Browse Definitions :

Browse Definitions by Alphabet

DEV - DIG

  • device attack - A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.
  • device cloud - A device cloud is a mobile testing environment that enables developers to remotely evaluate the performance of applications on a wide range of smart devices.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device relationship management - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device relationship management (DRM) - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device-agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • DevOps - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • DevOps - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • DFS - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • DG - Data governance (DG) is the overall management of the availability, usability, integrity and security of data used in an enterprise.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • DHA - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • DHCP - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • diagonal-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • dial peer - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer (addressable call endpoint) - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer hunting - Dial peer hunting is a feature of voice over IP (VoIP) systems in which the device at the originating router attempts to find an alternative addressable call endpoint if it cannot establish a connection to the intended endpoint.
  • dial-up - Dial-up pertains to a telephone connection in a system of many lines shared by many users.
  • dial-up acceleration - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Dialed Number Identification Service - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • Dialed Number Identification Service (DNIS) - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • dialog box - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dialogflow - Dialogflow is a natural language processing (NLP) platform that can be used to build conversational applications and experiences for a company’s customers in various languages and on multiple platforms.
  • diary of Samuel Pepys - The famous diary that Samuel Pepys (pronounced PEEPS), once the head of England's Navy, kept during the years 1660-1669 is being made available online in the form of a weblog.
  • dichotomizing search - A binary search, also called a dichotomizing search, is a digital scheme for locating a specific object in a large set.
  • DICOM - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password.
  • DID - Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.
  • dielectric - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • dielectric constant - The dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space.
  • dielectric material - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • Difference Engine - The Difference Engine, designed in the 1820s by the English mathematician and inventor Charles Babbage, was intended to automatically compute mathematical tables which, until that time, had been tediously calculated by hand and were prone to error.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • differential power analysis - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis (DPA) - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • Differentiated Services - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Diffie Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • DiffServ - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • digest authentication - Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digiboard - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digicard - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digit - A digit is an element of a set that, taken as a whole, comprises a system of numeration.
  • digital - Digital describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive.
  • digital accessibility - Digital accessibility is the ability of a website, mobile application or electronic document to be easily navigated and understood by a wide range of users, including those users who have visual, auditory, motor or cognitive disabilities.
  • Digital advanced mobile phone service - D-AMPS (Digital-Advanced Mobile Phone Service), sometimes spelled DAMPS, is a digital version of AMPS (Advanced Mobile Phone Service), the original analog standard for cellular telephone phone service in the United States.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital audio broadcasting - .
  • digital audio broadcasting (DAB) - .
  • Digital Audio Tape - DAT (Digital Audio Tape) is a standard medium and technology for the digitalrecording of audioon tape at a professional level of quality.
  • digital audio workstation - A digital audio workstation (DAW) is a computer that is specially equipped with a high-quality sound card and programming for editing and processing digital audio at a professional level.
  • digital audio workstation (DAW) - A digital audio workstation (DAW) is a computer that is specially equipped with a high-quality sound card and programming for editing and processing digital audio at a professional level.
  • digital body language (DBL) - Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.
  • digital camera - A digital camera records and stores photographic images in digital form.
  • digital cash - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital certificate - A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital commons - The digital commons is the collective of discreet online resources that are collaboratively developed and overseen by a community.
  • Digital Compression of Increased Transmission - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • digital core - Digital core is the technology platforms and applications that allow organizations to transform into digital businesses and meet the new needs of the digital economy.
  • digital CRM - Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.
  • digital currency - A digital currency is a medium of exchange that is generated, stored and transferred electronically.
  • digital customer experience delivery platform (DCED platform) - A digital customer experience delivery platform is software that helps create, manage and measure cross-channel digital customer experiences.
  • Digital Dashboard - In information technology, a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organizes and presents information in a way that is easy to read.
  • Digital Data Storage - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • Digital Data Storage (DDS, DDS-1, DDS-2, DDS-3, DDS-4) - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • Digital Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • digital disruption - Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
  • digital divide - The term 'digital divide' describes the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information technology, such as the telephone, television, or the Internet.
  • Digital Dolly - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital due process - Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications.
  • digital economy - The digital economy is the worldwide network of economic activities, commercial transactions and professional interactions that are enabled by information and communications technologies.
  • digital ecosystem - A digital ecosystem is a group of interconnected information technology resources that can function as a unit.
  • Digital Enhanced Cordless Telecommunications - Unlike the analog cordless phones you may have in your home, DECT (Digital Enhanced Cordless Telecommunications) is a digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future.
  • digital enterprise - Digital enterprise is an organization that leverages digital technology as a competitive advantage in its internal and external operations.
  • Digital Equipment Corporation - Now part of Compaq, DEC (Digital Equipment Corporation) has long occupied a leading position in the mid-range computer, traditionally known as the minicomputer, the business computer platform that fits between the mainframe and the personal computer and serves small and medium-sized businesses with its VMS operating system.
  • Digital Evidence - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • Digital Evidence Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • digital evidence presentation system (DEPS) - A digital evidence presentation system (DEPS) is a system with an overhead camera and a liquid crystal display (LCD) used in courts to present and record evidence digitally.
  • digital experience (DX) - Digital experience (DX) is the combination of interactions and overall sentiment that consumers have with an organization's digital touchpoints.
  • digital extraction - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close