Browse Definitions :

Browse Definitions by Alphabet

DOM - DRU

  • domain name system poisoning - Cache poisoning is a type of cyber attack in which attackers insert fake information into a domain name system (DNS) cache or web cache for the purpose of harming users.
  • domain rotation - Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • domestic outsourcing - Onshore outsourcing, also known as domestic outsourcing, is the obtaining of services from someone outside a company but within the same country.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Domino Extensible Language - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • Domino Off Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • dongle - A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.
  • DoPa - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • DoS - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • DOS - A DOS, or disk operating system, is an operating system that runs from a disk drive.
  • DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
  • DOS Protected Mode Interface - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DOS Protected Mode Interface (DPMI) - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • dot address - Tip:To find out the dot address (such as 205.
  • dot com - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • dot NET - .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages.
  • dot pitch - The dot pitch specification for a display monitor tells you how sharp the displayed image can be.
  • dot product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot product (scalar product) - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • dot.com - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dots per inch - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dotted quad - Tip:To find out the dot address (such as 205.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double data rate SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • double data rate synchronous dynamic random access memory - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • Double Density CD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double factorial - The double factorial, symbolized by two exclamation marks (!!), is a quantity defined for all integers greater than or equal to -1.
  • Double-Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double-slit experiment - The double-slit experiment is a nineteenth-century investigation into the properties of light that has since been found to demonstrate both the duality of photons and the concepts of superposition and quantum interference.
  • doublewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Dovetail Software - Dovetail Software is a software vendor based in Austin, Texas, that specializes in providing web-based HR and help desk software to businesses in the United States and internationally.
  • down converter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downconverter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downlink - These terms should not be confused with downstream and upstream.
  • downlink and uplink - These terms should not be confused with downstream and upstream.
  • download - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • download pop up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • download pop-up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • downsizing - In a business enterprise, downsizing is reducing the number of employees on the operating payroll.
  • downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • DPA - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPA 1998 - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
  • DPA2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • dpi - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • DPI - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • DPL - Digital Powerline (DPL) technology provides the transmission of data to users over the same lines that bring electric power to homes and businesses.
  • DPM - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • DPMI - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DQA - Data quality is a measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.
  • DRA - A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users.
  • draft document - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • DRAM - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRDRAM - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • Dridex malware - Dridex is a form of malware that targets its victim's banking information.
  • drilldown - As currently used in information technology, to drill down (verb) is to focus in on something.
  • drip marketing - Drip marketing is a method involving periodic small releases of promotional materials over time.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • driveby download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • driver development kit - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • driver-based planning - Driver-based planning is an approach to management that identifies an organization's key business drivers and creates a series of business plans that mathematically model how those things most necessary for the organization's success would be affected by different variables.
  • DRM - Digital rights management (DRM) is a systematic approach to copyright protection for digital media.
  • DRM - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • drobo - A backup robot is an automated external USB storage device that supports multiple removable SATA hard drives.
  • drone (UAV) - A drone, in technological terms, is an unmanned aircraft.
  • drone glasses (drone goggles) - Drone glasses are eyewear that gives someone flying an unmanned aerial vehicle (UAV) a first-person view of where the drone flies.
  • drone journalism - Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • drone surveillance - Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • DROP - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • DROP (delivery of real-time execution information protocol) - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • drop-down menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dropbox - Dropbox is a cloud storage provider (sometimes referred to as an online backup service) that is frequently used as a file-sharing service.
  • dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
  • dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • DRP - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • DRS - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
  • DRTC (Don't read the comments) - DRTC is an initialism for "Don't read the comments.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close