Browse Definitions :

Browse Definitions by Alphabet

DEC - DEL

  • decibels related to dipole antenna - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • decibels related to dipole antenna (dBd) - dBd (decibels related to dipole antenna) is a measure of the gain of an antenna system relative to a dipole antenna at radio frequency.
  • decibels relative to carrier - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to carrier (dBc) - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to isotropic radiator - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to isotropic radiator (dBi) - The expression dBi is used to define the gain of an antenna system relative to an isotropic radiator at radio frequencies.
  • decibels relative to one millivolt - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one millivolt (dBmV) - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to one milliwatt (dBm) - The expression dBm is used to define signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to reference level - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decibels relative to reference level (dBr) - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decimal - Decimal is a term that describes the base-10 number system, probably the most commonly used number system.
  • decipher - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decision fatigue - Decision fatigue is a state of reduced efficacy in decision making after an excessive number of decisions or a number of decisions with excessive options.
  • decision management - Decision management is a process or set of processes for prioritizing, improving and streamlining action items.
  • Decision Model and Notation (DMN) - Decision Model and Notation (DMN) is a formalized method of making and mapping out decisions through official business processes.
  • decision support system - A decision support system (DSS) is a computer program application that analyzes business data and presents it so that users can make business decisions more easily.
  • decision support system (DSS) - A decision support system (DSS) is a computer program application that analyzes business data and presents it so that users can make business decisions more easily.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible outcome of a decision.
  • decision tree software - In data mining, decision tree software describes a combination of mathematical and computing techniques that enable a given set of data to be accurately described, categorized and analyzed to derive conclusions.
  • decision-making process - The decision-making process, in a business context, is a set of steps taken by managers in an enterprise to determine the planned path for business initiatives and to set specific actions in motion.
  • declarative programming - Declarative programming is a method to abstract away the control flow for logic required for software to perform an action, and instead involves stating what the task or desired outcome is.
  • decode - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • decompilation - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompile - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompiler - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • decompressing - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • decoupled CMS (content management system) - Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.
  • decrypt - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decryption - In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.
  • DECT - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • DECT (Digital Enhanced Cordless Telecommunications) - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • dedicated line - A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).
  • dedicated server - In the Web hosting business, a dedicated server refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
  • dedicated short range communication - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • dedicated short-range communication (DSRC) - Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
  • deductive argument - A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deduplication software - Dedupe software eliminates unnecessary copies of data by redirecting new iterations of the data back to the original.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep archive - A deep archive is a type of data archiving that refers to a storage location for data that will likely never be accessed again, but can't be deleted.
  • deep learning - Deep learning is a type of machine learning (ML) and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • deep packet inspection - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • Deep Space Network - The Deep Space Network (DSN) is a sophisticateddata communications system used by the U.
  • Deep Space Network (DSN) - The Deep Space Network (DSN) is a sophisticateddata communications system used by the U.
  • deep Web - Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records and other content that is accessible over the Internet but is not crawled and indexed by search engines.
  • DeepBrain Chain - DeepBrain Chain (DBC) is a blockchain-based computing platform for AI that was designed to lower user costs for processing power.
  • deepfake (deep fake AI) - Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing image, audio and video hoaxes.
  • DeepMind - DeepMind is a division of Alphabet, Inc.
  • default - In computer technology, a default (noun, pronounced dee-FAWLT) is a predesigned value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - Default passwords are commonly used for routers, access points, switches and firewalls.
  • Defense Acquisition Regulatory Council - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Advanced Research Projects Agency - DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.
  • Defense Advanced Research Projects Agency Network - DARPANET (or DARPANet) is a term sometimes used for the ARPANET, the early network from which today's Internet evolved.
  • Defense Contract Management Agency - The Defense Contract Management Agency is the government agency that overseas administration of origin inspection contracts, dispatches quality assurance reports and audits/monitors subcontracting plans.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • defense in depth - Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise.
  • Defense Information Systems Agency - Defense Information Systems Agency (DISA) is a U.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • Defense Message System - The Defense Message System (DMS) is a secure X.
  • Defense Message System (DMS) - The Defense Message System (DMS) is a secure X.
  • Deferred Action for Childhood Arrivals (DACA) - Deferred Action for Childhood Arrivals (DACA) is a program run by the United States Department of Homeland Security which allowed specific illegal immigrants who came to the country as children, known as Dreamers, to defer removal action for two years, a time period which could then be renewed.
  • definition of done - A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed.
  • Defrag - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragment - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragmenter - A defragmenter is a software utility that rearranges the fragments or discontiguous parts of each file stored on a computer hard disk so that the small, empty storage spaces adjacent to fragments can be used, effectively creating new storage space and possibly making file access faster.
  • deg - The angular degree is a unit of plane angular measure used in some engineering applications, and by most lay people.
  • degauss - To degauss is to demagnetize.
  • degree Fahrenheit - The degree Fahrenheit (o F) is the unit of temperature used by most people in the United States in describing weather.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degree per second squared - The degree per second squared is an alternative unit of angular (rotational) acceleration magnitude, which is the rate of change of angular speed or velocity.
  • degrees of freedom - Degrees of freedom, in a mechanics context, are specific, defined modes in which a mechanical device or system can move.
  • delay-tolerant network - A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • deliverable - Deliverable, as an adjective, describes something that can be delivered, such as a product or service.
  • delivery drone - A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.
  • delivery of real time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • delivery of real-time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • Dell Boomi - Dell Boomi is a Software as a Service (SaaS) integration vendor that provides its AtomSphere technology to a host of industry giants, including Salesforce.
  • Dell EMC - Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC Federation Enterprise Hybrid Cloud - Federation Enterprise Hybrid Cloud is a reference architecture that uses technologies from Dell EMC's Federation to integrate public and private clouds.
  • Dell EMC Partner Program - The Dell EMC Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • Dell EMC World - Dell EMC World is an annual event for Dell EMC customers that showcases new and emerging technologies in the virtualization, cloud and data storage market.
  • Dell EqualLogic - Dell EqualLogic storage-area network arrays provide varying capacities of hard disk drives and solid-state drives using iSCSI and SATA controllers.
  • Delphi - Delphi (pronounced DEHL-FAI) from Borland competes with Visual Basic as an offering for an object-oriented, visual programming approach to application development.
  • Delphi Cheat Sheets - We've gathered cheat sheets for fast reference to information about Delphi.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close