Browse Definitions :

Browse Definitions by Alphabet

  • data profiling - Data profiling refers to the process of examining, analyzing, reviewing and summarizing data sets to gain insight into the quality of data.
  • Data Protection Act 2018 (DPA 2018) - The Data Protection Act 2018 (DPA 2018) is a legislative framework in the United Kingdom governing the processing of personal data.
  • data protection as a service (DPaaS) - Data protection as a service (DPaaS) involves managed services that safeguard an organization's data.
  • data protection authorities - Data protection authorities (DPAs) are public authorities responsible for enforcing data protection laws and regulations within a specific jurisdiction.
  • data protection impact assessment (DPIA) - A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals' privacy and eliminate any risks that might violate compliance.
  • data protection management (DPM) - Data protection management (DPM) is the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data quality - Data quality is a measure of a data set's condition based on factors such as accuracy, completeness, consistency, reliability and validity.
  • data recovery - Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible.
  • data recovery agent (DRA) - A data recovery agent (DRA) is a Microsoft Windows user account with the ability to decrypt data that was encrypted by other users.
  • data reduction - Data reduction lowers the amount of capacity required to store data.
  • data replication - Data replication is the process of copying data from one location to another.
  • data residency - Data residency refers to the physical or geographic location of an organization's data or information.
  • data restore - Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.
  • data retention policy - In business settings, data retention is a concept that encompasses all processes for storing and preserving data, as well as the specific time periods and policies businesses enforce that determine how and for how long data should be retained.
  • data sampling - Data sampling is a statistical analysis technique used to select, manipulate and analyze a representative subset of data points to identify patterns and trends in the larger data set being examined.
  • data science as a service (DSaaS) - Data science as a service (DSaaS) is a form of outsourcing that involves the delivery of information gleaned from advanced analytics applications run by data scientists at an outside company to corporate clients for their business use.
  • data science platform - A data science platform is software that allows data scientists to uncover actionable insights from data and communicate those insights throughout an enterprise within a single environment.
  • data scientist - A data scientist is an analytics professional who is responsible for collecting, analyzing and interpreting data to help drive decision-making in an organization.
  • data set - A data set, also spelled 'dataset,' is a collection of related data that's usually organized in a standardized format.
  • data silo - A data silo exists when an organization's departments and systems cannot, or do not, communicate freely with one another and encourage the sharing of business-relevant data.
  • data source name (DSN) - A data source name (DSN) is a data structure containing information about a specific database to which an Open Database Connectivity (ODBC) driver needs to connect.
  • data sovereignty - Data sovereignty is the concept that information that has been generated, processed, converted and stored in binary digital form is subject to the laws of the country in which it was generated.
  • data splitting - Data splitting is when data is divided into two or more subsets.
  • data stewardship - Data stewardship is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.
  • data storytelling - Data storytelling is the process of translating data analyses into understandable terms in order to influence a business decision or action.
  • data streaming - Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.
  • data structure - A data structure is a specialized format for organizing, processing, retrieving and storing data.
  • Data Transfer Project (DTP) - Data Transfer Project (DTP) is an open source initiative to facilitate customer-controlled data transfers between two online services.
  • data transfer rate (DTR) - The data transfer rate (DTR) is the amount of digital data that's moved from one place to another in a given time.
  • data transformation - Data transformation is the process of converting data from one format, such as a database file, XML document or Excel spreadsheet, into another.
  • data type - In software programming, data type refers to the type of value a variable has and what type of mathematical, relational or logical operations can be applied without causing an error.
  • data validation - Data validation is the practice of checking the integrity, accuracy and structure of data before it is used for a business operation.
  • data virtualization - Data virtualization is an umbrella term used to describe an approach to data management that allows an application to retrieve and manipulate data without requiring technical details about the data.
  • data visualization - Data visualization is the practice of translating information into a visual context, such as a map or graph, to make data easier for the human brain to understand and pull insights from.
  • data warehouse - A data warehouse is a repository of data from an organization's operational systems and other sources that supports analytics applications to help drive business decision-making.
  • data warehouse appliance - A data warehouse appliance is an all-in-one “black box” solution optimized for data warehousing.
  • data warehouse as a service (DWaaS) - Data warehouse as a service (DWaaS) is an outsourcing model in which a cloud service provider configures and manages the hardware and software resources a data warehouse requires, and the customer provides the data and pays for the managed service.
  • database (DB) - A database is a collection of information that is organized so that it can be easily accessed, managed and updated.
  • database administrator (DBA) - A database administrator (DBA) is the information technician responsible for directing and performing all activities related to maintaining and securing a successful database environment.
  • database as a service (DBaaS) - Database as a service (DBaaS) is a cloud computing managed service offering that provides access to a database without requiring the setup of physical hardware, the installation of software or the need to configure the database.
  • database automation - Database automation is the use of unattended processes and self-updating procedures for administrative tasks in a database.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • database management system (DBMS) - A database management system (DBMS) is a software system for creating and managing databases.
  • database marketing - Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.
  • database normalization - Database normalization is intrinsic to most relational database schemes.
  • database replication - Database replication is the frequent electronic copying of data from a database in one computer or server to a database in another -- so that all users share the same level of information.
  • DataBricks - DataBricks is an organization and big data processing platform founded by the creators of Apache Spark.
  • DataCore - DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.
  • Datadog - Datadog is a monitoring and analytics tool for information technology (IT) and DevOps teams that can be used to determine performance metrics as well as event monitoring for infrastructure and cloud services.
  • DataOps - DataOps is an Agile approach to designing, implementing and maintaining a distributed data architecture that will support a wide range of open source tools and frameworks in production.
  • Datto - Datto Inc. is a backup, recovery and business continuity vendor with headquarters in Norwalk, Conn.
  • daughterboard (or daughter board, daughter card, or daughtercard) - A daughterboard (or daughter board, daughter card, or daughtercard) is a circuit board that plugs into and extends the circuitry of another circuit board.
  • Daylight Saving Time (DST) - Daylight Saving Time (DST) is the practice of turning the clock ahead as warmer weather approaches and back as it becomes colder again.
  • days inventory outstanding (DIO) - Days inventory outstanding (DOI) is the average number of days it takes for inventory to be sold.
  • days sales outstanding (DSO) - Days sales outstanding (DSO) is the measurement of the average number of days it takes a business to collect payments after a sale has been made.
  • Db2 - Db2 is a family of database management system (DBMS) products from IBM that serve a number of different operating system (OS) platforms.
  • de-anonymization (deanonymization) - De-anonymization is a method used to detect the original data that was subjected to processes to make it impossible -- or at least harder -- to identify the personally identifiable information (PII).
  • deadlock - A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
  • deal registration - Deal registration is a common feature of vendors' channel partner programs in which a channel partner, such as a value-added reseller (VAR), informs the vendor about a sales lead.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • Debian - Debian is a popular and freely available computer operating system (OS) that uses a Unix-like kernel -- typically Linux -- alongside other program components, many of which come from GNU Project.
  • debouncing - Debouncing is removing unwanted input noise from buttons, switches or other user input.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem and then either correcting the problem or determining a way to work around it.
  • decentralized autonomous organization (DAO) - A decentralized autonomous organization (DAO) is a management structure that uses blockchain technology to automate some aspects of voting and transaction processing.
  • decentralized finance (DeFi) - Decentralized finance (DeFi) is an emerging model for organizing and enabling cryptocurrency-based transactions, exchanges and financial services.
  • decentralized identity - Decentralized identity is an approach to identify and authenticate users and entities without a centralized authority.
  • deception technology - Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.
  • decibels relative to carrier (dBc) - dBc (decibels relative to carrier) is a measure of the strength of an instantaneous signal at radio frequency.
  • decibels relative to isotropic (dBi) - Decibels relative to isotropic (dBi) is a unit of measurement that describes how much power an antenna transmits in a single direction when compared to an isotropic radiator, which transmits in all directions at once.
  • decibels relative to one millivolt (dBmV) - dBmV (decibels relative to one millivolt) is a measure of the signal strength in wires and cables at RF and AF frequencies.
  • decibels relative to reference level (dBr) - The expression dBr is used to define signal strength at RF and AF frequencies.
  • decimal - Decimal is a numbering system that uses a base-10 representation for numeric values.
  • decision support system (DSS) - A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible output for a specific input.
  • decision tree in machine learning - A decision tree is a flow chart created by a computer algorithm to make decisions or numeric predictions based on information in a digital data set.
  • decision-making process - A decision-making process is a series of steps one or more individuals take to determine the best option or course of action to address a specific problem or situation.
  • declarative programming - Declarative programming is a method to abstract the control flow for logic required for software to perform an action.
  • decompile - To decompile means to convert executable or ready-to-run program code -- sometimes called object code -- into some form of higher-level programming language that humans can easily understand.
  • decompression bomb (zip bomb, zip of death attack) - A decompression bomb -- also known as a zip bomb or zip of death attack -- is a malicious archive file containing a large amount of compressed data.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • dedicated line - A dedicated line is a telecommunications path between two points that is available 24 hours a day for use by a designated user (individual or company).
  • deductive argument - A deductive argument is a logic construct with two or more premises and a conclusion where if the premises are true then the conclusion must also be true.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep learning - Deep learning is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep tech - Deep technology, or deep tech, refers to advanced technologies based on some form of substantial scientific or engineering innovation.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • deepfake AI (deep fake) - Deepfake AI is a type of artificial intelligence used to create convincing images, audio and video hoaxes.
  • DeepMind - DeepMind is a division of Alphabet, Inc.
  • default - In computer technology, a default is a pre-designed value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - A default password is a standard preconfigured password for a device or software.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degrees of freedom (mechanics) - In mechanics, degrees of freedom (DOF) is the number of independent variables that define the possible positions or motions of a mechanical system in space.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close