Browse Definitions by Alphabet

  • data sovereignty - Data sovereignty is the concept that information that has been generated, processed, converted and stored in binary digital form is subject to the laws of the country in which it was generated.
  • data splitting - Data splitting is when data is divided into two or more subsets.
  • data stewardship - Data stewardship is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.
  • data streaming - Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.
  • data structure - A data structure is a specialized format for organizing, processing, retrieving and storing data.
  • Data Transfer Project (DTP) - Data Transfer Project (DTP) is an open source initiative to facilitate customer-controlled data transfers between two online services.
  • data transfer rate (DTR) - The data transfer rate (DTR) is the amount of digital data that's moved from one place to another in a given time.
  • data transformation - Data transformation is the process of converting data from one format, such as a database file, XML document or Excel spreadsheet, into another.
  • data type - In software programming, data type refers to the type of value a variable has and what type of mathematical, relational or logical operations can be applied without causing an error.
  • data virtualization - Data virtualization is an umbrella term used to describe an approach to data management that allows an application to retrieve and manipulate data without requiring technical details about the data.
  • data warehouse - A data warehouse is a repository of data from an organization's operational systems and other sources that supports analytics applications to help drive business decision-making.
  • data warehouse appliance - A data warehouse appliance is an all-in-one “black box” solution optimized for data warehousing.
  • data warehouse as a service (DWaaS) - Data warehouse as a service (DWaaS) is an outsourcing model in which a cloud service provider configures and manages the hardware and software resources a data warehouse requires, and the customer provides the data and pays for the managed service.
  • database (DB) - A database is a collection of information that is organized so that it can be easily accessed, managed and updated.
  • database administrator (DBA) - A database administrator (DBA) is the information technician responsible for directing and performing all activities related to maintaining and securing a successful database environment.
  • database as a service (DBaaS) - Database as a service (DBaaS) is a cloud computing managed service offering that provides access to a database without requiring the setup of physical hardware, the installation of software or the need to configure the database.
  • database automation - Database automation is the use of unattended processes and self-updating procedures for administrative tasks in a database.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • database management system (DBMS) - A database management system (DBMS) is a software system for creating and managing databases.
  • database marketing - Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.
  • database replication - Database replication is the frequent electronic copying of data from a database in one computer or server to a database in another -- so that all users share the same level of information.
  • DataBricks - DataBricks is an organization and big data processing platform founded by the creators of Apache Spark.
  • DataCore - DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.
  • DataOps - DataOps is an Agile approach to designing, implementing and maintaining a distributed data architecture that will support a wide range of open source tools and frameworks in production.
  • Datto - Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.
  • daughterboard (or daughter board, daughter card, or daughtercard) - A daughterboard (or daughter board, daughter card, or daughtercard) is a circuit board that plugs into and extends the circuitry of another circuit board.
  • days inventory outstanding (DIO) - Days inventory outstanding (DOI) is the average number of days it takes for inventory to be sold.
  • days sales outstanding (DSO) - Days sales outstanding (DSO) is the measurement of the average number of days it takes a business to collect payments after a sale has been made.
  • Db2 - Db2 is a family of database management system (DBMS) products from IBM that serve a number of different operating system (OS) platforms.
  • de-anonymization (deanonymization) - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • deadlock - A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
  • deal registration - Deal registration is a common feature of vendors' channel partner programs in which a channel partner, such as a value-added reseller (VAR), informs the vendor about a sales lead.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • Debian - Debian is a popular and freely available computer operating system (OS) that uses a Unix-like kernel -- typically Linux -- alongside other program components, many of which come from GNU Project.
  • debouncing - Debouncing is removing unwanted input noise from buttons, switches or other user input.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem and then either correcting the problem or determining a way to work around it.
  • decentralized autonomous organization (DAO) - A decentralized autonomous organization (DAO) is a management structure that uses blockchain technology to automate some aspects of voting and transaction processing.
  • decentralized finance (DeFi) - Decentralized finance (DeFi) is an emerging model for organizing and enabling cryptocurrency-based transactions, exchanges and financial services.
  • decentralized identity - Decentralized identity is an approach to identify and authenticate users and entities without a centralized authority.
  • deception technology - Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.
  • decibels relative to isotropic (dBi) - Decibels relative to isotropic (dBi) is a unit of measurement that describes how much power an antenna transmits in a single direction when compared to an isotropic radiator, which transmits in all directions at once.
  • decimal - Decimal is a numbering system that uses a base-10 representation for numeric values.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible output for a specific input.
  • decision-making process - A decision-making process is a series of steps one or more individuals take to determine the best option or course of action to address a specific problem or situation.
  • declarative programming - Declarative programming is a method to abstract the control flow for logic required for software to perform an action.
  • decompile - To decompile means to convert executable or ready-to-run program code -- sometimes called object code -- into some form of higher-level programming language that humans can easily understand.
  • decompression bomb (zip bomb, zip of death attack) - A decompression bomb -- also known as a zip bomb or zip of death attack -- is a malicious archive file containing a large amount of compressed data.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • dedicated line - A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).
  • deductive argument - A deductive argument is a logic construct with two or more premises and a conclusion where if the premises are true then the conclusion must also be true.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep tech - Deep technology, or deep tech, refers to advanced technologies based on some form of substantial scientific or engineering innovation.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • DeepMind - DeepMind is a division of Alphabet, Inc.
  • default - In computer technology, a default is a pre-designed value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - A default password is a standard preconfigured password for a device or software.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degrees of freedom (mechanics) - In mechanics, degrees of freedom (DOF) is the number of independent variables that define the possible positions or motions of a mechanical system in space.
  • delay-tolerant network (DTN) - A delay-tolerant network (DTN) is a network that's designed to operate effectively in extreme conditions and over very large distances, such as with space communications.
  • delivery drone - A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC VxRail - Dell EMC VxRail is a hyper-converged appliance.
  • Dell Technologies Partner Program - The Dell Technologies Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • demand generation - Demand generation is the process of creating and cultivating interest in a product or service with the goal of generating high-quality leads that can be nurtured into loyal customers.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand signal repository (DSR) - A demand signal repository (DSR) is a database that aggregates sales and demand data at the merchant's point of sale (POS).
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • deprovisioning - Deprovisioning is the part of the employee lifecycle in which access rights to software and network services are taken away.
  • deputy CIO (deputy chief information officer) - Deputy CIO (chief information officer) is a role within some organizations that generally has responsibility for overseeing day-to-day information technology (IT) operations.
  • descriptive analytics - Descriptive analytics is a type of data analytics that looks at past data to give an account of what has happened.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop as a service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device ID (device identification) - A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such as a smartphone, tablet or smartwatch.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - A DevOps Dojo is a place where DevOps team members go for hands-on training.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, systems operators and other production IT staff to oversee code releases and deployments.