Browse Definitions :

Browse Definitions by Alphabet

DOL - DRM

  • Dolby Digital - Dolby Digital, formerly known as AC-3, is a digital audio coding technique that reduces the amount of data needed to produce high quality sound.
  • Dolby Digital - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • dollarization - Dollarization is the adoption of a foreign country’s currency as legal tender for monetary transactions.
  • Dolly - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Dolly the sheep - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • DOLS - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • DOM - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • domain - In general, a domain is an area of control or a sphere of knowledge.
  • domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • domain fluxing - Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down.
  • domain generation algorithm (DGA) - A domain generation algorithm (DGA) is a program that generates a large list of domain names.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain model - In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT.
  • domain name system - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • domain name system poisoning - Cache poisoning is an attack vector that exploits the way domain name system (DNS) clients and web servers improve performance by saving old responses for a specified period of time in a temporary storage area called cache.
  • domain rotation - Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • domain tasting - Domain tasting is the practice of purchasing numerous available domain names and then exploiting a five-day grace period to determine which names would be profitable to own.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • domestic outsourcing - Onshore outsourcing, also known as domestic outsourcing, is the obtaining of services from someone outside a company but within the same country.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Domino Extensible Language - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • Domino Off Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • dongle - A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.
  • DoPa - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • DoS - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • DOS - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
  • DOS Cheat Sheets - Although you may not use it on a daily basis, DOS can be very handy from time to time.
  • DOS Protected Mode Interface - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DOS Protected Mode Interface (DPMI) - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • dot address - Tip:To find out the dot address (such as 205.
  • dot com - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • dot NET - .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages.
  • dot pitch - The dot pitch specification for a display monitor tells you how sharp the displayed image can be.
  • dot product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot product (scalar product) - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • dot.com - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dots per inch - Test yourself.
  • dots per inch - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dotted quad - Tip:To find out the dot address (such as 205.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double data rate SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • double data rate synchronous dynamic random access memory - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • Double Density CD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double factorial - The double factorial, symbolized by two exclamation marks (!!), is a quantity defined for all integers greater than or equal to -1.
  • Double-Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double-slit experiment - The double-slit experiment is a nineteenth-century investigation into the properties of light that has since been found to demonstrate both the duality of photons and the concepts of superposition and quantum interference.
  • doublewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Dovetail Software - Dovetail Software is a software vendor based in Austin, Texas, that specializes in providing web-based HR and help desk software to businesses in the United States and internationally.
  • down converter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downconverter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downlink - These terms should not be confused with downstream and upstream.
  • downlink and uplink - These terms should not be confused with downstream and upstream.
  • download - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • download pop up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • download pop-up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • downloading - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • downsizing - In a business enterprise, downsizing is reducing the number of employees on the operating payroll.
  • downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • doxware (extortionware) - Doxware, also known as extortionware, is an exploit in which the attacker accesses the target's sensitive data and threatens to publish it if the victim does not meet his demands.
  • DPA - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPA 1998 - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
  • DPA2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • dpi - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • DPI - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • DPL - Digital Powerline (DPL) technology provides the transmission of data to users over the same lines that bring electric power to homes and businesses.
  • DPM - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • DPMI - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DQA - Data quality is a measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.
  • DRA - A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users.
  • draft document - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • DRAM - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRDRAM - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • Dridex malware - Dridex is a form of malware that targets its victim's banking information.
  • drilldown - As currently used in information technology, to drill down (verb) is to focus in on something.
  • drip marketing - Drip marketing is a method involving periodic small releases of promotional materials over time.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • drive-by pharming - Drive-by pharming is a vulnerability exploitation method in which the attacker takes advantage of an inadequately unprotected broadband router to gain access to user data.
  • driveby download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • driver development kit - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • driver-based planning - Driver-based planning is an approach to management that identifies an organization's key business drivers and creates a series of business plans that mathematically model how those things most necessary for the organization's success would be affected by different variables.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close