Browse Definitions :

Browse Definitions by Alphabet

DEL - DEV

  • delta differential - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • demand based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand flow scheduling system - A demand flow scheduling system is a software product designed to optimize demand-based manufacturing practices.
  • demand generation (demand gen) - Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.
  • Demand Planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is a supply chain management strategy where a company uses tactics such as price incentives to influence the number of customer requests for a certain product in order to match its planned supply.
  • Demand signal repository - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • Demand signal repository (DSR) - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • demand-based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-based switching (DBS) - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-side platform (DSP) - A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.
  • demarc - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarc (demarcation point) - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarcation point - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demilitarized zone - In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the internet.
  • demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demographic - A demographic is a subset of a population that shares a common factor such as age, income or education level.
  • demographics - Demographics is the study of the behaviors and other characteristics of groups of human beings in terms of statistics.
  • demogroup - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demomaker - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • demoparty - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demutualization - Demutualization is the process through which a member-owned company becomes shareholder-owned; frequently this is a step toward the initial public offering (IPO) of a company.
  • DEN - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • DEN (Directory-Enabled Networking) - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • dendrimer - A dendrimer (from Greek dendra for tree) is an artificially manufactured or synthesized molecule built up from branched units called monomers.
  • deniable encryption - Deniable encryption is a type of cryptography that allows an encrypted text to be decrypted in two or more ways, depending on which decryption key is used.
  • denial of service - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial of service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denormalization - In a relational database, denormalization is an approach to optimizing performance in which the administrator selectively adds back specific instances of duplicate data after the data structure has been normalized.
  • dense wavelength division multiplexing (DWDM) - Dense wavelength division multiplexing (DWDM) is a technology that puts together -- multiplexes -- data signals from different sources so they can share a single optical fiber pair while maintaining complete separation of the data streams.
  • deobfuscate - Obfuscation, in general, describes a practice that is used to intentionally make something more difficult to understand.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deperimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deperimeterization - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deplatform - To deplatform someone is to remove their access to a channel for delivering messages to an audience.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • depository - A depository is a file or set of files in which data is stored for the purpose of safekeeping or identity authentication.
  • deprecate - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecation - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprovisioning - Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.
  • deputy CIO (deputy chief information officer) - Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations.
  • DER - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • derived object (DO) - A derived object (DO) is a file created in a Versioned Object Base (VOB).
  • DES - The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption.
  • descriptive analytics - Descriptive analytics is a preliminary stage of data processing that creates a summary of historical data to yield useful information and possibly prepare the data for further analysis.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • design by committee - Design by committee is a term sometimes used to describe a design that is flawed because too many people provided input.
  • design pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • design thinking - Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem.
  • design-centric culture - A design-thinking culture is responsive to customer's needs.
  • desktop - A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop administration - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop as a service - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • Desktop as a Service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • desktop gadget - A desktop gadget is a software widget, or a small application, that is designed to sit on a user's desktop screen in much the same way that apps reside on smartphones and tablets.
  • desktop layering - Desktop layering is a method of dividing a disk image into logical parts that can be managed individually.
  • desktop management - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • Desktop Management Interface - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • Desktop Management Task Force - The Distributed Management Task Force, Inc.
  • desktop NAS - Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop security - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop supercomputer (personal supercomputer) - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop theme - A desktop theme is a customized graphical user interface (GUI) that replaces a computer's ordinary sounds, icons, pointer, wallpaper or screensaver with something designed to reflect the interests of the user.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.
  • Desktop virtualization vocabulary quiz - How much do you know about the essential terminology of desktop virtualization? Take our quiz to find out.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • destruction of service (DeOS) attack - A destruction-of-service (DeOS) attack is a form of cyberattack that targets an organization's entire online presence as well as their ability to recover from the attack afterwards.
  • destructive testing - Destructive testing is a software assessment method used to find points of failure in a program.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • development operations - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • development-operations - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • developmental robotics - Developmental robotics is the use of human psychology principles in the design of intelligent, autonomous robots that learn from their own individual experiences.
  • device - In general, a device is a machine designed for a purpose.
  • device agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device agnosticism - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device as a service - Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close