TrackBack is a type of peer-to-peer communication system that was designed to send notification of updates between two Web sites via a Trackback Ping. Ping in reference to TrackBack refers to a small message sent from one Web server to another. TrackBacks are useful for informing a Web site that you have referenced its Web site within your own Web site, and is popular with bloggers.
TrackBack was first released as an open specification in August 2002.
- Transmission Sequence Number
Abbreviated as TSN, a Transmission Sequence Number is a 32-bit sequence number used internally by SCTP (Stream Control Transmission Protocol). A TSN is attached to each unit of information within an SCTP packet (also called a chunk) containing user data to permit the receiving SCTP endpoint to acknowledge its receipt.
A magnetic tape technology developed by 3M Corporation that allows for higher data densities. Travan has been standardized by the QIC consortium, and is backward compatible with older QIC standards. This means that Travan tape drives can read and write older QIC tapes a well as the newer high-capacity Travan tapes. The following table shows […]
Created by Cerulean Studios and released in 2001, Trillian is a multiheaded IM client that connects users of multiple public IM services such as AIM, Windows Live Messenger, Jabber, Skype and more. If you have friends on different networks, you can use Trillian to manage your various IM accounts. When you log in to Trillian, […]
A feature of the Data Set management command available in the ATA8-ACS-2 specification. The command is used in the operating system used to wipe invalid data blocks on solid-state drives (SSD) which are no longer in use – including data blocks which have been left by deleted files. Traditionally, flash media could not overwrite existing […]
- Triple DES
Also referred to as 3DES, a mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and the resulting cipher text is again encrypted with a third key).