Using Relay NAT - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.

Traversal Using Relay NAT (TURN) - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.

treasury management - Treasury management is the administration of a company’s cash flow as well as the creation and governance of policies and procedures that ensure the company manages risk successfully.

tree map - A heat map is a two-dimensional representation of data in which values are represented by colors.

tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.

tree structure - A tree structure is an algorithm for placing and locating files (called records or keys) in a database.

treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.

Trema - Trema is an open source framework for developing OpenFlow controllers for software-defined networking in the Ruby and C programming languages.

triage - Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.

triangulation - Triangulation is a process by which the location of a radio transmitter can be determined by measuring either the radial distance, or the direction, of the received signal from two or three different points.

Trick or Treat Halloween Quiz - This WhatIs.

TrickBot malware - A TrickBot is malware designed to steal banking information.

trigger - A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.

trigraph - A trigraph is a three-character replacement for a special or nonstandard character in a text file.

TRILL - Transparent Interconnection of Lots of Links (TRILL) is the Internet Engineering Task Force’s specification for enabling multi-pathing in the data center.

trillion-node network - A trillion-node network refers to a near future state wherein trillions of devices, people, organizations, places and things are connected to the Internet.

trinary - Trinary logic is three-level digital logic, with states represented by the numbers -1, 0, and 1.

trip unit - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.

trip unit (circuit breaker) - A trip unit is the part of a circuit breaker that opens the circuit in the event of a thermal overload, short circuit or ground fault.

triple bottom line - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.

triple bottom line (3BL) - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.

triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.

triple homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.

triple-homed firewall - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.

triple-play network - A triple-play network is one in which voice, video and data are all provided in a single access subscription.

triplewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.

Trivial File Transfer Protocol - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.

Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.

Trojan - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.

Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.

troll - As used on the Internet: As a verb, the practice of trying to lure other Internet users into sending responses to carefully-designed incorrect statements or similar "bait.

trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.

TRON - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.

TRON (The Real-Time Operating System Nucleus) - TRON (The Real-Time Operating System Nucleus) is a standard real-time operating system (RTOS) kernel that can be tailored to any embedded system.

tropo - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.

tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.

trouble report - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.

trouble ticket - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.

trouble ticket (trouble report) - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.

troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.

true color - True color is the specification of the color of a pixel on a display screen using a 24-bit value, which allows the possibility of up to 16,777,216 possible colors.

true HD - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.

true HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.

true multitasking - True multitasking is the capacity of an operating system to carry out two or more tasks simultaneously rather than switching from one task to another.

true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.

TrueCrypt - TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

TrueType - Created at Apple Computer, TrueType was designed to fill the need for an optimized, scalable font format.

TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.

truncate - To truncate is to shorten by cutting off.

truncation error - Truncation error is the difference between a truncated value and the actual value.

trunk - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

trunk - A trunk, in the context of software development, is the base code from which a branch is taken to be worked with.

trunking - A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

Trusted Cloud Initiative - The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations and practices.

trusted computing - Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications.

trusted computing base - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.

trusted computing base (TCB) - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.

Trusted Computing Group - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.

Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.

trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.

Trusted Internet Connections - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.

Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.

trusted PC - The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure.

trusted platform module - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.

Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.

truth table - A truth table is a breakdown of a logic function by listing all possible values the function can attain.

TSAP - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.

TSQL - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

TSR - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.

Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.

TTL - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.

TTL - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded.

TTS - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.

TTY - A teletypewriter (TTY) is an input device that allows alphanumeric character to be typed in and sent, usually one at a time as they are typed, to a computer or a printer.

tty command - A tty command in Linux and other Unix-like operating systems is a shell command that can be entered interactively or as part of a script to determine whether the output for the script is a terminal (that is, to an interactive user) or to some other destination such as another program or a printer.

tumblelog - A tumblelog is a blog that supports short-form mixed media content.

Tumblr - Tumblr is a free microblogging site.

tunnel - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.

tunnel injection - Tunnel injection, also called Fowler-Nordheim tunnel injection, is the process by which data is written to NAND flash memory.

tunnel release - Tunnel release, also called Fowler-Nordheim tunnel release, is the process by which data is erased from NAND flash memory.

tunneling or port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.

tuple - In programming languages, such as Lisp, Python, Linda, and others, a tuple (pronounced TUH-pul) is an ordered set of values.

turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.

TurboTax - TurboTax is tax preparation software for United States and Canadian tax returns.

Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.

TURN - Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications device operating behind a Network Address Translator (NAT) or firewall.

turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.

turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.

turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.

turnover - In a general context, churn is a synonym for agitation or turnover.

Tux - Tux, the penguin, is the generally accepted official logo for the Linux operating system.

Tuxedo - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.

Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.

TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).

TV/IP - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.

TWAIN - TWAIN is a widely-used program that lets you scan an image (using a scanner) directly into the application (such as PhotoShop) where you want to work with the image.

tweak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.

tweak freak - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.

tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.

tweaker - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.

TweakUI - TweakUI is a software utility that lets Windows 9x, Windows NT, and Windows 2000 users modify the desktop user interface and other system characteristics to their liking.

tweet - A tweet is a post on Twitter.

tweet jam - A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period.

tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.

twentieth of a point - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.

twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.

twin spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.

twin-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.

twip - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.

twip (twentieth of a point) - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.

twips - A twip (twentieth of a point) is a measure used in laying out space or defining objects on a page or other area that is to be printed or displayed on a computer screen.

twisted nematic display - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.

twisted nematic display (TN display) - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.

twisted pair - Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company.

Twitch - Twitch (Twitch.

Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.

Twitter essay - A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets.

Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.

Twitterbot - A Twitterbot (sometimes spelled "Twitter bot") is a software program that posts automated tweets on Twitter.

two dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.

two pizza rule - The two pizza rule is a guideline for limiting the number of attendees at a meeting.

two spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.

two-dimensional barcode - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.

two-factor authentication (2FA) - Two-factor authentication (2FA) is a verification process in which the user provides two different authentication factors to prove their identity.

two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.

two-speed IT - Two-speed IT is the concept that strategic planning for an IT department should include a fast track that allows some projects to be implemented quickly.

two-spindle system - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.

two-spindle system (twin-spindle system) - A two-spindle system, also called a twin-spindle system, is a computer design with two internal storage drives.

two-step verification - Two-step verification requires the sequential use of two authentication methods to verify that someone or something is who or what they are declared to be.

two-tier ERP - Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.

two-way authentication - Mutual authentication, also called two-way authentication, is a process or technology in which both entities in a communications link authenticate each other.

two-way pager - A two-way pager is a pager that allows you to send data as well as receive it.

two-way server - A two-way server is a server that incorporates a multi-core processor for increased performance.

Twofish - Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm.

TWT - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.

Tyk - Tyk is an open source application program interface (API) gateway management tool.

type - A point is a standard measurement unit for type sizes.

Type 2 hypervisor - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.

Type 2 hypervisor (hosted hypervisor) - A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system.

type I error - False rejection, also called a type I error, is a mistake occasionally made by biometric security systems.

type II error - False acceptance, also called a type II error, is a mistake occasionally made by biometric security systems.

typeface - A typeface is a design for a set of printer or display font s, each for a set of characters, in a number of specific sizes.

typosquatting - Typosquatting is a form of Internet cybersquatting, based on the probability that a certain number of Internet users will mistype the name of a Web site (or actually its URL) when surfing the Web.

Previous
Previous

Glossary Letter S