Table Storage

The table storage is a non-relational data storage for data that are partly structured. Developers may retrieve and store individual data elements over web service requirements.


Tags are used to categorise resources application-specific and in compliance. An application may be advisable if a complex structured collection of resource (groups) exists and if this collection needs to be virtualised by reasonable means.


The TAN-methodology (TAN standing for “Transaction Number”) is a payment process in online or mobile banking that ensures extra security. Apart from the entry recognition (generally user name or the dial-up account) and a PIN it sees to a safe execution of...

Target Object

Target objects belong to an information network. For modelling, one or several components are assigned to them that are gathered in the IT-baseline catalogues. An object might be a physical location such as a network or an computing system. However, target objects are...


TeamDrive is a software for the synchronisation and exchange of data over the internet. This software contributes to several persons working securely together.

Test Plan for Availability, Continuity, IT-security

The test plan for availability/continuity and IT-security is a time plan that determines the regular tests for availability, continuity and security measures. It is collectively maintained by availability management, IT-service continuity management and information...

Test Protocol

A test protocol combines the test and evaluation activities. It is created during release tests in the service transition phase or for tests executed from availability, IT-service continuity or information security management.

Thin Provisioning

“Thin Provisioning” is a Data ONTAP-function that allows a storage adaption for use on demand. This may help to achieve a maximum workload for several applications.

Third Party Provider (TPP)

TTP stands for third party provider. In connection with the European Payment Directive (PSP2), TPPs are third party providers of services triggering payments or control services who can access the customer account via API.


Dangers are circumstances or events that may cause damages of values such as assets, knowledge, items and health. With regard to the IT, this danger names circumstances and/or events that affect the availability, integrity or confidentiality of information and...