Browse Definitions :
Definition

domain specific language (DSL)

A domain specific language (DSL) is a programming language that is developed to meet a specific need.  In this sense, a domain is a narrow area of interest.

A DSL may be developed to meet the needs of a particular platform, system, toolset, software problem, industry, or business challenge that cannot be effectively addressed by using mainstream languages. Examples of commonly used DSLs include cascading style sheets (CSS), Ant and SQL. The human-readable code that many DSLs employ can also help improve collaboration between programmers and other stakeholders. 

A DSL can be contrasted with a general purpose language, such as C#, which is designed to address a broad range of needs across the software development landscape. In many cases, a subset of a general purpose language can be developed and implemented as a domain specific language to address a particular problem. Ruby (particularly Ruby on Rails) and Scala are examples of languages that lend themselves to the development of these internal DSLs. For example, Scala might be used to create a DSL for highly complex domains such as trading exchanges in the energy industry. Most software projects will incorporate a general language and several peripheral DSLs to add required functionality for various domains within the system.

 

This was last updated in September 2014

Continue Reading About domain specific language (DSL)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close