Browse Definitions :

Browse Definitions by Alphabet

DYN - WHA

  • Dynamic ARP Inspection (DAI) - Dynamic ARP Inspection (DAI) is a security feature that verifies address resolution protocol (ARP) requests and responses in a network.
  • dynamic backup - Hot data backups are the standard for most database backups, as users can stay online while they are performed.
  • dynamic BPM - Dynamic business process management (BPM) is an approach designed to allow business processes to adjust quickly to changing business needs.
  • dynamic BPM (business process management) - Dynamic business process management (BPM) is an approach designed to allow business processes to adjust quickly to changing business needs.
  • dynamic business process management - Dynamic business process management (BPM) is an approach designed to allow business processes to adjust quickly to changing business needs.
  • dynamic case management - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • dynamic case management (DCM) - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • Dynamic Data Exchange - In the Windows, OS/2, and (with third-party development kits) other operating systems, Dynamic Data Exchange (DDE) allows information to be shared or communicated between programs.
  • dynamic function loading - Lazy loading, also known as dynamic function loading, is a mode that allows a developer to specify what components of a program should not be loaded into storage by default when a program is started.
  • dynamic hashing - Dynamic hashing is a method of hashing, or shortening a string of characters, where the set of shortened characters grows, shrinks and reorganizes to fit the way the data is being accessed.
  • Dynamic Host Configuration Protocol - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • dynamic HTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • dynamic infrastructure - Dynamic infrastructure refers to a collection of data center resources, such as compute, networking and storage, that can automatically provision and adjust itself as workload demands change.
  • dynamic IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
  • dynamic link library - A dynamic link library (DLL) is a collection of small programs that can be loaded when needed by larger programs and used at the same time.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • dynamic memory allocation (in virtualization) - Dynamic memory allocation is a memory management technique in which a program can request and return memory while it is executing.
  • dynamic multi pathing - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • dynamic multi-pathing - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • dynamic multi-pathing (DMP) - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • dynamic multipoint VPN - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites without needing to pass traffic through an organization's headquarter VPN server or router.
  • dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic pricing - The goal of dynamic pricing is to allow a company that sells goods or services over the Internet to adjust prices on the fly in response to market demands.
  • Dynamic Quorum - Dynamic Quorum is the ability of a cluster to recalculate a quorum as it maintains a working cluster.
  • dynamic random access memory - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • dynamic range - Dynamic range describes the ratio of the softest sound to the loudest sound in a musical instrument or piece of electronic equipment.
  • dynamic signage - Digital signage, also called dynamic signage, is a specialized form of slivercasting in which video or multimedia content is displayed in public places for informational or advertising purposes.
  • Dynamic Source Routing - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • Dynamic Source Routing (DSR) - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • dynamic spectrum access (dynamic spectrum management) - Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.
  • dynamic SQL - Dynamic SQL is an enhanced form of Structured Query Language (SQL) that, unlike standard (or static) SQL, facilitates the automatic generation and execution of program statements.
  • dynamic SQL (Dynamic Structured Query Language) - Dynamic SQL is an enhanced form of Structured Query Language (SQL) that, unlike standard (or static) SQL, facilitates the automatic generation and execution of program statements.
  • Dynamic Structured Query Language - Dynamic SQL is an enhanced form of Structured Query Language (SQL) that, unlike standard (or static) SQL, facilitates the automatic generation and execution of program statements.
  • dynamic URL - A dynamic URL is the address - or Uniform Resource Locator (URL) - of a Web page with content that depends on variable parameters that are provided to the server that delivers it.
  • dynamic voltage and frequency scaling (DVFS) - Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device’s various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power-saving when those resources are not needed.
  • Dyslexie - Dyslexie is a font designed for greater readability to help people who have difficulty reading.
  • U.S. Department of Justice (DOJ) - U.S.
  • What is data architecture? A data management blueprint - Data architecture is a discipline that documents an organization's data assets, maps how data flows through its systems and provides a blueprint for managing data.
  • What is data governance and why does it matter? - Data governance (DG) is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.
  • What is data management and why is it important? - Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth look at the process.
  • What is data protection and why is it important? - Data protection is the process of safeguarding important information from corruption, compromise or loss.
  • What is data science? The ultimate guide - Data science is the process of using advanced analytics techniques and scientific principles to analyze data and extract valuable information for business decision-making, strategic planning and other uses.
  • What is DevOps? The ultimate guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is digital transformation? - Digital transformation is the incorporation of computer-based technologies into an organization's products, processes and strategies.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close