The process of optimizing the performance of a telecommunications network by dynamically analyzing, predicting, and regulating the behavior of data transmitted over that network, often using sophisticated modeling and simulation techniques.
You will find this term commonly used in Networking, Telecommunications
The practice of managing data transfer on networks through the prioritization of certain data streams, controlling bandwidth allocation, and managing network congestion to ensure efficient and reliable data transmission.
You will find this term commonly used in Networking, IT Management
The practice of regulating network traffic to optimize or guarantee performance, improve latency, or increase usable bandwidth for some applications over others.
You will find this term commonly used in Networking
A sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.
You will find this term commonly used in Databases
A log that records all transactions that have been executed by a system to ensure data integrity.
You will find this term commonly used in Databases
The collection, storage, modification, and retrieval of transactions of an enterprise. Transaction processing ensures that data integrity is maintained in multi-access environments and in the event of system failure.
You will find this term commonly used in Databases, General IT
A type of database that prioritizes correct and complete transactions. It uses a series of operations that are treated as a single unit, ensuring that either all operations within the transaction are completed or none are.
You will find this term commonly used in Databases
Email sent to facilitate an agreed-upon transaction between the sender and the recipient. Transactional emails are typically automated and triggered by a user's actions, such as order confirmations, receipts, and password resets.
You will find this term commonly used in Communications, E-commerce
A concurrency control mechanism that simplifies the development of concurrent programs by allowing blocks of instructions to execute in an atomic manner.
You will find this term commonly used in Software Development
A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver. Transceivers are used in networking to connect nodes and facilitate communication.
You will find this term commonly used in Networking
Including part of a document within another document by reference.
You will find this term commonly used in Web Development
The direct digital-to-digital conversion of one encoding to another. This is often done to incompatible or obsolete data in order to convert it into a more suitable format.
You will find this term commonly used in Digital Media
The process of converting a media file or stream from one format to another, typically to ensure compatibility across different platforms and devices. It is crucial in digital media distribution to accommodate various bandwidths and device capabilities.
You will find this term commonly used in Digital Media, Networking
A set of rules that define how data is transferred over a network.
You will find this term commonly used in Networking
A deep learning model architecture used primarily in the field of natural language processing (NLP).
You will find this term commonly used in AI
A type of deep learning model that relies on self-attention mechanisms to draw global dependencies between input and output, widely used in the field of natural language processing (NLP).
You will find this term commonly used in AI
A fault in a system that occurs briefly and then disappears, making it difficult to detect and fix.
You will find this term commonly used in Hardware/Software
In computing, a transient state refers to a temporary condition of a system or process. This term is often used in relation to network connections, virtual machines, and in programming during the initialization or cleanup processes.
You will find this term commonly used in General IT, Software Development
A semiconductor device used to amplify or switch electronic signals and electrical power. Transistors are one of the basic building blocks of modern electronics.
You will find this term commonly used in Electronics, Hardware
A system of implementing logical functions using the properties of transistors.
You will find this term commonly used in Hardware
A memory cache that stores recent translations of virtual memory to physical memory addresses.
You will find this term commonly used in Hardware
In computing, transparency refers to a system's ability to hide the complexity of its processes from its users. For example, distributed systems strive for location transparency, where users don't need to know the physical location of resources.
You will find this term commonly used in General IT, Systems Design
The quality of a system or system component being invisible to the user or not requiring the user to be aware of its complexity or inner workings.
You will find this term commonly used in General IT
The principle that algorithms should be understandable and their actions predictable to those affected by their decisions.
You will find this term commonly used in AI/Ethics
A type of compiler that transforms source code written in one programming language into another programming language. Transpilers are often used to convert newer versions of programming languages into versions compatible with older environments.
You will find this term commonly used in Software Development
A type of compiler that takes the source code of a program written in one programming language and produces the equivalent source code in another language.
You will find this term commonly used in Software Development
The fourth layer in the OSI model of computer networking. The transport layer is responsible for the transfer of data between end systems or hosts and is where session management, segmentation, and error checking occur.
You will find this term commonly used in Networking
A protocol that delivers data across a network, such as TCP or UDP.
You will find this term commonly used in Networking
An algorithm used to visit all the nodes of a graph or tree data structure.
You will find this term commonly used in Algorithms
A widely used abstract data type (ADT) or data structure that simulates a hierarchical tree structure, with a root value and subtrees of children, represented as a set of linked nodes.
You will find this term commonly used in Data Structures
A hierarchical structure that simulates a tree with a single root and branches out to leaves. In computing, it is used in data structures, algorithms, and file systems to organize data.
You will find this term commonly used in Software Development, Algorithms
A network topology in which all the nodes are connected to a central node in a hierarchy that resembles a tree structure. This topology combines the characteristics of linear bus and star topologies.
You will find this term commonly used in Networking
The process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The most common types are in-order, pre-order, and post-order traversal.
You will find this term commonly used in Algorithms, Data Structures
A visual representation of hierarchical data using nested rectangles.
You will find this term commonly used in Data Visualization
A web-based, Kanban-style, list-making application and is a subsidiary of Atlassian.
You will find this term commonly used in Project Management, Collaboration
The practice of collecting data and attempting to spot a pattern, often used in data analysis and forecasting.
You will find this term commonly used in Data Science
A term used in wireless communications to denote capabilities or devices that operate over three different frequencies or bands. It is often used in the context of Wi-Fi routers and mobile phones.
You will find this term commonly used in Networking, Wireless Communications
In computing, a method for determining the location of a point by forming triangles to it from known points.
You will find this term commonly used in GIS/Location Services
A charging process that maintains a full charge by applying a small amount of current.
You will find this term commonly used in Hardware
A procedural code that is automatically executed in response to certain events on a particular table or view in a database.
You will find this term commonly used in Databases
A command that enables an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally.
You will find this term commonly used in Hardware
A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. It is a method of increasing the security of DES by applying it three times to each data block.
You will find this term commonly used in Security, Cybersecurity
A condition in a CPU that occurs when an exception is generated while trying to call an exception handler.
You will find this term commonly used in Hardware
In telecommunications, triple play service is a marketing term for the provisioning of the three services: high-speed Internet access, television, and telephone over a single broadband connection.
You will find this term commonly used in Networking, Telecommunications
A type of database used for storing and retrieving data in the form of triples, using the subject-predicate-object model. This is often used in storing, querying, and managing RDF (Resource Description Framework) data.
You will find this term commonly used in Databases, Web Development
An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It was developed to overcome the limitations of DES by increasing the encryption level through multiple encryptions.
You will find this term commonly used in Security, Cryptography
A simple, lightweight version of the File Transfer Protocol (FTP) that allows files to be transferred from one computer to another over a network. TFTP is used for transferring small files across networks, such as when booting a computer from a network.
You will find this term commonly used in Networking
A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
You will find this term commonly used in Cybersecurity
Malicious software disguised as legitimate programs or files, which, when executed, perform unauthorized actions on a computer system.
You will find this term commonly used in Cybersecurity
A thought experiment in ethics and AI that highlights the dilemma of programming moral decisions into autonomous machines.
You will find this term commonly used in AI Ethics
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.