Browse Definitions :

Browse Definitions by Alphabet

DEV - DIG

  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • development operations - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • development-operations - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • developmental robotics - Developmental robotics is the use of human psychology principles in the design of intelligent, autonomous robots that learn from their own individual experiences.
  • device - In general, a device is a machine designed for a purpose.
  • device agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device agnosticism - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device as a service - Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.
  • device attack - A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.
  • device cloud - A device cloud is a mobile testing environment that enables developers to remotely evaluate the performance of applications on a wide range of smart devices.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device relationship management - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device relationship management (DRM) - Device relationship management (DRM) is enterprise software that enables the monitoring, managing, and servicing of intelligent devices over the Internet.
  • device-agnostic - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • deviceCOM - DeviceCOM, from Intrinsyc Software, is a line of device and network integration products that is used to make Internet or PC devices work with each other on a network.
  • DevOps - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • DevOps - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • DFS - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • DG - Data governance (DG) is the overall management of the availability, usability, integrity and security of data used in an enterprise.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • DHA - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • DHCP - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DHTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • diagonal-parity RAID - Double-parity RAID (redundant array of independent disks), also called diagonal-parity RAID, Advanced Data Guarding (RAID_ADG), or RAID-6, is a method of protecting against multiple storage drive failures by creating two sets of parity data on an array of hard disks.
  • dial peer - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer (addressable call endpoint) - A dial peer, also known as an addressable call endpoint, is a device that can originate or receive a call in a telephone network.
  • dial peer hunting - Dial peer hunting is a feature of voice over IP (VoIP) systems in which the device at the originating router attempts to find an alternative addressable call endpoint if it cannot establish a connection to the intended endpoint.
  • dial-up - Dial-up pertains to a telephone connection in a system of many lines shared by many users.
  • dial-up acceleration - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Dialed Number Identification Service - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • Dialed Number Identification Service (DNIS) - DNIS (Dialed Number Identification Service) is a telephone service that identifies for the receiver of a call the number that the caller dialed.
  • dialog box - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • Dialogflow - Dialogflow is a natural language processing (NLP) platform that can be used to build conversational applications and experiences for a company’s customers in various languages and on multiple platforms.
  • diary of Samuel Pepys - The famous diary that Samuel Pepys (pronounced PEEPS), once the head of England's Navy, kept during the years 1660-1669 is being made available online in the form of a weblog.
  • dichotomizing search - A binary search, also called a dichotomizing search, is a digital scheme for locating a specific object in a large set.
  • DICOM - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • Dictionaries we recommend - Quick look-up for more technical resources you may find helpful.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password.
  • DID - Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.
  • DidTheyReadIt - DidTheyReadIt is an e-mail nonrepudiation program that uses a Web bug to determine whether the recipient of an HTML e-mail message has viewed it and report information back to the sender, typically without the recipient's knowledge.
  • dielectric - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • dielectric constant - The dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space.
  • dielectric material - A dielectric material is a substance that is a poor conductor of electricity, but an efficient supporter of electrostatic fields.
  • Difference Engine - The Difference Engine, designed in the 1820s by the English mathematician and inventor Charles Babbage, was intended to automatically compute mathematical tables which, until that time, had been tediously calculated by hand and were prone to error.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • differential power analysis - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis (DPA) - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • differential power analysis2 - A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.
  • Differentiated Services - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Diffie Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • DiffServ - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • digest authentication - Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digiboard - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digicard - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digit - A digit is an element of a set that, taken as a whole, comprises a system of numeration.
  • digital - Digital describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive.
  • digital accessibility - Digital accessibility is the ability of a website, mobile application or electronic document to be easily navigated and understood by a wide range of users, including those users who have visual, auditory, motor or cognitive disabilities.
  • Digital advanced mobile phone service - D-AMPS (Digital-Advanced Mobile Phone Service), sometimes spelled DAMPS, is a digital version of AMPS (Advanced Mobile Phone Service), the original analog standard for cellular telephone phone service in the United States.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital audio broadcasting - .
  • digital audio broadcasting (DAB) - .
  • Digital Audio Tape - DAT (Digital Audio Tape) is a standard medium and technology for the digitalrecording of audioon tape at a professional level of quality.
  • digital audio workstation - A digital audio workstation (DAW) is a computer that is specially equipped with a high-quality sound card and programming for editing and processing digital audio at a professional level.
  • digital audio workstation (DAW) - A digital audio workstation (DAW) is a computer that is specially equipped with a high-quality sound card and programming for editing and processing digital audio at a professional level.
  • digital body language (DBL) - Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.
  • digital camera - A digital camera records and stores photographic images in digital form.
  • digital cash - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital certificate - A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital commons - The digital commons is the collective of discreet online resources that are collaboratively developed and overseen by a community.
  • Digital Compression of Increased Transmission - DCIT (Digital Compression of Increased Transmission) is an approach to compressing information that compresses the entire transmission rather than just all or some part of the content.
  • digital core - Digital core is the technology platforms and applications that allow organizations to transform into digital businesses and meet the new needs of the digital economy.
  • digital CRM - Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.
  • digital currency - A digital currency is a medium of exchange that is generated, stored and transferred electronically.
  • digital customer experience delivery platform (DCED platform) - A digital customer experience delivery platform is software that helps create, manage and measure cross-channel digital customer experiences.
  • Digital Dashboard - In information technology, a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organizes and presents information in a way that is easy to read.
  • Digital Data Storage - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • Digital Data Storage (DDS, DDS-1, DDS-2, DDS-3, DDS-4) - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • Digital Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • digital disruption - Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
  • digital divide - The term 'digital divide' describes the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information technology, such as the telephone, television, or the Internet.
  • Digital Dolly - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close