Browse Definitions :

Browse Definitions by Alphabet

  • demand generation - Demand generation is the process of creating and cultivating interest in a product or service with the goal of generating high-quality leads that can be nurtured into loyal customers.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is an operational supply chain management (SCM) strategy where a company uses tactics such as price incentives, cost modifications and product substitutions to entice customers to purchase specific items.
  • demand signal repository (DSR) - A demand signal repository (DSR) is a database that aggregates sales and demand data at the merchant's point of sale (POS).
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denormalization - Denormalization is the process of adding precomputed redundant data to an otherwise normalized relational database to improve read performance of the database.
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • deprovisioning - Deprovisioning is the part of the employee lifecycle in which access rights to software and network services are taken away.
  • deputy CIO (deputy chief information officer) - Deputy CIO (chief information officer) is a role within some organizations that generally has responsibility for overseeing day-to-day information technology (IT) operations.
  • descriptive analytics - Descriptive analytics is a type of data analytics that looks at past data to give an account of what has happened.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop as a service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such as a smartphone, tablet or smartwatch.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, systems operators and other production IT staff to oversee code releases and deployments.
  • DevSecOps - DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password.
  • dielectric constant - The dielectric constant of a substance or material is a measure of its ability to store electrical energy.
  • dielectric material - A dielectric material is a poor conductor of electricity but an efficient supporter of electrostatic fields.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • differentiated services (DiffServ or DS) - Differentiated services, often shortened to DiffServ or DS, is a class of service (CoS) model to specify and control IP network traffic by class.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange is a method of digital encryption that securely exchanges cryptographic keys between two parties over a public channel without their conversation being transmitted over the internet.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digital - Digital describes electronic technology that generates, stores and processes data in terms of positive and nonpositive states.
  • digital accessibility - Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable to partake in use of the service, product or function.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital cash (e-cash) - Digital cash is a system of purchasing cash credits, storing the credits in your computer or digital wallet, and then spending them when making electronic purchases over the internet or in person on a mobile device at the point of sale.
  • digital certificate - A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital core - Digital core is the technology platforms and applications that allow organizations to transform into digital businesses and meet the new needs of the digital economy.
  • digital culture - Digital culture refers to the behaviors, practices and values that develop from the use of digital technologies.
  • digital disruption - Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
  • digital divide - The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital economy - The digital economy refers to the economic activities that emerge from connecting individuals, businesses, devices, data and operations through digital technology.
  • digital ecosystem - A digital ecosystem is a group of interconnected information technology resources that can function as a unit.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital experience (DX) - Digital experience (DX), also known as digital user experience (digital UX), is the take-away feeling an end user has after an experience in a digital environment or with a digital technology or device.
  • digital footprint - A digital footprint -- sometimes called a digital shadow -- is the body of data that an individual creates through their actions online.
  • digital forensics and incident response (DFIR) - Digital forensics and incident response (DFIR) is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events.
  • digital health (digital healthcare) - Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.
  • digital HR - Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.
  • digital identity - A digital identity is the body of information about an individual, organization or electronic device that exists online.
  • digital innovation - Digital innovation is the adoption of modern digital technologies by a business.
  • digital labor - Digital labor is work that is performed by robotic process automation (RPA) systems.
  • digital leadership - Digital leadership is the strategic use of a company's digital assets and emerging technologies to achieve business goals.
  • digital library - A digital library is a collection of digital objects, such as books, magazines, audio recordings, video recordings and other documents that are accessible electronically.
  • digital manufacturing - Digital manufacturing is a technology-based approach to production that links different data silos and processes in the manufacturing lifecycle so that stakeholders can make better business decisions both comprehensively and at each step.
  • digital marketing - Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic technologies.
  • Digital Millennium Copyright Act (DMCA) - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital nomad - A digital nomad works from any location and uses technology to perform their job while moving to new destinations.
  • digital platform - A digital platform is a web-based structural software package that speeds and eases transactions among users.
  • digital process automation - Digital process automation (DPA) uses low-code development tools to automate processes that can span multiple applications.
  • digital profiling - Digital profiling is the process of gathering and analyzing information about an individual that exists online.
  • digital projector (digital projection display system) - A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital signal processing (DSP) - Digital signal processing (DSP) refers to various techniques for improving the accuracy and reliability of digital communications.
  • digital signature - A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
  • Digital Signature Standard (DSS) - The Digital Signature Standard (DSS) is a digital signature algorithm (DSA) developed by the U.
  • digital strategy (digital media strategy) - A digital strategy, sometimes called a digital media strategy, is a plan for maximizing the business benefits of data assets and technology-focused initiatives.
  • digital supply chain - A digital supply chain is a supply chain whose foundation is built on web-enabled capabilities.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using a digital broadcast format rather than conventional analog methods.
  • digital thread - Digital thread is a communication framework that connects traditionally siloed elements in manufacturing processes and provides an integrated view of an asset throughout the manufacturing lifecycle.
  • digital trust - Digital trust is the confidence users have in the ability of people, technology and processes to create a secure digital world.
  • digital twin - A digital twin is a virtual representation of a real-world entity or process.
  • digital video - Digital video is audio/visual content in a binary format, with information presented as a sequence of digital data rather than in a continuous signal as analog information is.
  • digital video broadcasting (DVB) - Digital video broadcasting (DVB) is a set of standards that define digital broadcasting using DVB satellite, cable and terrestrial broadcasting infrastructures.
  • digital wallet - In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.
  • digital wellness (digital wellbeing) - Digital wellness (digital wellbeing) is the use of technology to ensure an employee's physical and mental health.
  • digital workspace - A digital workspace is an integrated technology framework that centralizes the management of an enterprise's applications, data and endpoints, allowing employees to collaborate and work remotely.
  • DigitalOcean - DigitalOcean Inc.
  • digitization - Digitization is the process of converting information into a digital format.
  • dimension - In data warehousing, a dimension is a collection of reference information that supports a measurable event, such as a customer transaction.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close