DictionaryForumContacts

   English thesaurus
A B C D E G H I J K L M N O P Q R S T U V W X Y Z   <<  >>
Terms for subject Information technology (11513 entries)
third-party review An independent audit of the control structure of a service organization, such as a service bureau, with the objective of providing assurance to the users of the service organization that the internal control structure is adequate, effective and sound
Governance of enterprise IT this also includes the functional governance of IT, i.e., ensuring that IT capabilities are provided efficiently and effectively.
Thomas Conrad Network System TCNS
Thousand Astronomical Units TAU
kdsi thousand of delivered source instructions
Thread Level Parallelism TLP
Threaded Neill Concelman TNC
threat Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm
threat agent Methods and things used to exploit a vulnerability
threat analysis An evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets
threat event Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
threat vector The path or route used by the adversary to gain access to the target
threats (SWOT) A combination of an organizational audit listing the enterprise’s strengths and weaknesses and an environmental scan or analysis of external opportunities and threats
throughput The quantity of useful work made by the system per unit of time. Throughput can be measured in instructions per second or some other unit of performance. When referring to a data transfer operation, throughput measures the useful data transfer rate and is expressed in kbps, Mbps and Gbps.
thanks ths
thulium orthoferrite TmFeO3 Michae­lBurov
Thx thanks
Tiled Raster Interchange Format TRIF
Time Assignment,ed Speech Interpolation TASI
Time Assigned Data Interpolation TADI