Browse Definitions by Alphabet

  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a Safe Mode boot option for Windows Server domain controllers.
  • directory traversal - Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the server's root directory.
  • disaggregated server - A disaggregated server is a server whose components and resources are divided into subsystems.
  • disambiguation - Disambiguation is the process of determining a word's meaning -- or sense -- within its specific context.
  • disaster recovery (DR) - Disaster recovery (DR) is an organization's ability to respond to and recover from an event that negatively affects business operations.
  • disaster recovery (DR) site - A disaster recovery (DR) site is a facility an organization can use to recover and restore its technology infrastructure and operations when its primary data center becomes unavailable.
  • disaster recovery (DR) test - A disaster recovery test is the examination of each step in a disaster recovery plan to ensure that an organization can recover data, restore business critical applications and continue operations after an interruption of services.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization's business continuity and disaster recovery procedures.
  • Disciplined Agile Delivery (DAD) - Disciplined Agile Delivery (DAD) is a scalable Agile software delivery framework.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • discrete manufacturing - Discrete manufacturing is an industry term for the manufacturing of finished products that are distinct items capable of being easily counted, touched or seen.
  • disk array - A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object storage.
  • disk mirroring (RAID 1) - Disk mirroring, also known as RAID 1, is the replication of data across two or more disks.
  • displacement - Displacement (symbolized d or s), also called length or distance, is a one-dimensional quantity representing the separation between two defined points.
  • display - In computing, a display is a device with a screen that shows a rendered electronic image made up of pixels that are illuminated in a way that distinguishes text and graphic elements.
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • disruptive technology (disruptive innovation) - Disruptive technology, often referred to as disruptive innovation, is when a new business model attracts an underserviced market or revenue stream and grows until it supplants incumbent competitors.
  • distributed antenna system (DAS) - In a distributed antenna system (DAS), a single signal source is connected to a group of antennas instead of to a single antenna.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.
  • Distributed Component Object Model (DCOM) - Distributed Component Object Model (DCOM) is an extension to Component Object Model (COM) that enables software components to communicate with each other across different computers on a local area network (LAN), on a wide area network (WAN) or across the internet.
  • distributed control system (DCS) - A distributed control system (DCS) is a digital automated industrial control system (ICS) that uses geographically distributed control loops throughout a factory, machine or control area.
  • distributed denial-of-service (DDoS) attack - A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
  • distribution center - A distribution center is a product storage and shipping building that stores goods a company produces.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
  • distribution requirements planning (DRP) - Distribution requirements planning (DRP) is a systematic process to make the delivery of goods more efficient by determining which goods, in what quantities and at what location, are required to meet anticipated demand.
  • distributor - A distributor is an intermediary entity between a producer of a product, or manufacturer, and a downstream entity in the distribution channel or supply chain.
  • DMAIC (define, measure, analyze, improve, control) - DMAIC (define, measure, analyze, improve, control) is Six Sigma tool for improving an existing process.
  • DNS amplification attack - A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
  • DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.
  • DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • Docker Engine - Docker Engine is the underlying client-server technology that supports the tasks and workflows involved in building, shipping and running containerized applications using Docker's components and services.
  • Docker image - A Docker image is a file used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a container orchestration tool for clustering and scheduling Docker containers.
  • document sanitization - Document sanitization is the process of cleaning a document to ensure that only the intended information can be accessed from it.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
  • domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the business domain, or sphere of knowledge, of that software's users.
  • doomscrolling - Doomscrolling, sometimes also called doomsurfing, refers to constantly checking disturbing or upsetting news articles or videos online, often via social media.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • double materiality - Double materiality extends the traditional accounting principle of materiality beyond financial information to include environmental, social and governance factors.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Dridex malware - Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials to gain access to their financial assets.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
  • dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • Drupal - Drupal is a free, open source content management system (CMS) to build and maintain websites, online directories, e-commerce stores, intranets and other types of digital content.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • DTMF (dual tone multi-frequency) - Dual tone multi-frequency (DTMF) is the sounds or tones generated by a telephone when the numbers are pressed.
  • dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
  • dual Wi-Fi antenna - A dual Wi-Fi antenna is a pair of identical antennas on a wireless router or Wi-Fi-equipped device, intended to eliminate signal fading and dead spots.
  • Dublin Core - Dublin Core is an international metadata standard formally known as the Dublin Core Metadata Element Set and includes 15 metadata (data that describes data) terms.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • ducting (data center cooling) - Ducting is an approach to air management that uses a series of metal or plastic pipes to carry heated or cooled air from one place to another.
  • dumbphone (dumb phone) - A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.
  • Duo Security - Duo Security is a vendor of cloud-based two-factor authentication products.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic voltage and frequency scaling (DVFS) - Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device's various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power saving when those resources are not needed.
  • software documentation - In the software development process, software documentation is the information that describes the product to the people who develop, deploy and use it.
  • uplink and downlink - In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
  • What are data silos and what problems do they cause? - A data silo is a repository of data that's controlled by one department or business unit and isolated from the rest of an organization, much like grass and grain in a farm silo are closed off from outside elements.
  • What are diffusion models? - Diffusion models are a category of generative AI that excels at creating images, audio, video and other types of data by using a two-step process: forward diffusion and reverse diffusion.
  • What are Internet data caps and why do providers use them? - A data cap, also known as a bandwidth cap, is a limit that service providers impose on the amount of data a user account can transfer at a specified level of throughput over a given time period, for a specified fee.
  • What is a data architect? - A data architect is an IT professional responsible for defining the policies, procedures, models and technologies used in collecting, organizing, storing and accessing company information.
  • What is a data center administrator (DCA)? - A data center administrator (DCA) is an experienced IT professional who is responsible for overseeing data center operations.
  • What is a data fabric? - A data fabric is an architecture and software offering a unified collection of data assets, databases and database architectures within an enterprise.
  • What is a data flow diagram (DFD)? - A data flow diagram (DFD) is a graphical or visual representation that uses a standardized set of symbols and notations to describe a business's operations through data movement.
  • What is a data governance policy? - A data governance policy is a documented set of guidelines for ensuring an organization's data and information assets are managed consistently and used properly.
  • What is a data lake? - A data lake is a storage repository that holds a vast amount of raw data in its native format until it is needed for analytics applications.
  • What is a data mart (datamart)? - A data mart is a repository of data that is designed to serve a particular community of knowledge workers.
  • What is a data type? - In software programming, a data type refers to the type of value a variable has and what type of mathematical, relational or logical operations can be applied on it without causing an error.
  • What is a decision support system (DSS)? - A decision support system (DSS) is a computer program used to improve a company's decision-making capabilities.
  • What is a decision tree in machine learning? - A decision tree is a flow chart created by a computer algorithm to make decisions or numeric predictions based on information in a digital data set.
  • What is a denial-of-service attack? - A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources.
  • What is a device driver? - A device driver, or driver, is a special kind of software program that controls a specific hardware device attached to a computer.
  • What is a digital twin? - A digital twin is a virtual representation of a real-world entity or process.
  • What is a diode? - A diode is a specialized electronic component, specifically a two-terminal semiconductor device, with two electrodes called the anode and the cathode.
  • What is a disaster recovery plan (DRP)? - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume operations after an unplanned incident.
  • What is a disk image? - A disk image is a compressed file that contains a copy of the entire contents of a computer's hard drive or other storage media, such as optical discs or solid-state drives.
  • What is a distributed database? - A distributed database is a database that consists of two or more files located in different sites on the same or different networks.
  • What is a distributed file system (DFS)? - A distributed file system (DFS) enables clients to access file storage from multiple hosts through a computer network as if they were accessing local storage.
  • What is a distributor agreement (distribution agreement)? - A distributor agreement -- also referred to as a distribution agreement -- is a legally binding contract between a vendor or manufacturer and a distributor.
  • What is a DMZ in networking? - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
  • What is a domain controller? - A domain controller is a server that processes requests for authentication from users and computers within a computer domain.
  • What is a drone (UAV)? - A drone is an unmanned aircraft.
  • What is Dall-E and how does it work? - Dall-E is a generative artificial intelligence (AI) technology that enables users to create images by submitting text-based prompts.
  • What is dark data? - Dark data is digital information an organization collects, processes and stores that is not currently being used for business purposes.