Browse Definitions :

Browse Definitions by Alphabet

DEL - DET

  • Dell EMC World - Dell EMC World is an annual event for Dell EMC customers that showcases new and emerging technologies in the virtualization, cloud and data storage market.
  • Dell EqualLogic - Dell EqualLogic storage-area network arrays provide varying capacities of hard disk drives and solid-state drives using iSCSI and SATA controllers.
  • Dell State Health Services - Dell State Health Services is a policy consulting division of the Dell corporation that provides technology and business solutions for states looking to meet the new federal healthcare requirements.
  • Delphi - Delphi (pronounced DEHL-FAI) from Borland competes with Visual Basic as an offering for an object-oriented, visual programming approach to application development.
  • Delphi Cheat Sheets - We've gathered cheat sheets for fast reference to information about Delphi.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • delta differential - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • demand based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand flow scheduling system - A demand flow scheduling system is a software product designed to optimize demand-based manufacturing practices.
  • demand generation (demand gen) - Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.
  • Demand Planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is a supply chain management strategy where a company uses tactics such as price incentives to influence the number of customer requests for a certain product in order to match its planned supply.
  • Demand signal repository - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • Demand signal repository (DSR) - Demand signal repository (DSR) is a database that aggregates sales data at the point of sale (POS).
  • demand-based switching - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-based switching (DBS) - Demand-based switching (DBS) is a power-management technology developed by Intel in which the applied voltage and clock speed for a microprocessor are kept to the minimum necessary to allow optimum performance of required operations.
  • demand-driven manufacturing - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-side platform (DSP) - A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.
  • demarc - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarc (demarcation point) - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demarcation point - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demilitarized zone - In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the internet.
  • demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demographic - A demographic is a subset of a population that shares a common factor such as age, income or education level.
  • demographics - Demographics is the study of the behaviors and other characteristics of groups of human beings in terms of statistics.
  • demogroup - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demomaker - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • demoparty - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • demutualization - Demutualization is the process through which a member-owned company becomes shareholder-owned; frequently this is a step toward the initial public offering (IPO) of a company.
  • DEN - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • DEN (Directory-Enabled Networking) - Directory-Enabled Networking (DEN) is an industry-standard initiative and specification for how to construct and store information about a network's users, applications, and data in a central directory.
  • dendrimer - A dendrimer (from Greek dendra for tree) is an artificially manufactured or synthesized molecule built up from branched units called monomers.
  • deniable encryption - Deniable encryption is a type of cryptography that allows an encrypted text to be decrypted in two or more ways, depending on which decryption key is used.
  • denial of service - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial of service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denial-of-service attack - A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
  • denormalization - In a relational database, denormalization is an approach to optimizing performance in which the administrator selectively adds back specific instances of duplicate data after the data structure has been normalized.
  • dense wavelength division multiplexing (DWDM) - Dense wavelength division multiplexing (DWDM) is a technology that puts together -- multiplexes -- data signals from different sources so they can share a single optical fiber pair while maintaining complete separation of the data streams.
  • deobfuscate - Obfuscation, in general, describes a practice that is used to intentionally make something more difficult to understand.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deperimeterisation - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deperimeterization - In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.
  • deplatform - To deplatform someone is to remove their access to a channel for delivering messages to an audience.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • depository - A depository is a file or set of files in which data is stored for the purpose of safekeeping or identity authentication.
  • deprecate - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprecation - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • deprovisioning - Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.
  • deputy CIO (deputy chief information officer) - Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations.
  • DER - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • derived object (DO) - A derived object (DO) is a file created in a Versioned Object Base (VOB).
  • DES - The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption.
  • descriptive analytics - Descriptive analytics is a preliminary stage of data processing that creates a summary of historical data to yield useful information and possibly prepare the data for further analysis.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • design by committee - Design by committee is a term sometimes used to describe a design that is flawed because too many people provided input.
  • design pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • design thinking - Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem.
  • design-centric culture - A design-thinking culture is responsive to customer's needs.
  • desktop - A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop administration - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop as a service - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • Desktop as a Service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • Desktop as a Service provider (DaaS provider) - A Desktop as a Service provider is a company that hosts virtual desktop infrastructure (VDI) for customers and delivers virtual desktops to those organizations' end users.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • desktop gadget - A desktop gadget is a software widget, or a small application, that is designed to sit on a user's desktop screen in much the same way that apps reside on smartphones and tablets.
  • desktop layering - Desktop layering is a method of dividing a disk image into logical parts that can be managed individually.
  • desktop management - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • Desktop Management Interface - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • Desktop Management Task Force - The Distributed Management Task Force, Inc.
  • desktop NAS - Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop search - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop security - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop supercomputer (personal supercomputer) - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • desktop theme - A desktop theme is a customized graphical user interface (GUI) that replaces a computer's ordinary sounds, icons, pointer, wallpaper or screensaver with something designed to reflect the interests of the user.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.
  • Desktop virtualization vocabulary quiz - How much do you know about the essential terminology of desktop virtualization? Take our quiz to find out.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • destruction of service (DeOS) attack - A destruction-of-service (DeOS) attack is a form of cyberattack that targets an organization's entire online presence as well as their ability to recover from the attack afterwards.
  • destructive testing - Destructive testing is a software assessment method used to find points of failure in a program.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close