TruSurround XT is the second generation of SRS TruSurround. Building upon its patented predecessor, TruSurround XT solves the problem of playing 5.1 or 6.1 multichannel content over two speakers (or headphones). TruSurround XT accepts input from up to a seven channel (6.1) audio source and processing a two-channel output. When receiving multichannel content, TruSurround XT virtualizes the channels, creating “phantom” speakers that appear to extend all around the listener. When receiving mono or stereo content, TruSurround XT presents an expansive three dimensional sound field.
Short for True Flash File System TrueFFS is a technology patented by msystems (formerly M-Systems) for flash drive management. TrueFFS enables flash products to fully emulate hard disks when connected to the host processor.
An outline font technology developed jointly by Microsoft and Apple. Because TrueType support is built into all Windows and Macintosh operating systems, anyone using these operating systems can create documents using TrueType fonts. Since being introduced in 1991, TrueType has quickly become the dominant font technology for everyday use, and is even displacing PostScript in […]
- Trusted Platform Module (TPM) Definition
Trusted Platform Module (TPM) is a hardware device that is basically a secure micro-controller with added cryptographic functionality. It works with supporting software and firmware to prevent unauthorized access to a notebook computer. The TPM contains a hardware engine to perform up to 2048-bit RSA encryption/decryption. The TPM uses its built-in RSA engine during digital […]
- Tunnel Broker
In computer networking terminology, a tunnel broker is the phrase used to describe a service that provides a network tunnel. The Tunnel Broker model is based on dedicated servers called Tunnel Brokers that automatically manage tunnel requests coming from users. The most common usage of the phrase is in reference to IPv6, where a tunnel […]
- Tunneling Virus
A type of virus that attempts installation beneath the antivirus program by directly intercepting the interrupt handlers of the operating system to evade detection.