Browse Definitions by Alphabet

  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem and then either correcting the problem or determining a way to work around it.
  • decentralized autonomous organization (DAO) - A decentralized autonomous organization (DAO) is a management structure that uses blockchain technology to automate some aspects of voting and transaction processing.
  • decentralized finance (DeFi) - Decentralized finance (DeFi) is an emerging model for organizing and enabling cryptocurrency-based transactions, exchanges and financial services.
  • decentralized identity - Decentralized identity is an approach to identify and authenticate users and entities without a centralized authority.
  • deception technology - Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage.
  • decibels relative to isotropic (dBi) - Decibels relative to isotropic (dBi) is a unit of measurement that describes how much power an antenna transmits in a single direction when compared to an isotropic radiator, which transmits in all directions at once.
  • decision tree - A decision tree is a graph that uses a branching method to illustrate every possible output for a specific input.
  • decision-making process - A decision-making process is a series of steps one or more individuals take to determine the best option or course of action to address a specific problem or situation.
  • declarative programming - Declarative programming is a method to abstract the control flow for logic required for software to perform an action.
  • decompile - To decompile means to convert executable or ready-to-run program code -- sometimes called object code -- into some form of higher-level programming language that humans can easily understand.
  • decompression bomb (zip bomb, zip of death attack) - A decompression bomb -- also known as a zip bomb or zip of death attack -- is a malicious archive file containing a large amount of compressed data.
  • deconvolutional networks (deconvolutional neural networks) - Deconvolutional networks are convolutional neural networks (CNN) that work in a reversed process.
  • decoupled architecture - In general, a decoupled architecture is a framework for complex work that allows components to remain completely autonomous and unaware of each other.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • deductive argument - A deductive argument is a logic construct with two or more premises and a conclusion where if the premises are true then the conclusion must also be true.
  • deductive reasoning - Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.
  • deep analytics - Deep analytics is the application of sophisticated data processing techniques to yield information from large and typically multi-source data sets comprised of both unstructured and semi-structured data.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • deep tech - Deep technology, or deep tech, refers to advanced technologies based on some form of substantial scientific or engineering innovation.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • default - In computer technology, a default is a pre-designed value or setting that is used by a computer program when a value or setting is not specified by the program user.
  • default password - A default password is a standard preconfigured password for a device or software.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC VxRail - Dell EMC VxRail is a hyper-converged appliance.
  • Dell Technologies Partner Program - The Dell Technologies Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • demand generation - Demand generation is the process of creating and cultivating interest in a product or service with the goal of generating high-quality leads that can be nurtured into loyal customers.
  • demand signal repository (DSR) - A demand signal repository (DSR) is a database that aggregates sales and demand data at the merchant's point of sale (POS).
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • deprovisioning - Deprovisioning is the part of the employee lifecycle in which access rights to software and network services are taken away.
  • deputy CIO (deputy chief information officer) - Deputy CIO (chief information officer) is a role within some organizations that generally has responsibility for overseeing day-to-day information technology (IT) operations.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • desktop - A desktop is a computer display area that represents the kinds of objects found on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device ID (device identification) - A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such as a smartphone, tablet or smartwatch.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps Dojo - A DevOps Dojo is a place where DevOps team members go for hands-on training.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, systems operators and other production IT staff to oversee code releases and deployments.
  • DevSecOps - DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password.
  • dielectric constant - The dielectric constant of a substance or material is a measure of its ability to store electrical energy.
  • differential backup - A differential backup is a data backup that copies all the files that have changed since the last full backup was performed.
  • differentiated services (DiffServ or DS) - Differentiated services, often shortened to DiffServ or DS, is a class of service (CoS) model to specify and control IP network traffic by class.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange is a method of digital encryption that securely exchanges cryptographic keys between two parties over a public channel without their conversation being transmitted over the internet.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digital - Digital describes electronic technology that generates, stores and processes data in terms of positive and nonpositive states.
  • digital accessibility - Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable to partake in use of the service, product or function.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital cash (e-cash) - Digital cash is a system of purchasing cash credits, storing the credits in your computer or digital wallet, and then spending them when making electronic purchases over the internet or in person on a mobile device at the point of sale.
  • digital certificate - A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it.
  • digital core - A digital core is the technology platforms and applications that enable organizations to transform into digital businesses and meet the new needs of the digital economy.
  • digital culture - Digital culture refers to the behaviors, practices and values that develop from the use of digital technologies.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital economy - The digital economy refers to the economic activities that emerge from connecting individuals, businesses, devices, data and operations through digital technology.
  • digital ecosystem - A digital ecosystem is a group of interconnected information technology resources that can function as a unit.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital footprint - A digital footprint -- sometimes called a digital shadow -- is the body of data that an individual creates through their actions online.
  • digital forensics and incident response (DFIR) - Digital forensics and incident response (DFIR) is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events.
  • digital HR - Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.
  • digital identity - A digital identity is the body of information about an individual, organization or electronic device that exists online.
  • digital innovation - Digital innovation is the adoption of modern digital technologies by a business.
  • digital leadership - Digital leadership is the strategic use of a company's digital assets and emerging technologies to achieve business goals.
  • digital library - A digital library is a collection of digital objects, such as books, magazines, audio recordings, video recordings and other documents that are accessible electronically.
  • digital manufacturing - Digital manufacturing is a technology-based approach to production that links different data silos and processes in the manufacturing lifecycle so that stakeholders can make better business decisions both comprehensively and at each step.
  • digital marketing - Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic technologies.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • Digital Personal Data Protection Act, 2023 - India's Digital Personal Data Protection Act, 2023 (DPDPA) is a comprehensive privacy and data protection law that recognizes the right of individuals, referred to as "data principals," to protect their personal data during the processing of that data for lawful purposes.
  • digital platform - A digital platform is a web-based structural software package that speeds and eases transactions among users.
  • digital process automation - Digital process automation (DPA) uses low-code development tools to automate processes that can span multiple applications.
  • digital profiling - Digital profiling is the process of gathering and analyzing information about an individual that exists online.
  • digital signal processing (DSP) - Digital signal processing (DSP) refers to various techniques for improving the accuracy and reliability of digital communications.
  • digital signature - A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or software.
  • Digital Signature Standard (DSS) - The Digital Signature Standard (DSS) is a digital signature algorithm (DSA) developed by the U.
  • digital strategy (digital media strategy) - A digital strategy, sometimes called a digital media strategy, is a plan for maximizing the business benefits of data assets and technology-focused initiatives.
  • digital supply chain - A digital supply chain is a supply chain whose foundation is built on web-enabled capabilities.
  • digital television (DTV) - Digital television (DTV) is the transmission of television signals using a digital broadcast format rather than conventional analog methods.
  • digital thread - A digital thread is a data-driven communication framework that connects traditionally siloed elements in manufacturing processes and provides an integrated view of an asset throughout the manufacturing lifecycle.
  • digital video - Digital video is audio/visual content in a binary format, with information presented as a sequence of digital data rather than in a continuous signal as analog information is.
  • digital video broadcasting (DVB) - Digital video broadcasting (DVB) is a set of standards that define digital broadcasting using DVB satellite, cable and terrestrial broadcasting infrastructures.
  • digital wallet - In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.
  • digital workspace - A digital workspace is an integrated technology framework that centralizes the management of an enterprise's applications, data and endpoints, allowing employees to collaborate and work remotely.
  • DigitalOcean - DigitalOcean Inc.
  • digitization - Digitization is the process of converting information into a digital format.
  • dimension - In data warehousing, a dimension is a collection of reference information that supports a measurable event, such as a customer transaction.
  • dimension table - In data warehousing, a dimension table is a database table that stores attributes describing the facts in a fact table.
  • DIMM (dual in-line memory module) - DIMM, or dual in-line memory module, is a type of computer memory that is natively 64 bits, enabling fast data transfer.
  • direct access storage device (DASD) - A direct access storage device (DASD) is a type of secondary storage device that supports direct access to the stored data, as opposed to sequential access, which is slower and less efficient.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • direct inward dialing (DID) - Direct inward dialing (DID) is a method organizations use to route incoming calls to specific private branch exchange (PBX) systems without an operator.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device to the computer's main memory.
  • Direct-to-Consumer (D2C or DTC) - D2C (Direct-to-consumer, or Direct2Consumer) is a type of business-to-consumer (B2C) retail sales strategy where a business will build, market, sell and ship a product directly to the customer.
  • director of employee engagement - Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an organization's employee engagement strategy.