MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with T
  • ThinApp

    VMware ThinApp (aka Thinstall) is an application virtualization solution which is able to execute applications without them being installed in the traditional sense by virtualizing resources such as environment variables, files and Windows Registry keys.

    IT Courses & Reviews (3)
  • Third-Generation Language (3GL)

    A "high-level" programming language, such as PL/I, C, or Java.

  • Third-generation mobile telephony (3G)

    A set of standards used for mobile devices and mobile telecommunication services and networks. 3G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV. 

  • Thomson Reuters Dealing Aggregator

    Thomson Reuters Dealing Aggregator (TRDA) allows you to contact and trade with your peers and counterparties quickly, efficiently, and confidently, across a highly secure and reliable network. It adds intelligence, functionality and control to run your own execution strategies alongside Thomson Reuters Dealing Aggregator's built-in FX order strategies and other advanced algorithms, incorporating the liquidity at your firm and across the whole market.

  • Threat Modeling

    Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.

    IT Courses & Reviews (1)
  • Throttled data transfer

    The deliberate regulation of the data transfer rate in a communications system. Data transfer throttling can be used in any scenario where it is necessary or desirable to limit the amount of data that can be sent or received per unit time.

  • Thunderbolt

    Thunderbolt (codenamed Light Peak) is a hardware interface that allows for the connection of external peripherals to a computer. It uses the same connector as Mini DisplayPort (MDP). Thunderbolt combines PCI Express (PCIe) and DisplayPort (DP) into one serial signal alongside a DC connection for electric power, transmitted over one cable. Up to six peripherals may be supported by one connector through various topologies.

  • TIBCO Software

    A provider of infrastructure software for companies to use on-premise or as part of cloud computing environments.

  • Tiered storage

    The assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use, and other considerations. 

  • Tilded platform

    A malicious software configuration file designed to allow malware to be transmitted undetected. The platform operates as a driver, loading an encrypted malware module into target systems.

  • Time Division Multiple Access (TDMA)

    A technology used in digital cellular telephone communication that divides each cellular channel into three time slots in order to increase the amount of data that can be carried.  

  • Time Division Synchronous Code Division Multiple Access (TD-SCDMA)

    A mobile telephone standard for wireless network operators who want to move from a 2G to a 3G wireless network .It supports data transmission at speeds up to 2 Mbps, and combines support for both circuit-switched and packet-switched data.

  • Time Management

    Time management is the act or process of planning and exercising conscious control over the amount of time spent on specific activities, especially to increase effectiveness, efficiency or productivity. Time management may be aided by a range of skills, tools, and techniques used to manage time when accomplishing specific tasks, projects and goals complying with a due date.

  • Time management software

    A software tool that helps in planning of tasks systematically to ensure deadlines are met and time is utilized eficiently.

  • Time-Division Multiplexing (TDM)

    A method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration. Each individual data stream is reassembled at the receiving end based on the timing.

  • Time-To-Live (TTL)

    A value in an Internet Protocol (IP) packet that tells a network router whether or not the packet has been in the network too long and should be discarded. 

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to