Browse Definitions :

Browse Definitions by Alphabet

DOM - DRI

  • domain generation algorithm (DGA) - A domain generation algorithm or DGA is a computer program used to create domain names, typically for the purpose of propagating remotely controlled Web-based malware.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain model - In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT.
  • domain name - A domain name locates an organization or other entity on the Internet.
  • domain name system - The domain name system (DNS) maps internet domain names to the internet protocol network addresses they represent and allows websites to use names, rather than difficult-to-remember IP addresses.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into internet protocol (IP) addresses.
  • domain name system poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address.
  • domain rotation - Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor.
  • domain sniper - A domain sniper is a person or company that locates and registers a Web site domain name that has lapsed from registration in the expectation that the original registrant will be willing to buy the name back.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • domain tasting - Domain tasting is the practice of purchasing numerous available domain names and then exploiting a five-day grace period to determine which names would be profitable to own.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • DomainKeys - DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain.
  • domestic outsourcing - Onshore outsourcing (also called domestic outsourcing) is the obtaining of services from someone outside a company but within the same country.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Domino Extensible Language - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • Domino Off Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • Domino Off-Line Services (DOLS) - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • dongle - A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.
  • DoPa - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • DoPa (DoCoMo Packet Transmission) - DoPa (DoCoMo Packet Transmission) is a packet-switched network service developed by NTT DoCoMo in Japan for Internet connection from mobile devices.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • Doppler effect - The frequency and wavelength of an electromagnetic field are affected by relative motion.
  • DOS - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • DoS - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • DOS (Disk Operating System) - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • DOS Cheat Sheets - Although you may not use it on a daily basis, DOS can be very handy from time to time.
  • DOS Protected Mode Interface - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DOS Protected Mode Interface (DPMI) - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DOS/V and WIN/V - DOS/V is a version of MS-DOS that provides both English and Japanese language command interfaces and can be used for applications designed for either or both English and Japanese.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • dot address - Tip:To find out the dot address (such as 205.
  • dot com disclosures (.com disclosures) - The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities.
  • dot NET - .NET is both a business strategy from Microsoft and its collection of programming support for Web services.
  • dot pitch - The dot pitch specification for a display monitor tells you how sharp the displayed image can be.
  • dot product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot product (scalar product) - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • dot-green - Dot-green is a shorthand way of describing the green computing movement that includes both hype and real innovation.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dotcom - A dotcom is any Web site intended for business use and, in some usages, it's a term for any kind of Web site.
  • dots per inch - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dots per inch - Test yourself.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • dotted quad - Tip:To find out the dot address (such as 205.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double data rate SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • double data rate synchronous dynamic random access memory - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • Double Density CD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double factorial - The double factorial, symbolized by two exclamation marks (!!), is a quantity defined for all integers greater than or equal to -1.
  • double integral sign - The double integral sign is used to indicate mathematical integration performed twice in succession.
  • Double-Density Compact Disk - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • Double-Density Compact Disk (DDCD) - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • double-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • double-slit experiment - The double-slit experiment is a nineteenth-century investigation into the properties of light that has since been found to demonstrate both the duality of photons and the concepts of superposition and quantum interference.
  • doubler - A doubler is an electronic device that doubles the frequency of an input signal.
  • doublewhack - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • DOVE (IBM DOVE) - IBM Dove (Distributed Overlay Virtual Ethernet) is an architecture that allows a network engineer to abstract the physical network infrastructure from hypervisor hosts and make network changes in software rather than hardware.
  • Dovetail Software - Dovetail Software is a software vendor based in Austin, Texas, that specializes in providing web-based HR and help desk software to businesses in the United States and internationally.
  • down converter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downconverter - An HD (high-definition) downconverter is a device that converts high-definition television (HDTV) video to standard-definition video that can be viewed on conventional television (TV) receivers or computer monitors, or recorded on DVD.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downlink - These terms should not be confused with downstream and upstream.
  • downlink and uplink - These terms should not be confused with downstream and upstream.
  • download - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • download pop up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • download pop-up - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • downloading - Downloading is the transmission of a file from one computer system to another, usually smaller computer system.
  • downsizing - In a business enterprise, downsizing is reducing the number of employees on the operating payroll.
  • downstream - This term should not be confused with downlink.
  • downtime - Uptime is a computer industry term for the time during which a computer is operational.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • doxware (extortionware) - Doxware, also known as extortionware, is an exploit in which the attacker accesses the target's sensitive data and threatens to publish it if the victim does not meet his demands.
  • DPA - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPA 1998 - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
  • DPA2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • DPI - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • dpi - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • DPL - Digital Powerline (DPL) technology provides the transmission of data to users over the same lines that bring electric power to homes and businesses.
  • DPM - Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable.
  • DPMI - DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender, which lets the program address a larger range of random access memory (RAM) than the 640 kilobytes to which PC programs are basically constrained.
  • DQA - Data quality is a perception or an assessment of data's fitness to serve its purpose in a given context.
  • DRA - A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users.
  • draft document - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • DRAM - Dynamic random access memory (DRAM) is a common type of random access memory (RAM) used in personal computers, workstations and servers.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • DRDRAM - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • DRDRAM (Rambus Dynamic Random Access Memory) - RDRAM (Rambus Dynamic Random Access Memory) is a memory subsystem that promises to transfer up to 1.
  • drilldown - As currently used in information technology, to drill down (verb) is to focus in on something.
  • drip marketing - Drip marketing is a method involving periodic small releases of promotional materials over time.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • drive-by pharming - Drive-by pharming is a vulnerability exploitation method in which the attacker takes advantage of an inadequately unprotected broadband router to gain access to user data.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • driveby download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close