Browse Definitions :

Browse Definitions by Alphabet

DLP - DON

  • DLP - Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network.
  • DLT - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • DLT (digital linear tape) - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • DMA - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that allows data to be sent directly from an attached device (such as a disk drive) to the memory on the computer's motherboard.
  • DMADV - DMADV is a process defined by Motorola as part of their Six Sigma management philosophy.
  • DMAIC (define, measure, analyze, improve, control) - DMAIC (define, measure, analyze, improve, control) is Six Sigma tool for improving an existing process.
  • DMB - Digital multimedia broadcasting (DMB) is the process of multicasting by satellite or terrestrial services (or a combination of both) for reception by mobile and portable devices, particularly cell phones.
  • DMCA - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • DMI - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • DMI (Desktop Management Interface) - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • DMOZ - The Open Directory Project (ODP) is a human-edited index of Web sites.
  • DMP - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • DMR - Digital rights management (DRM) is a systematic approach to copyright protection for digital media.
  • DMR - A direct market reseller (DMR), also known as an e-tailer, is a company that sells directly to consumers online without operating storefront operations of any kind.
  • DMS - The Defense Message System (DMS) is a secure X.
  • DMT - Discrete multitone (DMT) is a method of separating a Digital Subscriber Line (DSL) signal so that the usable frequency range is separated into 256 frequency bands (or channels) of 4.
  • DMTF - The Distributed Management Task Force, Inc.
  • DMZ - In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the internet.
  • DMZ (networking) - In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -- usually the internet.
  • DNA storage - DNA storage is the process of encoding and decoding binary data onto and from synthesized strands of DNA (deoxyribonucleic acid).
  • DNC - Distributive numerical control (DNC) is a technology that allows a single computer to be networked with one or more machines that use computer numerical control (CNC).
  • DNG - Digital Negative (DNG) is an imaging specification that provides for long-term storage of digital photographs generated in multiple proprietary formats.
  • DNIS - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • DNS - The domain name system (DNS) maps internet domain names to the internet protocol network addresses they represent and allows websites to use names, rather than difficult-to-remember IP addresses.
  • DNS amplification attack - A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
  • DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).
  • DNS cache poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
  • DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
  • DNS poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
  • DNS rebinding attack - DNS rebinding is an exploit in which the attacker uses JavaScript in a malicious Web page to gain control of the victim's router.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • DNS Security Extensions - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • DNSSEC - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • do not call list - The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • do-it-yourself marketing - In-house marketing is any marketing initiative that is not outsourced to a third party.
  • dock - In the Apple OS X operating system, the dock is a user-modifiable row of function or application icons that appear on the computer desktop so that the user can find and select any of them quickly.
  • Docker - Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Content Trust - Docker Content Trust is a feature in the Docker containerization platform that enables remote registry content to be digitally signed, ensuring that the content is unaltered and is the most current available version when users access it.
  • Docker Engine - Docker Engine is the underlying client-server technology that builds and runs containers using Docker's components and services.
  • Docker Hub - Docker Hub is a cloud-based repository in which Docker users and partners create, test, store and distribute container images.
  • Docker image - A Docker image is a file, comprised of multiple layers, that is used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a clustering and scheduling tool for Docker containers.
  • docking station - A docking station is a hardware frame and set of electrical connection interfaces that enable a notebook computer to effectively serve as a desktop computer.
  • DoCoMo - DoCoMo, also known as NTT DoCoMo, is a Japanese communications corporation that has introduced a line of cell phone sets that contain the equivalent of a digital smart card.
  • DoCoMo (NTT DoCoMo) - DoCoMo, also known as NTT DoCoMo, is a Japanese communications corporation that has introduced a line of cell phone sets that contain the equivalent of a digital smart card.
  • DoCoMo Packet Transmission - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • DOCSIS - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • DOCSIS (Data Over Cable Service Interface Specifications) - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • document - In general, a document (noun) is a record or the capturing of some event or thing so that the information will not be lost.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • document lifecycle - The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction.
  • document management - EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.
  • document metadata - Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own metadata.
  • Document Object Model - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • Document Object Model (DOM) - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • document reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • document sanitization - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • Document Type Definition - A Document Type Definition (DTD) is a specific document defining and constraining definition or set of statements that follow the rules of the Standard Generalized Markup Language (SGML) or of the Extensible Markup Language (XML), a subset of SGML.
  • Document Type Definition (DTD) - A Document Type Definition (DTD) is a specific document defining and constraining definition or set of statements that follow the rules of the Standard Generalized Markup Language (SGML) or of the Extensible Markup Language (XML), a subset of SGML.
  • document-oriented database - A document-oriented database is a type of NoSQL database in which data is stored in binary document files.
  • documentation - In computer hardware and software product development, documentation is the information that describes the product to its users.
  • DOD - Direct Outward Dialing (DOD) is a service of a local phone company (or local exchange carrier) that allows subscribers within a company's private branch exchange (PBX) system to connect to outside lines directly.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
  • DOI - A DOI (digital object identifier) is a permanent identifier given to a Web file or other Internet document so that if its Internet address changes, users will be redirected to its new address.
  • Dolby Digital - Dolby Digital, formerly known as AC-3, is a digital audio coding technique that reduces the amount of data needed to produce high quality sound.
  • Dolby Digital - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • dollarization - Dollarization is the adoption of a foreign country’s currency as legal tender for monetary transactions.
  • Dolly - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Dolly the sheep - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Dolphin ALE - Dolphin ArchiveLink Enabler (ALE) is an SAP ABAP add-on that allows SAP applications to use AT&T Synaptic Storage as a Service cloud servers as an ArchiveLink repository.
  • DOLS - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • DOM - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • domain - In general, a domain is an area of control or a sphere of knowledge.
  • domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • domain fluxing - Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down.
  • domain generation algorithm (DGA) - A domain generation algorithm or DGA is a computer program used to create domain names, typically for the purpose of propagating remotely controlled Web-based malware.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain model - In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT.
  • domain name - A domain name locates an organization or other entity on the Internet.
  • domain name system - The domain name system (DNS) maps internet domain names to the internet protocol network addresses they represent and allows websites to use names, rather than difficult-to-remember IP addresses.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into internet protocol (IP) addresses.
  • domain name system poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
  • domain rotation - Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • domain tasting - Domain tasting is the practice of purchasing numerous available domain names and then exploiting a five-day grace period to determine which names would be profitable to own.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • DomainKeys - DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain.
  • domestic outsourcing - Onshore outsourcing (also called domestic outsourcing) is the obtaining of services from someone outside a company but within the same country.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Domino Extensible Language - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • Domino Off Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services (DOLS) - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • dongle - A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close