Browse Definitions :

Browse Definitions by Alphabet

DEC - DEP

  • decryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • DECT - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • DECT (Digital Enhanced Cordless Telecommunications) - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • dedicated hosting - In the Web hosting business, a dedicated server refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
  • dedicated line - A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).
  • dedicated short range communication - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • dedicated short-range communication (DSRC) - Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
  • deductive argument - A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deduplication software - Dedupe software eliminates unnecessary copies of data by redirecting new iterations of the data back to the original.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep archive - A deep archive is a type of data archiving that refers to a storage location for data that will likely never be accessed again, but can't be deleted.
  • deep learning - Deep learning is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • deep packet inspection - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • Deep Space Network - The Deep Space Network (DSN) is a sophisticateddata communications system used by the U.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • DeepBrain Chain - DeepBrain Chain (DBC) is a blockchain-based computing platform for AI that was designed to lower user costs for processing power.
  • deepfake AI (deep fake) - Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing images, audio and video hoaxes.
  • DeepMind - DeepMind is a division of Alphabet, Inc.
  • default - In computer technology, a default (noun, pronounced dee-FAWLT) is a predesigned value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - Default passwords are commonly used for routers, access points, switches and firewalls.
  • Defense Acquisition Regulatory Council - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Advanced Research Projects Agency - DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.
  • Defense Advanced Research Projects Agency Network - DARPANET (or DARPANet) is a term sometimes used for the ARPANET, the early network from which today's Internet evolved.
  • Defense Contract Management Agency - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • defense in depth - Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise.
  • Defense Information Systems Agency - Defense Information Systems Agency (DISA) is a U.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • Defense Message System - The Defense Message System (DMS) is a secure X.
  • Deferred Action for Childhood Arrivals (DACA) - Deferred Action for Childhood Arrivals (DACA) is a program run by the United States Department of Homeland Security which allowed specific illegal immigrants who came to the country as children, known as Dreamers, to defer removal action for two years, a time period which could then be renewed.
  • definition of done - A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed.
  • Defrag - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragment - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • deg - The angular degree is a unit of plane angular measure used in some engineering applications, and by most lay people.
  • degree Fahrenheit - The degree Fahrenheit (o F) is the unit of temperature used by most people in the United States in describing weather.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degrees of freedom - Degrees of freedom, in a mechanics context, are specific, defined modes in which a mechanical device or system can move.
  • delay-tolerant network (DTN) - A delay-tolerant network (DTN) is a network that's designed to operate effectively in extreme conditions and over very large distances, such as with space communications.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • delivery drone - A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.
  • delivery of real time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • delivery of real-time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • Dell Boomi - Dell Boomi is a Software as a Service (SaaS) integration vendor that provides its AtomSphere technology to a host of industry giants, including Salesforce.
  • Dell EMC - Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.
  • Dell EMC Atmos - Dell EMC Atmos is an object-based cloud storage platform that was released in November 2008 by EMC.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC Federation Enterprise Hybrid Cloud - Federation Enterprise Hybrid Cloud is a reference architecture that uses technologies from Dell EMC's Federation to integrate public and private clouds.
  • Dell EMC NetWorker - Dell EMC NetWorker is a backup software platform for the enterprise.
  • Dell EMC Partner Program - The Dell EMC Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • Dell EMC VxRail - Dell EMC VxRail is a hyper-converged appliance.
  • Dell EMC World - Dell EMC World is an annual event for Dell EMC customers that showcases new and emerging technologies in the virtualization, cloud and data storage market.
  • Dell EqualLogic - Dell EqualLogic storage-area network arrays provide varying capacities of hard disk drives and solid-state drives using iSCSI and SATA controllers.
  • Delphi Cheat Sheets - We've gathered cheat sheets for fast reference to information about Delphi.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differential - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • demand based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand flow scheduling system - A demand flow scheduling system is a software product designed to optimize demand-based manufacturing practices.
  • demand generation (demand gen) - Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is an operational supply chain management (SCM) strategy where a company uses tactics such as price incentives, cost modifications and product substitutions to entice customers to purchase specific items.
  • Demand signal repository - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • Demand signal repository (DSR) - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • demand-based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-side platform (DSP) - A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.
  • demarc - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarc (demarcation point) - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarcation point - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demilitarized zone - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
  • demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demographic - A demographic is a subset of a population that shares a common factor such as age, income or education level.
  • demogroup - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demomaker - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • demoparty - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • DEN - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • denial of service - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial of service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denormalization - Denormalization is the process of adding precomputed redundant data to an otherwise normalized relational database to improve read performance of the database.
  • dense wavelength division multiplexing - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • deobfuscate - Obfuscation means to make something difficult to understand.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close