The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


938 INDEX

Teams, virtual,V3:600 –607
Team theory,V2:72–73
Technical benchmarks,V1:65–66
Technical standards, uniform,V2: 60
Technical support, Web-based,V3: 242
Technical tests, in biometric
authentication,V1:76 –77
Technological innovations,V2: 834
Technological trends, telecommuting and,
V3: 443
Technologies.See alsoTechnology entries
anti-macro-virus,V1: 254
e-commerce-related,V1: 607
e-marketplace,V1: 680
e-procurement,V1:649–650
firewall,V1:836 –837
intelligent agent,V2:193–194
intranet,V2:348–349
inventory management,V2: 369
merging,V1: 660
multimedia,V1:295–299
online news,V2: 758
personalization and customization,
V3:51–63
risk,V3: 232
supply network,V3: 407
Technology.See alsoInformation
Technology (IT); Technologies
B2B e-commerce and,V1:106 –107,
116 –117
computer security incident response
teams and,V1:243–244
e-business and,V1: 723
failure,V1: 536
gender differences in attitudes toward,
V2: 18
S-curve process in,V1:470 – 471
telephone,V1: 296
top ten issues in,V3: 146
training,V1: 472
Technology Acceptance Model (TAM),
V2: 15
Technology Achievement Index (TAI),
V1: 435
Technology convergence, social effects of,
V1:300 –301
Technology diffusion,V1: 470
Technology, Education and Copyright
Harmonization Act of 2002 (TEACH
Act),V2: 484
Technology-enhanced marketing
communication,V2:563–564
Technology initiatives,V1:653–654
Technology Opportunities Program (TOP),
V1: 598
Technology-related skills, culture and,
V2: 16
Technology risks,V3:222–223
Technophobia,V2: 109
Technostress,V2: 108
Telco systems,V1: 699
Telecine process,V3: 541
Telecommunication benchmarking,V1: 63
Telecommunication Device for the Deaf/
Teletypewriter (TDD/TTY),V1: 670
Telecommunications systems:
connection charges for,V1:805–806
frequency division multiplexing in,
V2: 666
GIS applications for,V2: 31

global electronic commerce and,
V2:59–60
improvements in,V1: 107
Telecommuting centers,V3:437– 438
Telecommuting/telework,V1:300;
V3:436 – 447
defined,V3:437– 439
history of,V3:436 – 437
productivity associated with,
V3:440 – 442
stakeholders and,V3:444 – 446
technological trends favoring,V3: 443
theoretical considerations related to,
V3:443– 444
usage factors related to,V3:439– 440,
442– 443
Teleconferencing,V1:300;V3: 443
“Telecourses,”V1: 551
Telegraphy,V1: 296
Telehealth,V2: 110
Tele-immersion,V2: 339
Telemarketing,V3: 857
Telemedicine,V2: 295
Telenet,V3: 201
Telephone calling patterns, analysis of,
V1: 409
Telephone network system, public
switched,V3:168–169.See alsoPlain
Old Telephone Service (POTS); Public
Switched Telephone Network (PSTN);
Telephony entries
Telephone privacy services,V1: 493
Telephone technology,V1: 296
Telephony, Internet,V3:317–318
Telephony Control Specification-Binary
(TCS-BIN),V1:91, 92
Telephony/data service drivers,
V2:186 –187
Telephony network,V3:650 –653
Teleradiology,V2: 110
Telesurgery,V2: 110
Television,V1:296 –297.See alsoCable
TV; Enhanced TV; High-Definition
Television (HDTV)
in distance education,V1:550 –551
interactive,V1: 695
Television webcasting industry,
V3:682–683
“Telewebbers,”V1: 696
Telework.SeeTelecommuting/telework
Telnet,V2:302–303, 330;V3:325–326, 433
Template libraries:
ActiveX,V1: 19
standard C/C++,V1: 172
Templates:
biometric,V1: 81
calling with parameters,V1:768–769
disaster recovery planning,V1:545–547
XSL,V1:761–762
Temporary Import Bond (TIB),V2: 240
Tenant vendors,V3: 704
Tenix,V3:31–32
Terrorism.See also9/11 attacks
defined,V1:354 –355
Web sites,V2:446 – 447
Terrorists,V1:368–369
Text descriptions, access to,V3:479– 482
Text editors,V1: 166
ActiveX,V1:17–18
Text.See alsoTexts

compression,V1: 397
files,V1:820 –821
indexing of,V1: 519
user styling of,V3: 482
Text-generating pseudoelements,V1: 158
Texts.See alsoAlex Catalogue of Electronic
Texts; Text
distributing,V2:787–791
maintaining or updating,V2: 787
publishing,V2:784 –786
Textualities, new forms of,V1:301–302
Textures, sound,V2: 660
Theft, Internet,V2:451– 452.See also
Software piracy
THEORYNET,V2: 119
Therapy, online,V2: 111
Theses, electronic,V1: 515
Thicknet,V1:264 –266
Thick-wire Ethernet,V1:264 –266
Thin Multimedia,V3: 564
Thinnet cable,V1:266 –267
Third-generation (3G) cellular systems,
V3:844 –845
Third-generation (3G) mobile devices,
pricing,V3:856 –857
Third-generation (3G) wireless networks,
V2:619–620, 620 –621
barriers to implementing,V2: 621
Third Normal Form (3NF) for data,
V1: 377
Third-party authentication,V1:53–54
Third-party providers,V1: 813
Third-party rights, open source and,
V2: 829
Thompson, Ken,V1:164;V2: 491
Threaded-discussion systems,V2: 71
Threat model, in authentication,
V1:526 –527
3D environments,V1: 607
virtual,V2: 210
Three-dimensional production process,
V2:651–652
Three dimensions (3D).See alsoVirtual
reality
in multimedia,V2:651–652
3-tier system,V1:195, 202
Three-way handshake,V3:429– 430
Throwaway prototyping,V3: 136
Ticket Granting Ticket (TGT),V1: 54
Tier-based client/server architecture,
V1:195–196
Tiling techniques,V3: 541
TILISOFT,V1: 19
Time-based Inductive Machine (TIM),
V2:356 –357
Time code, video frame,V3: 541
Time Division CDMA (TD-CDMA),V3: 823
Time Division Multiple Access (TDMA)
wireless networks,V2:619–620
Time Division Multiplexing (TDM),
V2:541, 666 –669, 673
Time management, groupware products,
V2: 68
TimeMap,V2: 211
Timers, TCP,V3:430 – 431
Time-To-Live (TTL),V2:504, 505;V3: 427
Time to market,V1: 723
Time value of money,V3:214 –216
Time variant data collection,V1: 413
Title insurance,V3: 197
Free download pdf