(tun´&l-ing) (n.) A technology that enables one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft’s PPTP technology enables organizations to use the Internet to transmit data across a VPN. It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet.
Tunneling is also called encapsulation.
In relational database systems, a record. See under record.
(1) See Turing test. (2) See Alan Turing. (3) See turing number.
- turing number
) Abbreviated as TN, turning number is a randomly generated security code, usually a series of digits, displayed as an image that users may need to read and copy into a form field in order to submit or validate a form submission online via a Web browser. Turing numbers are used to ensure there is […]
Refers to a system or software package that has been built, installed or supplied by the manufacturer complete and ready to operate. In the computer industry, the term is used to promote a system that can be easily set up and operated “right out of the box.”
- turnkey system
A computer system that has been customized for a particular application. The term derives from the idea that the end user can just turn a key and the system is ready to go. Turnkey systems include all the hardware and software necessary for the particular application. They are usually developed by OEMs (original equipment manufacturers) […]