Browse Definitions by Alphabet
- distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
- distributed tracing - Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.
- distribution center - A distribution center is a product storage and shipping building that stores goods a company produces.
- distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
- distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
- distribution requirements planning (DRP) - Distribution requirements planning (DRP) is a systematic process to make the delivery of goods more efficient by determining which goods, in what quantities and at what location, are required to meet anticipated demand.
- distributive bargaining - Distributive bargaining is an adversarial type of negotiation in which it is assumed that any gain of a competitor is a loss to the other party.
- distributor - A distributor is an intermediary entity between a producer of a product, or manufacturer, and a downstream entity in the distribution channel or supply chain.
- distributor agreement (distribution agreement) - A distributor agreement, also known as a distribution agreement, is a contract between channel partners that stipulates the responsibilities of both parties.
- DMAIC (define, measure, analyze, improve, control) - DMAIC (define, measure, analyze, improve, control) is Six Sigma tool for improving an existing process.
- DMZ in networking - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
- DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.
- DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
- DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
- Docker - Docker is an open source software platform used to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
- Docker Engine - Docker Engine is the underlying client-server technology that supports the tasks and workflows involved in building, shipping and running containerized applications using Docker's components and services.
- Docker image - A Docker image is a file used to execute code in a Docker container.
- Docker Swarm - Docker Swarm is a container orchestration tool for clustering and scheduling Docker containers.
- document - A document is a form of information that might be useful to a user or set of users.
- document sanitization - Document sanitization is the process of cleaning a document to ensure that only the intended information can be accessed from it.
- document-oriented database - A document-oriented database is a type of NoSQL database in which data is stored in binary document files.
- Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
- dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
- domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
- domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
- domain generation algorithm (DGA) - A domain generation algorithm (DGA) is a program that generates a large list of domain names.
- domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
- domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the business domain, or sphere of knowledge, of that software's users.
- doomscrolling - Doomscrolling, sometimes also called doomsurfing, refers to constantly checking disturbing or upsetting news articles or videos online, often via social media.
- dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
- DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
- dot product (scalar product) - The dot product, also called scalar product, is a measure of how closely two vectors align with each other, in terms of the directions they point.
- double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
- double extortion ransomware - Double extortion ransomware is a novel form of malware that combines ransomware with elements of extortionware to maximize the victim's potential payout.
- double materiality - Double materiality extends the traditional accounting principle of materiality beyond financial information to include environmental, social and governance factors.
- double-slit experiment - The double-slit experiment is a 19th century investigation into the properties of light that has since been found to demonstrate the wave-particle duality of photons, electrons and other particle types as well as demonstrate other quantum properties, such as superposition and interference.
- downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
- DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
- DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
- Dridex malware - Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials to gain access to their financial assets.
- driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
- drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
- drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
- dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
- dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
- dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
- Drupal - Drupal is a free, open source content management system (CMS) to build and maintain websites, online directories, e-commerce stores, intranets and other types of digital content.
- Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
- DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
- DTMF (dual tone multi-frequency) - Dual tone multi-frequency (DTMF) is the sounds or tones generated by a telephone when the numbers are pressed.
- dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
- dual sourcing - Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service.
- dual Wi-Fi antenna - A dual Wi-Fi antenna is a pair of identical antennas on a wireless router or Wi-Fi-equipped device, intended to eliminate signal fading and dead spots.
- Dublin Core - Dublin Core is an international metadata standard formally known as the Dublin Core Metadata Element Set and includes 15 metadata (data that describes data) terms.
- DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
- ducting (data center cooling) - Ducting is an approach to air management that uses a series of metal or plastic pipes to carry heated or cooled air from one place to another.
- dumbphone (dumb phone) - A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.
- dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
- Duo Security - Duo Security is a vendor of cloud-based two-factor authentication products.
- dynamic and static - In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.
- dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
- dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
- dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
- dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
- dynamic voltage and frequency scaling (DVFS) - Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device's various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power saving when those resources are not needed.
- software documentation - In the software development process, software documentation is the information that describes the product to the people who develop, deploy and use it.
- uplink and downlink - In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
- What are data silos and what problems do they cause? - A data silo is a repository of data that's controlled by one department or business unit and isolated from the rest of an organization, much like grass and grain in a farm silo are closed off from outside elements.
- What are Internet data caps and why do providers use them? - A data cap, also known as a bandwidth cap, is a limit that service providers impose on the amount of data a user account can transfer at a specified level of throughput over a given time period, for a specified fee.
- What is a data architect? - A data architect is an IT professional responsible for defining the policies, procedures, models and technologies used in collecting, organizing, storing and accessing company information.
- What is a data center administrator (DCA)? - A data center administrator (DCA) is an experienced IT professional who is responsible for overseeing data center operations.
- What is a data fabric? - A data fabric is an architecture and software offering a unified collection of data assets, databases and database architectures within an enterprise.
- What is a data flow diagram (DDF)? - A data flow diagram (DFD) is a graphical or visual representation that uses a standardized set of symbols and notations to describe a business's operations through data movement.
- What is a data mart (datamart)? - A data mart is a repository of data that is designed to serve a particular community of knowledge workers.
- What is a decision support system (DSS)? - A decision support system (DSS) is a computer program used to improve a company's decision-making capabilities.
- What is a decision tree in machine learning? - A decision tree is a flow chart created by a computer algorithm to make decisions or numeric predictions based on information in a digital data set.
- What is a device driver? - A device driver, or driver, is a special kind of software program that controls a specific hardware device attached to a computer.
- What is a diode? - A diode is a specialized electronic component, specifically a two-terminal semiconductor device, with two electrodes called the anode and the cathode.
- What is a drone (UAV)? - A drone is an unmanned aircraft.
- What is Dall-E and how does it work? - Dall-E is a generative artificial intelligence (AI) technology that enables users to create images by submitting text-based prompts.
- What is dark data? - Dark data is digital information an organization collects, processes and stores that is not currently being used for business purposes.
- What is data activation? - Data activation is a marketing approach that uses consumer information and data analytics to help companies gain real-time insight into target audience behavior and plan for future marketing initiatives.
- What is data aggregation? - Data aggregation is any process whereby data is gathered and expressed in a summary form.
- What is data architecture? A data management blueprint - Data architecture is a discipline that documents an organization's data assets, maps how data flows through IT systems and provides a blueprint for managing data, as this guide explains.
- What is Data as a Service (DaaS)? - Data as a Service (DaaS) is an information provision and distribution model in which data files (including text, images, sounds, and videos) are made available to customers over a network, typically the Internet.
- What is data backup? An in-depth guide - Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
- What is data democratization? - Data democratization makes information in a digital format accessible to the average end user.
- What is data egress? How it works and how to manage costs - Data egress is when data leaves a closed or private network and is transferred to an external location.
- What is Data Encryption Standard (DES)? - Data Encryption Standard (DES) is an outdated symmetric key method of data encryption.
- What is data governance and why does it matter? - Data governance is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal standards and policies that also control data usage.
- What is data labeling? - Data labeling is the process of identifying and tagging data samples commonly used in the context of training machine learning (ML) models.
- What is data lifecycle? - A data lifecycle is the sequence of stages that a unit of data goes through from its initial generation or capture to its archiving or deletion at the end of its useful life.
- What is data loss prevention (DLP)? - Data loss prevention (DLP) -- sometimes referred to as 'data leak prevention,' 'information loss prevention' or 'extrusion prevention' -- is a strategy to mitigate threats to critical data.
- What is data management and why is it important? Full guide - Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth guide.
- What is data management as a service (DMaaS)? - Data management as a service (DMaaS) is a type of cloud service that provides enterprises with centralized storage for disparate data sources.
- What is data monetization? - Data monetization is the process of measuring the economic benefit of corporate data.
- What is data poisoning (AI poisoning) and how does it work? - Data or AI poisoning attacks are deliberate attempts to manipulate the training data of artificial intelligence and machine learning models to corrupt their behavior and elicit skewed, biased or harmful outputs.
- What is data preparation? An in-depth guide - Data preparation is the process of gathering, combining, structuring and organizing data for use in business intelligence, analytics and data science applications, as explained in this guide.
- What is data privacy? - Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, retention, immutability and security of sensitive data.
- What is data protection and why is it important? - Data protection is the process of safeguarding data and restoring important information in the event the data is corrupted, compromised or lost due to cyberattacks, shutdowns, intentional harm or human error.