Browse Definitions :

Browse Definitions by Alphabet

DIT - DOM

  • dither - Dithering is the attempt by a computer program to approximate a color from a mixture of other colors when the required color is not available.
  • dithered - Dithering is the attempt by a computer program to approximate a color from a mixture of other colors when the required color is not available.
  • dithering - Dithering is the attempt by a computer program to approximate a color from a mixture of other colors when the required color is not available.
  • diversity training - Diversity training is education about demographic differences among people.
  • diversity, equity and inclusion (DEI) - Diversity, equity and inclusion (DEI) is a term used to describe policies and programs that promote the representation and participation of different groups of individuals, including people of different ages, races and ethnicities, abilities and disabilities, genders, religions, cultures and sexual orientations.
  • division sign - The division sign resembles a dash or double dash with a dot above and a dot below.
  • Divx - No longer sold, Divx (Digital Video Express) was a video movie rental system for digital versatile disk -formatted disks.
  • DKNF - Database normalization is intrinsic to most relational database schemes.
  • DLC - DLC also is an abbreviation for Data Link Control.
  • DLC - DLC also is an abbreviation for digital loop carrier.
  • DLL - A dynamic link library (DLL) is a collection of small programs that can be loaded when needed by larger programs and used at the same time.
  • DLM - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • DLP - Data loss prevention (DLP) -- sometimes referred to as data leak prevention, information loss prevention and extrusion prevention -- is a strategy for preventing individuals from accessing sensitive information who do not need it.
  • DLT - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • DLT (digital linear tape) - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • DMA - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that allows data to be sent directly from an attached device (such as a disk drive) to the memory on the computer's motherboard.
  • DMADV - DMADV is a process defined by Motorola as part of their Six Sigma management philosophy.
  • DMAIC (define, measure, analyze, improve, control) - DMAIC (define, measure, analyze, improve, control) is Six Sigma tool for improving an existing process.
  • DMB - Digital multimedia broadcasting (DMB) is the process of multicasting by satellite or terrestrial services (or a combination of both) for reception by mobile and portable devices, particularly cell phones.
  • DMCA - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • DMI - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • DMI (Desktop Management Interface) - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • DMOZ - The Open Directory Project (ODP) is a human-edited index of Web sites.
  • DMP - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • DMR - A direct market reseller (DMR), also known as an e-tailer, is a company that sells directly to consumers online without operating storefront operations of any kind.
  • DMR - Digital rights management (DRM) is a systematic approach to copyright protection for digital media.
  • DMS - The Defense Message System (DMS) is a secure X.
  • DMT - Discrete multitone (DMT) is a method of separating a Digital Subscriber Line (DSL) signal so that the usable frequency range is separated into 256 frequency bands (or channels) of 4.
  • DMTF - The Distributed Management Task Force, Inc.
  • DMVPN - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites without needing to pass traffic through an organization's headquarter VPN server or router.
  • DMZ - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
  • DMZ in networking - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
  • DNA - (In chemistry, DNA stands for deoxyribonucleic acid.
  • DNA storage - DNA storage is the process of encoding and decoding binary data onto and from synthesized strands of DNA (deoxyribonucleic acid).
  • DNC - Distributive numerical control (DNC) is a technology that allows a single computer to be networked with one or more machines that use computer numerical control (CNC).
  • DNG - Digital Negative (DNG) is an imaging specification that provides for long-term storage of digital photographs generated in multiple proprietary formats.
  • DNIS - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • DNS - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • DNS amplification attack - A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
  • DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).
  • DNS cache poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
  • DNS poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • DNS rebinding attack - DNS rebinding is an exploit in which the attacker uses JavaScript in a malicious Web page to gain control of the victim's router.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • DNS Security Extensions - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • DNSSEC - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • DO - A derived object (DO) is a file created in a Versioned Object Base (VOB).
  • do not call registry - The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • Do you speak Geek: Internet Protocols and Technologies - A quiz about Internet protocols and technologies.
  • Do you speak Geek? A Vital Video Quiz - Test yourself.
  • Do you speak geek? Down in the engine room - Test yourself.
  • Do you speek Geek in the Summer? A Science Fiction Quiz - Netscape co-founder and now blogger extraordinaire Marc Andreessen took some time from his busy schedule as an entrepreneur with social networking startup Ning to name his favorite up-and-coming science fiction writers.
  • do-it-yourself marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • Docker - Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Content Trust - Docker Content Trust is a feature in the Docker containerization platform that enables remote registry content to be digitally signed, ensuring that the content is unaltered and is the most current available version when users access it.
  • Docker Engine - Docker Engine is the underlying client-server technology that builds and runs containers using Docker's components and services.
  • Docker Hub - Docker Hub is a cloud-based repository in which Docker users and partners create, test, store and distribute container images.
  • Docker image - A Docker image is a file used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a clustering and scheduling tool for Docker containers.
  • DoCoMo - DoCoMo, also known as NTT DoCoMo, is a Japanese communications corporation that has introduced a line of cell phone sets that contain the equivalent of a digital smart card.
  • DoCoMo Packet Transmission - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • DOCSIS - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • DOCSIS (Data Over Cable Service Interface Specifications) - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • document - In general, a document (noun) is a record or the capturing of some event or thing so that the information will not be lost.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • document lifecycle - The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction.
  • document management - EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.
  • document metadata - Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own metadata.
  • Document Object Model - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • Document Object Model (DOM) - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • document reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • document sanitization - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • Document Style Semantics and Specification Language - DSSSL (Document Style Semantics and Specification Language) is a standard for the processing of SGML (Standard Generalized Markup Language) documents.
  • Document Type Definition - A Document Type Definition (DTD) is a specific document defining and constraining definition or set of statements that follow the rules of the Standard Generalized Markup Language (SGML) or of the Extensible Markup Language (XML), a subset of SGML.
  • Document Type Definition (DTD) - A Document Type Definition (DTD) is a specific document defining and constraining definition or set of statements that follow the rules of the Standard Generalized Markup Language (SGML) or of the Extensible Markup Language (XML), a subset of SGML.
  • document-oriented database - A document-oriented database is a type of NoSQL database in which data is stored in binary document files.
  • documentation - In computer hardware and software product development, documentation is the information that describes the product to its users.
  • DOD - Direct Outward Dialing (DOD) is a service of a local phone company (or local exchange carrier) that allows subscribers within a company's private branch exchange (PBX) system to connect to outside lines directly.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
  • DOI - A DOI (digital object identifier) is a permanent identifier given to a Web file or other Internet document so that if its Internet address changes, users will be redirected to its new address.
  • Dolby Digital - Dolby Digital, formerly known as AC-3, is a digital audio coding technique that reduces the amount of data needed to produce high quality sound.
  • Dolby Digital - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • dollarization - Dollarization is the adoption of a foreign country’s currency as legal tender for monetary transactions.
  • Dolly - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Dolly the sheep - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • DOLS - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • DOM - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • domain - In general, a domain is an area of control or a sphere of knowledge.
  • domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • domain fluxing - Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down.
  • domain generation algorithm (DGA) - A domain generation algorithm (DGA) is a program that generates a large list of domain names.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain model - In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT.
  • domain name system - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

  • footprinting

    Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close