Browse Definitions :

Browse Definitions by Alphabet

DEN - DIF

  • dense wavelength division multiplexing - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • deobfuscate - Obfuscation means to make something difficult to understand.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deperimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deplatform - To deplatform someone is to remove their access to a channel for delivering messages to an audience.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecate - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecation - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprovisioning - Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.
  • deputy CIO (deputy chief information officer) - Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations.
  • DER - E-voting is an election system that allows voters to record a secret ballot and have it tabulated electronically.
  • derived object - A derived object (DO) is a file created in a Versioned Object Base (VOB).
  • DES - The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption.
  • descriptive analytics - Descriptive analytics is a preliminary stage of data processing that creates a summary of historical data to yield useful information and possibly prepare the data for further analysis.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • design pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • design thinking - Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem.
  • design-centric culture - A design-thinking culture is responsive to customer's needs.
  • desktop - A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop administration - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop as a service - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop as a service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • desktop gadget - A desktop gadget is a software widget, or a small application, that is designed to sit on a user's desktop screen in much the same way that apps reside on smartphones and tablets.
  • desktop layering - Desktop layering is a method of dividing a disk image into logical parts that can be managed individually.
  • desktop management - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • Desktop Management Interface - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • Desktop Management Task Force - The Distributed Management Task Force, Inc.
  • desktop NAS - Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop security - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop theme - A desktop theme is a customized graphical user interface (GUI) that replaces a computer's ordinary sounds, icons, pointer, wallpaper or screensaver with something designed to reflect the interests of the user.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • Desktop virtualization vocabulary quiz - How much do you know about the essential terminology of desktop virtualization? Take our quiz to find out.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • destruction of service (DeOS) attack - A destruction-of-service (DeOS) attack is a form of cyberattack that targets an organization's entire online presence as well as their ability to recover from the attack afterwards.
  • destructive testing - Destructive testing is a software assessment method used to find points of failure in a program.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • development operations - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • development-operations - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • developmental robotics - Developmental robotics is the use of human psychology principles in the design of intelligent, autonomous robots that learn from their own individual experiences.
  • device - In general, a device is a machine designed for a purpose.
  • device agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device agnosticism - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device as a service - Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.
  • device attack - A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.
  • device cloud - A device cloud is a mobile testing environment that enables developers to remotely evaluate the performance of applications on a wide range of smart devices.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device relationship management - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device-agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • DevOps - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • DevSecOps - DevSecOps (development plus security plus operations) is a management approach that combines application development, security, operations and infrastructure as a code (IaaS) in an automated, continuous delivery cycle.
  • DFS - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • DG - Data governance (DG) is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • DHA - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • DHCP - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • diagonal-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • dial peer - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer (addressable call endpoint) - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial-up acceleration - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Dialed Number Identification Service - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • Dialed Number Identification Service (DNIS) - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • dialog box - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dialogflow - Dialogflow is a natural language processing (NLP) platform that can be used to build conversational applications and experiences for a company’s customers in various languages and on multiple platforms.
  • dichotomizing search - A binary search, also called a dichotomizing search, is a digital scheme for locating a specific object in a large set.
  • DICOM - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password.
  • DID - Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.
  • dielectric - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • dielectric constant - The dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space.
  • dielectric material - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • differential power analysis - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close