Browse Definitions :

Browse Definitions by Alphabet

DEP - DIG

  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deperimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deperimeterization - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deplatform - To deplatform someone is to remove their access to a channel for delivering messages to an audience.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecate - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecation - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprovisioning - Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.
  • deputy CIO (deputy chief information officer) - Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations.
  • DER - E-voting is an election system that allows voters to record a secret ballot and have it tabulated electronically.
  • derived object - A derived object (DO) is a file created in a Versioned Object Base (VOB).
  • DES - Data Encryption Standard (DES) is an outdated symmetric key method of data encryption.
  • descriptive analytics - Descriptive analytics is a preliminary stage of data processing that creates a summary of historical data to yield useful information and possibly prepare the data for further analysis.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • design pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • design thinking - Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem.
  • design-centric culture - A design-thinking culture is responsive to customer's needs.
  • desktop - A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop administration - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop as a service - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop as a service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • desktop gadget - A desktop gadget is a software widget, or a small application, that is designed to sit on a user's desktop screen in much the same way that apps reside on smartphones and tablets.
  • desktop layering - Desktop layering is a method of dividing a disk image into logical parts that can be managed individually.
  • desktop management - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • Desktop Management Interface - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • Desktop Management Task Force - The Distributed Management Task Force, Inc.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop security - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop theme - A desktop theme is a customized graphical user interface (GUI) that replaces a computer's ordinary sounds, icons, pointer, wallpaper or screensaver with something designed to reflect the interests of the user.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • Desktop virtualization vocabulary quiz - How much do you know about the essential terminology of desktop virtualization? Take our quiz to find out.
  • destruction of service (DeOS) attack - A destruction-of-service (DeOS) attack is a form of cyberattack that targets an organization's entire online presence as well as their ability to recover from the attack afterwards.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • development operations - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • development-operations - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • device - In general, a device is a machine designed for a purpose.
  • device agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device agnosticism - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device as a service - Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.
  • device attack - A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.
  • device cloud - A device cloud is a mobile testing environment that enables developers to remotely evaluate the performance of applications on a wide range of smart devices.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device relationship management - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device-agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • DevOps - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • DevSecOps - DevSecOps (development plus security plus operations) is a management approach that combines application development, security, operations and infrastructure as a code (IaaS) in an automated, continuous delivery cycle.
  • DFS - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • DG - Data governance (DG) is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • DHA - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • DHCP - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • diagonal-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • dial peer - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer (addressable call endpoint) - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial-up acceleration - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Dialed Number Identification Service - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • Dialed Number Identification Service (DNIS) - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • dialog box - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dialogflow - Dialogflow is a natural language processing (NLP) platform that can be used to build conversational applications and experiences for a company’s customers in various languages and on multiple platforms.
  • dichotomizing search - A binary search, also called a dichotomizing search, is a digital scheme for locating a specific object in a large set.
  • DICOM - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password.
  • DID - Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.
  • dielectric - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • dielectric constant - The dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space.
  • dielectric material - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • differential power analysis - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis (DPA) - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • Differentiated Services - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Diffie Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • DiffServ - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • digest authentication - Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile data storage device.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close