Browse Definitions :

Browse Definitions by Alphabet

DEC - DEN

  • decompressing - Uncompressing (or decompressing) is the act of expanding a compression file back into its original form.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • decoupled CMS (content management system) - Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.
  • decrypt - All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext.
  • decryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • DECT - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • DECT (Digital Enhanced Cordless Telecommunications) - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • dedicated hosting - In the Web hosting business, a dedicated server refers to the rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.
  • dedicated line - A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).
  • dedicated short range communication - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • dedicated short-range communication (DSRC) - Dedicated short-range communication (DSRC) is a wireless communication technology designed to allow automobiles in the intelligent transportation system (ITS) to communicate with other automobiles or infrastructure technology.
  • deductive argument - A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deduplication software - Dedupe software eliminates unnecessary copies of data by redirecting new iterations of the data back to the original.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep archive - A deep archive is a type of data archiving that refers to a storage location for data that will likely never be accessed again, but can't be deleted.
  • deep learning - Deep learning is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • deep packet inspection - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • Deep Space Network - The Deep Space Network (DSN) is a sophisticateddata communications system used by the U.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • DeepBrain Chain - DeepBrain Chain (DBC) is a blockchain-based computing platform for AI that was designed to lower user costs for processing power.
  • deepfake AI (deep fake) - Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing images, audio and video hoaxes.
  • DeepMind - DeepMind is a division of Alphabet, Inc.
  • default - In computer technology, a default (noun, pronounced dee-FAWLT) is a predesigned value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - Default passwords are commonly used for routers, access points, switches and firewalls.
  • Defense Acquisition Regulatory Council - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Advanced Research Projects Agency - DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.
  • Defense Advanced Research Projects Agency Network - DARPANET (or DARPANet) is a term sometimes used for the ARPANET, the early network from which today's Internet evolved.
  • Defense Contract Management Agency - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • defense in depth - Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise.
  • Defense Information Systems Agency - Defense Information Systems Agency (DISA) is a U.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • Defense Message System - The Defense Message System (DMS) is a secure X.
  • Deferred Action for Childhood Arrivals (DACA) - Deferred Action for Childhood Arrivals (DACA) is a program run by the United States Department of Homeland Security which allowed specific illegal immigrants who came to the country as children, known as Dreamers, to defer removal action for two years, a time period which could then be renewed.
  • definition of done - A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed.
  • Defrag - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragment - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • defragmenter - A defragmenter is a software utility that rearranges the fragments or discontiguous parts of each file stored on a computer hard disk so that the small, empty storage spaces adjacent to fragments can be used, effectively creating new storage space and possibly making file access faster.
  • deg - The angular degree is a unit of plane angular measure used in some engineering applications, and by most lay people.
  • degree Fahrenheit - The degree Fahrenheit (o F) is the unit of temperature used by most people in the United States in describing weather.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degrees of freedom - Degrees of freedom, in a mechanics context, are specific, defined modes in which a mechanical device or system can move.
  • delay-tolerant network - A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • delivery drone - A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.
  • delivery of real time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • delivery of real-time execution information protocol - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • Dell Boomi - Dell Boomi is a Software as a Service (SaaS) integration vendor that provides its AtomSphere technology to a host of industry giants, including Salesforce.
  • Dell EMC - Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.
  • Dell EMC Atmos - Dell EMC Atmos is an object-based cloud storage platform that was released in November 2008 by EMC.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC Federation Enterprise Hybrid Cloud - Federation Enterprise Hybrid Cloud is a reference architecture that uses technologies from Dell EMC's Federation to integrate public and private clouds.
  • Dell EMC NetWorker - Dell EMC NetWorker is a backup software platform for the enterprise.
  • Dell EMC Partner Program - The Dell EMC Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • Dell EMC VxRail - Dell EMC VxRail is a hyper-converged appliance.
  • Dell EMC World - Dell EMC World is an annual event for Dell EMC customers that showcases new and emerging technologies in the virtualization, cloud and data storage market.
  • Dell EqualLogic - Dell EqualLogic storage-area network arrays provide varying capacities of hard disk drives and solid-state drives using iSCSI and SATA controllers.
  • Delphi Cheat Sheets - We've gathered cheat sheets for fast reference to information about Delphi.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differential - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • demand based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand flow scheduling system - A demand flow scheduling system is a software product designed to optimize demand-based manufacturing practices.
  • demand generation (demand gen) - Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is a supply chain management strategy where a company uses tactics such as price incentives to influence the number of customer requests for a certain product in order to match its planned supply.
  • Demand signal repository - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • Demand signal repository (DSR) - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • demand-based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-side platform (DSP) - A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.
  • demarc - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarc (demarcation point) - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarcation point - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demilitarized zone - In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -- usually the public internet.
  • demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demographic - A demographic is a subset of a population that shares a common factor such as age, income or education level.
  • demogroup - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demomaker - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • demoparty - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • DEN - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • denial of service - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial of service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denormalization - Denormalization is the process of adding precomputed redundant data to an otherwise normalized relational database to improve read performance of the database.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close