Browse Definitions :

Browse Definitions by Alphabet

  • DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Dridex malware - Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials to gain access to their financial assets.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
  • dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • Drupal - Drupal is a free, open source content management system (CMS) to build and maintain websites, online directories, e-commerce stores, intranets and other types of digital content.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
  • DTMF (dual tone multi-frequency) - Dual tone multi-frequency (DTMF) is the sounds or tones generated by a telephone when the numbers are pressed.
  • dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
  • dual sourcing - Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service.
  • dual Wi-Fi antenna - A dual Wi-Fi antenna is a pair of identical antennas on a wireless router or Wi-Fi-equipped device, intended to eliminate signal fading and dead spots.
  • Dublin Core - Dublin Core is an international metadata standard formally known as the Dublin Core Metadata Element Set and includes 15 metadata (data that describes data) terms.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • ducting (data center cooling) - Ducting is an approach to air management that uses a series of metal or plastic pipes to carry heated or cooled air from one place to another.
  • dumbphone (dumb phone) - A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • Duo Security - Duo Security is a vendor of cloud-based two-factor authentication products.
  • dynamic and static - In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.
  • dynamic application security testing (DAST) - A dynamic application security test (DAST) is a program used by developers to analyze a web application (web app), while in runtime, and identify any security vulnerabilities or weaknesses.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic voltage and frequency scaling (DVFS) - Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device's various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power saving when those resources are not needed.
  • software documentation - In the software development process, software documentation is the information that describes the product to the people who develop, deploy and use it.
  • uplink and downlink - In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
  • What is data architecture? A data management blueprint - Data architecture is a discipline that documents an organization's data assets, maps how data flows through IT systems and provides a blueprint for managing data, as this guide explains.
  • What is data backup? An in-depth guide - Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
  • What is Data Encryption Standard (DES)? - Data Encryption Standard (DES) is an outdated symmetric key method of data encryption.
  • What is data governance and why does it matter? - Data governance is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal standards and policies that also control data usage.
  • What is data management and why is it important? Full guide - Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth guide.
  • What is data preparation? An in-depth guide - Data preparation is the process of gathering, combining, structuring and organizing data for use in business intelligence, analytics and data science applications, as explained in this guide.
  • What is data protection and why is it important? - Data protection is the process of safeguarding data and restoring important information in the event the data is corrupted, compromised or lost due to cyberattacks, shutdowns, intentional harm or human error.
  • What is data science? The ultimate guide - Data science is the process of using advanced analytics techniques and scientific principles to analyze data and extract valuable information for business decision-making, strategic planning and other uses.
  • What is DevOps? Meaning, methodology and guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is digital transformation? Everything you need to know - Digital transformation is the incorporation of computer-based technologies into an organization's products, processes and strategies.
  • What is the dark web (darknet)? - The dark web is an encrypted portion of the internet not visible to the general public via a traditional search engine such as Google.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close