Browse Definitions :

Browse Definitions by Alphabet

DB- - DEC

  • DB-25 - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DB-50 - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DB-68 - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DB-9 - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • DB-xx - DB-xx is the designation for a series of port connectors for attaching devices to computers.
  • Db2 - Db2 is a family of database management system (DBMS) products from IBM that serve a number of different operating system (OS) platforms.
  • DBA - A database administrator (DBA) is the information technician responsible for directing or performing all activities related to maintaining a successful database environment.
  • dBA - A-weighted decibels, abbreviated dBA, or dBa, or dB(a), are an expression of the relative loudness of sounds in air as perceived by the human ear.
  • dBc - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • dBd - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • dBi - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • dBm - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • DBMS - A database management system (DBMS) is system software for creating and managing databases.
  • dBmV - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • DBOR - A database of record (DBOR) is a repository for centralized storage of information about objects or people.
  • dBr - The expression dBr is used to define signal strength at RF and AF frequencies.
  • DBS - Direct broadcast satellite (DBS) refers to satellite television (TV) systems in which the subscribers, or end users, receive signals directly from geostationary satellites.
  • DBS - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • DC - DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are usually electrons).
  • DC (direct current) - DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are usually electrons).
  • DCaaS - A data center as a service (DCaaS) provider will supply turnkey physical data center facilities and computing infrastructure (e.
  • DCB - DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
  • DCE - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • DCIE - Data Center Infrastructure Efficiency (DCiE) is a metric used to determine the energy efficiency of a data center.
  • DCIM - Data center infrastructure management (DCIM) is the convergence of IT and data center facilities functions within an organization.
  • DCIT - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • DCIT (Digital Compression of Increased Transmission) - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • DCM - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • DCMA - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • DCML - DCML (Data Center Markup Language), based on Extensible Markup Language (XML), is a data format and model for exchanging information that describes a data center environment.
  • DCML (Data Center Markup Language) - DCML (Data Center Markup Language), based on Extensible Markup Language (XML), is a data format and model for exchanging information that describes a data center environment.
  • DCOM - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • DCOM (Distributed Component Object Model) - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Active Directory Domain Services and promotes domain controllers.
  • DDBMS - A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.
  • DDBMS (distributed database management system) - A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.
  • DDCD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • DDE - In the Windows, OS/2, and (with third-party development kits) other operating systems, Dynamic Data Exchange (DDE) allows information to be shared or communicated between programs.
  • DDK - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • DDL - Data Definition Language (DDL) is a standard for commands that define the different structures in a database.
  • DDM - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • DDM - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • DDoS - A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • DDoS attack - A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • DDR SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • DDS - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-1 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-2 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-3 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-4 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • de anonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de facto standard - A de facto standard is something that is used so widely that it is considered a standard for a given application although it has no official status.
  • de jure standard - A de jure standard is a technology, method or product that has been officially endorsed for a given application.
  • de-anonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de-anonymization (deanonymization) - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de-perimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • de-perimeterization - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • dead media - In 1995, science-fiction writer Bruce Sterling challenged a conference of computer artists and the world at large to help identify the extinct species in the new media taxonomy and face the fact that, for each new medium or technology that survives, dozens fall by the wayside.
  • dead pixel - A dead pixel is a picture element in which all three RGB sub-pixels are permanently turned off, which creates a black spot in the display.
  • dead zone (Wi-Fi dead zone) - A dead zone (Wi-Fi dead zone) is an area within a wireless LAN location where Wi-Fi does not function, typically due to radio interference or range issues.
  • deadlock - A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
  • deal registration - Deal registration is a common feature of vendors' channel partner programs in which a channel partner, such as a value-added reseller (VAR), informs the vendor about a sales lead.
  • deanonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • Debian - Debian is a popular and freely-available computer operating system that uses the Linux kernel and other program components obtained from the GNU project.
  • Debian Linux - Debian is a popular and freely-available computer operating system that uses the Linux kernel and other program components obtained from the GNU project.
  • debounced - Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open; debouncing is any kind of hardware device or software that ensures that only a single signal will be acted upon for a single opening or closing of a contact.
  • debouncing - Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open; debouncing is any kind of hardware device or software that ensures that only a single signal will be acted upon for a single opening or closing of a contact.
  • debug - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • debugger - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • DEC - Now part of Compaq, DEC (Digital Equipment Corporation) has long occupied a leading position in the mid-range computer, traditionally known as the minicomputer, the business computer platform that fits between the mainframe and the personal computer and serves small and medium-sized businesses with its VMS operating system.
  • deception technology - Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.
  • decibel - In electronics and communications, the decibel (abbreviated as dB, and also as db and DB) is a logarithmic expression of the ratio between two signal power, voltage, or current levels.
  • decibels related to dipole antenna - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • decibels relative to carrier - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to carrier (dBc) - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to isotropic radiator - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to isotropic radiator (dBi) - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to one millivolt - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one millivolt (dBmV) - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt (dBm) - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to reference level - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decibels relative to reference level (dBr) - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decimal - Decimal is a term that describes the base-10 number system, probably the most commonly used number system.
  • decision fatigue - Decision fatigue is a state of reduced efficacy in decision making after an excessive number of decisions or a number of decisions with excessive options.
  • decision management - Decision management is a process or set of processes for prioritizing, improving and streamlining action items.
  • Decision Model and Notation (DMN) - Decision Model and Notation (DMN) is a formalized method of making and mapping out decisions through official business processes.
  • decision support system - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • decision support system (DSS) - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible output for a specific input.
  • decision-making process - The decision-making process, in a business context, is a set of steps taken by managers in an enterprise to determine the planned path for business initiatives and to set specific actions in motion.
  • declarative programming - Declarative programming is a method to abstract away the control flow for logic required for software to perform an action, and instead involves stating what the task or desired outcome is.
  • decode - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • decompilation - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompile - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompiler - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close