Browse Definitions :

Browse Definitions by Alphabet

DB2 - DEC

  • Db2 - Db2 is a family of database management system (DBMS) products from IBM that serve a number of different operating system (OS) platforms.
  • DBA - A database administrator (DBA) is the information technician responsible for directing or performing all activities related to maintaining a successful database environment.
  • dBA - A-weighted decibels, abbreviated dBA, or dBa, or dB(a), are an expression of the relative loudness of sounds in air as perceived by the human ear.
  • dBc - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • dBd - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • dBi - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • dBm - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • DBMS - A database management system (DBMS) is system software for creating and managing databases.
  • dBmV - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • DBOR - A database of record (DBOR) is a repository for centralized storage of information about objects or people.
  • dBr - The expression dBr is used to define signal strength at RF and AF frequencies.
  • DBS - Direct broadcast satellite (DBS) refers to satellite television (TV) systems in which the subscribers, or end users, receive signals directly from geostationary satellites.
  • DBS - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • DC - DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are usually electrons).
  • DC (direct current) - DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are usually electrons).
  • DCaaS - A data center as a service (DCaaS) provider will supply turnkey physical data center facilities and computing infrastructure (e.
  • DCB - DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
  • DCE - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • DCIE - Data Center Infrastructure Efficiency (DCiE) is a metric used to determine the energy efficiency of a data center.
  • DCIM - Data center infrastructure management (DCIM) is the convergence of IT and data center facilities functions within an organization.
  • DCIT - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • DCIT (Digital Compression of Increased Transmission) - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • DCM - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • DCMA - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • DCML - DCML (Data Center Markup Language), based on Extensible Markup Language (XML), is a data format and model for exchanging information that describes a data center environment.
  • DCML (Data Center Markup Language) - DCML (Data Center Markup Language), based on Extensible Markup Language (XML), is a data format and model for exchanging information that describes a data center environment.
  • DCOM - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • DCOM (Distributed Component Object Model) - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Active Directory Domain Services and promotes domain controllers.
  • DDBMS - A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.
  • DDBMS (distributed database management system) - A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.
  • DDCD - Double-Density Compact Disk (DDCD) is a CD format that increases the storage capacity of the disk through means such as increasing the number of tracks and pits (scores on the disk that are used to encode the data).
  • DDE - In the Windows, OS/2, and (with third-party development kits) other operating systems, Dynamic Data Exchange (DDE) allows information to be shared or communicated between programs.
  • DDK - A driver development kit (DDK) is a set of programs and related files that are used to develop a new software or hardware driver or to update an existing legacy application driver for an operating system.
  • DDL - Data Definition Language (DDL) is a standard for commands that define the different structures in a database.
  • DDM - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • DDM - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • DDoS - A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • DDoS attack - A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • DDR SDRAM - DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that can theoretically improve memory clock speed to at least 200 MHz*.
  • DDS - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-1 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-2 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-3 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • DDS-4 - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • de anonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de facto standard - A de facto standard is something that is used so widely that it is considered a standard for a given application although it has no official status.
  • de jure standard - A de jure standard is a technology, method or product that has been officially endorsed for a given application.
  • de-anonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de-anonymization (deanonymization) - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • de-perimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • de-perimeterization - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • dead pixel - A dead pixel is a picture element in which all three RGB sub-pixels are permanently turned off, which creates a black spot in the display.
  • dead zone (Wi-Fi dead zone) - A dead zone (Wi-Fi dead zone) is an area within a wireless LAN location where Wi-Fi does not function, typically due to radio interference or range issues.
  • deadlock - A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
  • deal registration - Deal registration is a common feature of vendors' channel partner programs in which a channel partner, such as a value-added reseller (VAR), informs the vendor about a sales lead.
  • deanonymization - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • Debian - Debian is a popular and freely-available computer operating system that uses the Linux kernel and other program components obtained from the GNU project.
  • Debian Linux - Debian is a popular and freely-available computer operating system that uses the Linux kernel and other program components obtained from the GNU project.
  • debounced - Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open; debouncing is any kind of hardware device or software that ensures that only a single signal will be acted upon for a single opening or closing of a contact.
  • debouncing - Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open; debouncing is any kind of hardware device or software that ensures that only a single signal will be acted upon for a single opening or closing of a contact.
  • debug - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • debugger - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • DEC - Now part of Compaq, DEC (Digital Equipment Corporation) has long occupied a leading position in the mid-range computer, traditionally known as the minicomputer, the business computer platform that fits between the mainframe and the personal computer and serves small and medium-sized businesses with its VMS operating system.
  • deception technology - Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.
  • decibel - In electronics and communications, the decibel (abbreviated as dB, and also as db and DB) is a logarithmic expression of the ratio between two signal power, voltage, or current levels.
  • decibels related to dipole antenna - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • decibels relative to carrier - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to carrier (dBc) - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to isotropic radiator - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to isotropic radiator (dBi) - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to one millivolt - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one millivolt (dBmV) - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt (dBm) - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to reference level - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decibels relative to reference level (dBr) - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decimal - Decimal is a term that describes the base-10 number system, probably the most commonly used number system.
  • decision fatigue - Decision fatigue is a state of reduced efficacy in decision making after an excessive number of decisions or a number of decisions with excessive options.
  • decision management - Decision management is a process or set of processes for prioritizing, improving and streamlining action items.
  • Decision Model and Notation (DMN) - Decision Model and Notation (DMN) is a formalized method of making and mapping out decisions through official business processes.
  • decision support system - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • decision support system (DSS) - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible output for a specific input.
  • decision-making process - The decision-making process, in a business context, is a set of steps taken by managers in an enterprise to determine the planned path for business initiatives and to set specific actions in motion.
  • declarative programming - Declarative programming is a method to abstract away the control flow for logic required for software to perform an action, and instead involves stating what the task or desired outcome is.
  • decode - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • decompilation - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompile - To decompile means to convert executable or ready-to-run program code -- sometimes called object code -- into some form of higher-level programming language that humans can easily understand.
  • decompiler - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompressing - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
  • decompression bomb (zip bomb, zip of death attack) - A decompression bomb -- also known as a zip bomb or zip of death attack -- is a malicious archive file containing a large amount of compressed data.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • decoupled CMS (content management system) - Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.
  • decrypt - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close