Browse Definitions :
Definition

Dynamic Data Exchange (DDE)

Contributor(s): Paul Collins

In the Windows, OS/2, and (with third-party development kits) other operating systems, Dynamic Data Exchange (DDE) allows information to be shared or communicated between programs. For example, when you change a form in your database program or a data item in a spreadsheet program, they can be set up to also change these forms or items anywhere they occur in other programs you may use. DDE is interprocess communication (IPC) that uses shared memory as a common exchange area and provides applications with a protocol or set of commands and message formats. DDE uses a client/server model in which the application requesting data is considered the client and the application providing data is considered the server.

Thousands of applications use DDE, including Microsoft's Excel, Word, Lotus 1-2-3, AmiPro, Quattro Pro, and Visual Basic.

Another facility, NetDDE, allows progams to converse across networks. For example, a Superbase program on one network node could be updated whenever an Excel program in network node was updated. Both nodes must have NetDDE installed.

This was last updated in March 2010

Continue Reading About Dynamic Data Exchange (DDE)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

It. Is preventing me to move my cursor and use apps/programme's on my laptop. Is there. Anything I can do to stop it. Please??
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close