Browse Definitions :

Browse Definitions by Alphabet

DIR - DIS

  • dirty data - In a data warehouse, dirty data is a database record that contains errors.
  • dirty electricity - Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring.
  • DISA - Defense Information Systems Agency (DISA) is a U.
  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • disambiguation - Disambiguation (also called word sense disambiguation) is the act of interpreting the intended sense or meaning of a word.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • disassemble - In programming terminology, to disassemble is to convert a program in its executable (ready-to-run) form (sometimes called object code) into a representation in some form of assembler language so that it is readable by a human.
  • disassembler - In programming terminology, to disassemble is to convert a program in its executable (ready-to-run) form (sometimes called object code) into a representation in some form of assembler language so that it is readable by a human.
  • disaster recovery - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery (DR) - Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.
  • disaster recovery (DR) test - A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's business continuity/disaster recovery (BCDR) planning process.
  • Disaster Recovery as a Service (DRaaS) - Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.
  • disaster recovery plan - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery planning - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery site (DR site) - An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.
  • Disciplined Agile Delivery (DAD) - Disciplined Agile Delivery (DAD) is a scalable Agile software delivery framework.
  • discontinuous transmission - Discontinuous transmission (DTX) is a method of momentarily powering-down, or muting, a mobile or portable wireless telephone set when there is no voice input to the set.
  • discontinuous transmission (DTX) - Discontinuous transmission (DTX) is a method of momentarily powering-down, or muting, a mobile or portable wireless telephone set when there is no voice input to the set.
  • discoverability - Discoverability is the capacity of something to be found.
  • discoverability (in UX design) - Discoverability, in the context of product and interface design, is the degree of ease with which the user can find all the elements and features of a new system when they first encounter it.
  • discoverability marketing - Discoverability marketing is the practice of making it easier for customers or potential customers to find products when they are actively looking for them or have demonstrated a need for them.
  • discovery mailbox - A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • discrete manufacturing - Discrete manufacturing is an industry term for the manufacturing of finished products that are distinct items capable of being easily counted, touched or seen.
  • discrete multitone - Discrete multitone (DMT) is a method of separating a Digital Subscriber Line (DSL) signal so that the usable frequency range is separated into 256 frequency bands (or channels) of 4.
  • discrete multitone (DMT) - Discrete multitone (DMT) is a method of separating a Digital Subscriber Line (DSL) signal so that the usable frequency range is separated into 256 frequency bands (or channels) of 4.
  • discussion board - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • discussion group - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disinformation - Disinformation is a type of untrue communication that is purposefully spread and represented as truth to elicit some response that serves the perpetrator's purpose.
  • disjoint namespace - Disjoint namespace is an occurrence in Active Directory when a member computer with one Domain Name Service (DNS) primary suffix does not have the same DNS domain name as the domain of which the computers are members.
  • disk analyzer - A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.
  • disk array - A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object storage.
  • disk backup or disk-based backup - Disk backup, or disk-based backup, is a data backup and recovery method that backs data up to hard disk storage.
  • disk cache - A disk cache is a mechanism for improving the time it takes to read from or write to a hard disk.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • disk mirroring - RAID 1 is one of the most common RAID levels and the most reliable.
  • disk mirroring - Disk duplexing is a variation of disk mirroring in which each of multiple storage disks has its own SCSI controller.
  • disk mirroring (RAID 1) - RAID 1 is one of the most common RAID levels and the most reliable.
  • Disk Operating System - DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS).
  • Disk Partition Utility - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • disk to disk to cloud - D2D2C (disk-to-disk-to-cloud) is an approach to hybrid cloud backup that involves using local storage for staging data that will eventually be sent to a third-part cloud storage service provider.
  • disk to disk to tape - Disk-to-disk-to-tape (D2D2T) is an approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk and then later on copied again to tape.
  • disk-to-disk-to-cloud - D2D2C (disk-to-disk-to-cloud) is an approach to hybrid cloud backup that involves using local storage for staging data that will eventually be sent to a third-part cloud storage service provider.
  • disk-to-disk-to-tape - Disk-to-disk-to-tape (D2D2T) is an approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk and then later on copied again to tape.
  • diskette - A diskette is a random access, removable data storage medium that can be used with personal computers.
  • diskette (floppy disk) - A diskette is a random access, removable data storage medium that can be used with personal computers.
  • DiskOnKey - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
  • Diskpart - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • Diskpart (Disk Partition Utility) - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • disparity - Running disparity (RD or rd) is the difference between the number of logic 1 bits and logic 0 bits between the start of a data sequence and a particular instant in time during its transmission.
  • displacement - Displacement (symbolized d or s), also called length or distance, is a one-dimensional quantity representing the separation between two defined points.
  • display - A display is a computer output surface and projecting mechanism that shows text and often graphic images to the computer user, using a cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode, gas plasma, or other image projection technology.
  • display adapter - A video adapter (alternate terms include graphics card, display adapter, video card, video board and almost any combination of the words in these terms) is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a computer's display.
  • display mode - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • display modes - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • displayboard - A readerboard is a visual display board that conveys information about a wide variety of subjects, including advertising for products or services, travel, news or event information.
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • disposable phone number - A disposable phone number is a virtual phone number that is usable temporarily.
  • disruption tolerant network - A disruption-tolerant network (DTN) is a network designed so that temporary or intermittent communications problems, limitations and anomalies have the least possible adverse impact.
  • disruption-tolerant network - A disruption-tolerant network (DTN) is a network designed so that temporary or intermittent communications problems, limitations and anomalies have the least possible adverse impact.
  • disruptive innovation - Disruptive innovation is the introduction of a product or service into an established industry that performs better and, generally, at a lower cost than existing offerings, thereby displacing the market leaders in that particular market space and transforming the industry.
  • disruptive technology - A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.
  • distance - Displacement (symbolized d or s), also called length or distance, is a one-dimensional quantity representing the separation between two defined points.
  • distance learning - Distance learning, sometimes called e-learning, is a formalized teaching and learning system specifically designed to be carried out remotely by using electronic communication.
  • distance learning (e-learning) - Distance learning, sometimes called e-learning, is a formalized teaching and learning system specifically designed to be carried out remotely by using electronic communication.
  • Distance Vector Multicast Routing Protocol - DVMRP (Distance Vector Multicast Routing Protocol) is the oldest routing protocol that has been used to support multicast data transmission over networks.
  • distributed - Computing is said to be "distributed" when the computer programming and data that computers work on are spread out over more than one computer, usually over a network.
  • distributed antenna system - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • distributed antenna system (DAS) - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that runs on multiple computers within a network at the same time and can be stored on servers or with cloud computing.
  • distributed authoring - WebDAV (World Wide Web Distributed Authoring and Versioning) is the Internet Engineering Task Force (IETF) standard for collaborative authoring on the Web: a set of extensions to the Hypertext Transfer Protocol (HTTP) that facilitates collaborative editing and file management between users located remotely from each other on the Internet.
  • distributed cache - Distributed cache is a method of configuring a data cache to span multiple servers, storing common requests and enabling quick retrieval.
  • distributed cloud - Distributed cloud is the application of cloud computing technologies to interconnect data and applications served from multiple geographic locations.
  • Distributed Component Object Model - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • Distributed Computing Environment - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • Distributed Control Plane Architecture (DCPA) - A Distributed Control Plane Architecture (DCPA) is a network architecture that makes it possible to allocate control protocol functions across multiple processor levels in the network system.
  • distributed control system (DCS) - A distributed control system (DCS) is a digital automated industrial control system (ICS) that uses geographically distributed control loops throughout a factory, machine or control area.
  • distributed database - A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks.
  • distributed database management system - A DDBMS (distributed database management system) is a centralized application that manages a distributed database as if it were all stored on the same computer.
  • distributed denial of service attack - A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed denial-of-service (DDoS) attack - A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed denial-of-service attack - A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed DoS attack - A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed energy resources (DER) - Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.
  • Distributed Execution Manager (DEM) - The Distributed Execution Manager is a VMware vCloud Automation Center tool that executes the business logic of custom models.
  • distributed file system - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • Distributed File System Replication (DFSR) - Distributed File System Replication (DFSR) is a replication engine that organizations can use to synchronize folders for servers on network connections that have a limited bandwidth.
  • Distributed interNet Applications Architecture - (In chemistry, DNA stands for deoxyribonucleic acid.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
  • Distributed Management Task Force - The Distributed Management Task Force, Inc.
  • Distributed Management Task Force (DMTF) - The Distributed Management Task Force, Inc.
  • Distributed Replicated Block Device - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Distributed Resource Scheduler - VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close