Browse Definitions :

Browse Definitions by Alphabet

DEF - DIG

  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • degree per second - The degree per second is a unit of angular (rotational) speed.
  • degrees of freedom (mechanics) - In mechanics, degrees of freedom (DOF) is the number of independent variables that define the possible positions or motions of a mechanical system in space.
  • delay-tolerant network (DTN) - A delay-tolerant network (DTN) is a network that's designed to operate effectively in extreme conditions and over very large distances, such as with space communications.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • delivery drone - A delivery drone is a type of unmanned aerial vehicle (UAV) used for distributing packages to consumers through advanced AI technology.
  • Dell Boomi - Dell Boomi is a Software as a Service (SaaS) integration vendor that provides its AtomSphere technology to a host of industry giants, including Salesforce.
  • Dell EMC - Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.
  • Dell EMC Avamar - Dell EMC Avamar is a hardware and software data backup product.
  • Dell EMC VxRail - Dell EMC VxRail is a hyper-converged appliance.
  • Dell EMC World - Dell EMC World is an annual event for Dell EMC customers that showcases new and emerging technologies in the virtualization, cloud and data storage market.
  • Dell Technologies Partner Program - The Dell Technologies Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • delta differencing - Delta differencing is an incremental approach to backup that only backs up blocks that have changed after the first full backup.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • demand shaping - Demand shaping is an operational supply chain management (SCM) strategy where a company uses tactics such as price incentives, cost modifications and product substitutions to entice customers to purchase specific items.
  • demand signal repository (DSR) - A demand signal repository (DSR) is a database that aggregates sales and demand data at the merchant's point of sale (POS).
  • demand-driven manufacturing (DDM) - Demand-driven manufacturing (DDM) is an approach to manufacturing where production is based on actual orders rather than forecasts.
  • demand-side platform (DSP) - A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.
  • demarc (demarcation point) - A demarc (an abbreviation for demarcation point) marks the point where communications facilities owned by one organization interface with that of another organization.
  • demon - A demon (also see daemon which has a somewhat similar meaning) is a program or process, part of a larger program or process, that is dormant until a certain condition occurs and then is initiated to do its processing.
  • denial-of-service attack - A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.
  • denormalization - Denormalization is the process of adding precomputed redundant data to an otherwise normalized relational database to improve read performance of the database.
  • dense wavelength-division multiplexing (DWDM) - Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • dependent variable - A dependent variable is a variable whose value depends upon independent variable s.
  • deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • deprovisioning - Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.
  • deputy CIO (deputy chief information officer) - Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations.
  • descriptive analytics - Descriptive analytics is a type of data analytics that looks at past data to give an account of what has happened.
  • descriptive modeling - Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.
  • desktop - A desktop is a computer display area that represents the kinds of objects one might find on top of a physical desk, including documents, phone books, telephones, reference sources, writing and drawing tools, and project folders.
  • desktop as a service (DaaS) - Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.
  • desktop computer - A desktop computer is a personal computing device designed to fit on top of a typical office desk.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop personalization - Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience.
  • desktop publishing (DTP) - Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • deterministic/probabilistic data - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • device cloud - A device cloud is a mobile testing environment that enables developers to remotely evaluate the performance of applications on a wide range of smart devices.
  • device driver - A device driver is a special kind of software program that controls a specific hardware device attached to a computer.
  • device ID (device identification) - A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.
  • device mesh - A device mesh is an ad hoc network in the internet of things (IoT).
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps 2.0 - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps Dojo - DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • DevSecOps - DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • dictionary attack - A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password.
  • dielectric constant - The dielectric constant of a substance or material is a measure of its ability to store electrical energy.
  • dielectric material - A dielectric material is a poor conductor of electricity but an efficient supporter of electrostatic fields.
  • differencing disk - A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.
  • Differential Backup - A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Diffie-Hellman key exchange (exponential key exchange) - Diffie-Hellman key exchange is a method of digital encryption that securely exchanges cryptographic keys between two parties over a public channel without their conversation being transmitted over the internet.
  • digiboard (or digicard) - Digiboard or digicard is a generic name for a serial port card made by Digi International.
  • digit - A digit is an element of a set that, taken as a whole, comprises a system of numeration.
  • digital - Digital describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive.
  • digital accessibility - Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable to partake in use of the service, product or function.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital audio broadcasting (DAB) - .
  • digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital certificate - A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital core - Digital core is the technology platforms and applications that allow organizations to transform into digital businesses and meet the new needs of the digital economy.
  • digital currency - A digital currency is a medium of exchange that is generated, stored and transferred electronically.
  • digital disruption - Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
  • digital divide - The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital economy - The digital economy is the worldwide network of economic activities, commercial transactions and professional interactions that are enabled by information and communications technologies.
  • digital ecosystem - A digital ecosystem is a group of interconnected information technology resources that can function as a unit.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital experience (DX) - Digital experience (DX) is the combination of interactions and overall sentiment that consumers have with an organization's digital touchpoints.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital health (digital healthcare) - Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.
  • digital HR - Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.
  • digital identity - A digital identity is the body of information about an individual, organization or electronic device that exists online.
  • digital labor - Digital labor is work that is performed by robotic process automation (RPA) systems.
  • digital leadership - Digital leaders work in much the same way as a chief financial officer (CFO), a director of human resources or a chief operations officer (COO) works; they need to assure interested parties that the assets for which they are responsible maintain maximum value.
  • digital library - A digital library is a collection of documents in organized electronic form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks.
  • digital manufacturing - Digital manufacturing is a technology-based approach to production that links different data silos and processes in the manufacturing lifecycle so that stakeholders can make better business decisions both comprehensively and at each step.
  • digital marketing - Digital marketing is a general term for any effort by a company to connect with customers through electronic technology.
  • Digital Millennium Copyright Act (DMCA) - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • digital modeling and fabrication - Digital modeling and fabrication is a design and production process that marries 3-D modeling or computing-aided design (CAD) software with additive and subtractive manufacturing.
  • digital native - A digital native is a person who grew up with the presence of digital technology or in the information age.
  • digital photo album - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
  • digital process automation - Digital process automation (DPA) uses low-code development tools to automate processes that can span multiple applications.
  • digital profiling - Digital profiling is the process of gathering and analyzing information about an individual that exists online.
  • digital projector (digital projection display system) - A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close