DEM - DIB
-
- demand based switching - Demand-based switching (DBS) is a...
- demand driven manufacturing - Demand-driven manufactu...
- demand flow scheduling system - A demand flow sched...
- demand planning - Demand planning is a multi-step operational sup...
- Demand signal repository - Demand signal repository (DSR...
- Demand signal repository (DSR) - Demand signal rep...
- demand-based switching - Demand-based switching (DBS) is a...
- demand-based switching (DBS) - Demand-based switchin...
- demand-driven manufacturing - Demand-driven manufactu...
- demand-driven manufacturing (DDM) - Demand-driv...
- demarc - A demarc (an abbreviation for demarcation point) marks the point ...
- demarc (demarcation point) - A demarc (an abbreviation...
- demarcation point - A demarc (an abbreviation for demarcation p...
- demilitarized zone - In computer networks, a DMZ (demilitarize...
- demo - A demo is a non-interactive multimedia presentation that is rendered ...
- demo and demoscene - A demo is a non-interactive multimedia pr...
- demographics - Demographics is the study of the behaviors and other ...
- demogroup - A demo is a non-interactive multimedia presentation that is...
- demomaker - A demo is a non-interactive multimedia presentation that is...
- demon - A demon (also see daemon which has a somewhat similar meaning) is a...
- demoparty - A demo is a non-interactive multimedia presentation that is...
- demoscene - A demo is a non-interactive multimedia presentation that is...
- demutualization - Demutualization is the process through which a ...
- DEN - Directory-Enabled Networking (DEN) is an industry-standard initiative a...
- DEN (Directory-Enabled Networking) - Directory...
- dendrimer - A dendrimer (from Greek dendra for tree) is an artificially...
- deniable encryption - Deniable encryption is a type of crypto...
- denial of service - A denial of service (DoS) attack is an inci...
- denial of service (DoS) - A denial of service (DoS) attac...
- denial of service attack - A denial of service (DoS) att...
- denial-of-service - A denial of service (DoS) attack is an inci...
- denial-of-service attack - A denial of service (DoS) att...
- denormalization - In a relational database, denormalization is an...
- dense wavelength division multiplexing
- dense wavelength division multiplexing (DWDM)
- deobfuscate - Obfuscation, in general, describes a practice that is u...
- dependent variable - A dependent variable is a variable whose ...
- deperimeterisation - In network security, deperimeterization i...
- deperimeterization - In network security, deperimeterization i...
- deploy - To deploy (from the French deployer) is "to spread out or arrange...
- depository - A depository is a file or set of files in which data is s...
- deprecate - In dictionaries, deprecated is a term used to indicate a pr...
- deprecated - In dictionaries, deprecated is a term used to indicate a ...
- deprecation - In dictionaries, deprecated is a term used to indicate ...
- DER - E-voting is an election system that allows a voter to record his or her...
- derived object - A derived object (DO) is a file created in a Vers...
- derived object (DO) - A derived object (DO) is a file created...
- DES - Data Encryption Standard (DES) is a widely-used method of data encrypti...
- descriptive modeling - Descriptive modeling is a mathematica...
- deserializer - A SerDes or serializer/deserializer is an integrated ...
- design by committee - Design by committee is a term sometimes...
- design pattern - In software development, a pattern (or design pat...
- design reuse - In information technology, design reuse is the inclus...
- desktop - Using an office metaphor, a desktop is a computer display area ...
- desktop administration - Desktop management is a comprehen...
- desktop as a service - Desktop as a service (DaaS), also cal...
- desktop as a service (DaaS) - Desktop as a service (D...
- Desktop as a Service provider (DaaS provider)
- desktop computer - A desktop computer is a personal computer tha...
- desktop firewall - A personal firewall (sometimes called a deskt...
- desktop gadget - A desktop gadget is a software widget, or a small...
- desktop layering - Desktop layering is a method of dividing a di...
- desktop management - Desktop management is a comprehensive app...
- Desktop Management Interface - Desktop Management In...
- Desktop Management Task Force - The Distributed Man...
- desktop NAS - Desktop NAS (network-attached storage) is a device that...
- desktop personalization - Desktop personalization is the ...
- desktop search - Desktop search (sometimes called integrated searc...
- desktop search (integrated search) - Desktop s...
- desktop security - Desktop management is a comprehensive approac...
- desktop supercomputer - A desktop supercomputer, also calle...
- desktop supercomputer (personal supercomputer)
- desktop theme - A desktop theme is a customized graphical user inte...
- desktop virtualization - Desktop virtualization is the con...
- destreaming - Destreaming, in a multimedia context, is the practice o...
- destructive testing - Destructive testing is a software asses...
- development environment - In computer program and softwar...
- development operations - DevOps is the blending of tasks p...
- development-operations - DevOps is the blending of tasks p...
- developmental robotics - Developmental robotics is the use...
- device - In general, a device is a machine designed for a purpose.
- device agnostic - Device agnostic is a description for computing ...
- device agnosticism - Device agnostic is a description for comp...
- device attack - A device attack is an exploit in which the attacker...
- device driver - A device driver is a program that controls a partic...
- device ID (device identification) - A device ID...
- device relationship management - Device relationsh...
- device relationship management (DRM) - Devic...
- device-agnostic - Device agnostic is a description for computing ...
- device-agnostic (device agnosticism) - Devic...
- deviceCOM - DeviceCOM, from Intrinsyc Software, is a line of device and...
- DevOps - DevOps is the blending of tasks performed by a company's applicat...
- DevOps (development-operations) - DevOps is the b...
- DFS - A distributed file system is a client/server-based application that all...
- DG - Data governance (DG) refers to the overall management of the availability...
- DGS&D (DGS&D rate contracts) - DGS&D is the central ...
- DHA - A directory harvest attack (DHA) is an attempt to determine the valid e...
- DHCP - DHCP (Dynamic Host Configuration Protocol) is a communications protoc...
- DHCP (Dynamic Host Configuration Protocol)
- DHTML - Dynamic HTML is a collective term for a combination of Hypertext Ma...
- diagonal-parity RAID - Double-parity RAID (redundant array o...
- dial peer - A dial peer, also known as an addressable call endpoint, is...
- dial peer (addressable call endpoint) - A d...
- dial peer hunting - Dial peer hunting is a feature of voice ove...
- dial-up - Dial-up pertains to a telephone connection in a system of many ...
- dial-up acceleration - High-speed dialup, sometimes advertis...
- Dialed Number Identification Service - DNIS ...
- Dialed Number Identification Service (DNIS)
- dialog box - A menu is a set of options presented to the user of a com...
- diary of Samuel Pepys - The famous diary that Samuel Pepys ...

