Browse Definitions by Alphabet
- timing attack - A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system.
- TIN (Taxpayer Identification Number) - A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).
- TL;DR (too long; didn't read) - TL;DR is an abbreviation for "too long; didn't read.
- TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
- ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
- token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
- token ring - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
- tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
- Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
- Top 9 Highest IT salaries in 2021 - Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.
- Top searches of 2008 - What were people searching the WhatIs.
- top-of-rack switching - Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other switches located within the same or adjacent rack connect to an in-rack network switch.
- Tor browser - The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis.
- toroid - A toroid is a coil of insulated or enameled wire wound on a donut-shaped form made of powdered iron.
- TOSCA (Topology and Orchestration Specification for Cloud Applications) - The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an open source language used to describe the relationships and dependencies between services and applications that reside on a cloud computing platform.
- Total Quality Management (TQM) - Total Quality Management (TQM) is a management framework based on the belief that an organization can build long-term success by having all its members -- from low-level workers to its highest-ranking executives -- focus on improving quality and, thus, delivering customer satisfaction.
- total risk - Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.
- touch screen - A touch screen is an electronic display screen that is also an input device.
- Toyota Way - The Toyota Way is a comprehensive expression of the company's management philosophy, which is based on the two foundational pillars of Continuous Improvement, also known as kaizen, and Respect for People.
- traceability - Traceability, in supply chain traceability, is the ability to identify, track and trace elements of a product or substance as it moves along the supply chain from raw goods to finished products.
- traceroute - Traceroute is a command-line utility that returns information about the communication route between two nodes on an Internet Protocol (IP) network.
- trackball - A trackball is a computer cursor control device used in many laptop computer keyboards and older versions of computer mice.
- TrackPoint (pointing stick) - A TrackPoint, also called a pointing stick, is a cursor control device found in Lenovo ThinkPad notebook computers.
- traffic shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
- transaction - In computing, a transaction is a set of related tasks treated as a single action.
- transactional data - In computing, transactional data is the information collected from transactions.
- transactional leadership - Transactional leadership, also known as managerial leadership, is a leadership style where leaders rely on rewards and punishments to achieve optimal job performance from their subordinates.
- transceiver - A transceiver is a combination transmitter/receiver in a single package.
- transconductance - Transconductance is an expression of the performance of a bipolar transistoror field-effect transistor (FET).
- transcription error - A transcription error is a type of data entry error commonly made by human operators or by optical character recognition (OCR) programs.
- transducer - A transducer is an electronic device that converts energy from one form to another.
- transformational leadership - Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.
- transformative technology - Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.
- transformer model - A transformer model is a neural network architecture that can automatically transform one type of input into another type of output.
- transistor-to-transistor logic (TTL) - Transistor-to-transistor logic -- also known as simply transistor-transistor logic or TTL -- is a family of digital logic design built from a family of bipolar junction transistors that act on direct-current pulses.
- transitive trust - Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest.
- translation lookaside buffer (TLB) - A translation lookaside buffer (TLB) is a type of memory cache that stores recent translations of virtual memory to physical addresses to enable faster retrieval.
- Transmission Control Protocol (TCP) - Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network.
- transparency - Transparency is the quality of being easily seen through, while transparency in a business or governance context refers to being open and honest.
- transponder - A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.
- transport layer - The transport layer is Layer 4 of the Open Systems Interconnection (OSI) communications model.
- Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
- transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
- traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
- tree structure - A tree data structure is an algorithm for placing and locating files (called records or keys) in a database.
- treemap - A treemap is a visual method for displaying hierarchical data that uses nested rectangles to represent the branches of a tree diagram.
- triage in IT - Triage is a term referring to the assignment of priority levels to tasks or individuals to determine the most effective order in which to deal with them.
- TrickBot malware - TrickBot is sophisticated modular malware that started as a banking Trojan but has evolved to support many different types of attacks, including ransomware.
- triple constraint - The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.
- triple extortion ransomware - Triple extortion ransomware is a type of ransomware attack where a cybercriminal extorts their victim multiple times, namely by encrypting data, exfiltrating data to expose and threatening a third attack vector.
- Trojan horse - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
- trolling - Trolling, in the context of the web, is the act of responding to online content or comments in a purposely disruptive fashion.
- troubleshooting - Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
- true power - True power is the power manifested in tangible form such as electromagnetic radiation, acoustic waves, or mechanical phenomena.
- TrueView ad - TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds.
- truncation error - A truncation error is the difference between an actual and a truncated, or cut-off, value.
- trunk (trunking) - A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
- trunk-based development - In software development, a trunk is the base code into which all subsequent code is merged.
- trusted computing base (TCB) - A trusted computing base (TCB) is everything in a computing system that provides a secure environment for operations.
- trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system's main operating system (OS).
- Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
- truth table - A truth table is a breakdown of all the possible truth values returned by a logical expression.
- Tumblr - Tumblr is a free microblogging site.
- tunneling or port forwarding - Tunneling or port forwarding is the transmission of data intended for use only within a private -- usually corporate -- network through a public network in such a way that the public network's routing nodes are unaware that the transmission is part of a private network.
- tuple - A tuple, pronounced TUH-pul, is an ordered and finite list of elements in various fields of interest, including computing.
- turbine - A turbine is a machine that plays a key role in transforming fluid or air energy into usable work or electricity.
- turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
- tvOS - TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.
- tweet - A tweet is a post on Twitter.
- twisted pair - Twisted pair is the ordinary copper wire that connects home and business computers to a telephone company.
- Twitch - Twitch (Twitch.
- Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
- two pizza rule - The two pizza rule is a guideline for limiting the number of attendees at a meeting.
- two-step verification - Two-step verification is a process that involves two authentication steps performed one after the other to verify that someone or something requesting access is who or what they say they are.
- two-tier ERP - Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.
- Twofish - Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.
- Tyk - Tyk is an open source application program interface (API) gateway management tool.
- Type 2 hypervisor (hosted hypervisor) - A Type 2 hypervisor is a virtual machine (VM) manager that is installed as a software application on an existing operating system (OS).
- What is a thin client (lean client)? - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stores on a central server instead of a computer's resources.
- What is a third-party cookie? - A third-party cookie is a cookie that's placed on a user's device -- computer, cellphone or tablet -- by a website from a domain other than the one the user is visiting.
- What is a transistor? - A transistor is a miniature semiconductor that regulates or controls current or voltage flow in addition to amplifying and generating these electrical signals and acting as a switch/gate for them.
- What is tailgating (piggybacking)? - Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or alarm) system.
- What is TCP/IP? - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
- What is telephony? - Telephony is technology associated with interactive communication between two or more physically distant parties using the electronic transmission of data.
- What is the triple bottom line (TBL)? - The triple bottom line (TBL) is a sustainability-based accounting framework that includes social, environmental and financial factors as bottom-line categories.
- What is the Turing Test? - A Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether or not a computer is capable of thinking like a human being.
- What is threat detection and response (TDR)? Complete guide - Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be done to an organization.
- What is threat intelligence? - Threat intelligence, also known as cyberthreat intelligence, is information gathered from a range of sources about current or potential attacks against an organization.
- What is transactional marketing? - Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.
- What is transfer learning? - Transfer learning is a machine learning (ML) technique where an already developed ML model is reused in another task.
- What is two-factor authentication (2FA)? - Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.
- What is two-phase commit (2PC)? - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.