Browse Definitions :

Browse Definitions by Alphabet

  • dimension table - In data warehousing, a dimension table is a database table that stores attributes describing the facts in a fact table.
  • dimensionality reduction - Dimensionality reduction is a process and technique to reduce the number of dimensions -- or features -- in a data set.
  • DIMM (dual in-line memory module) - DIMM (dual in-line memory module) is a type of computer memory that is natively 64 bits, enabling fast data transfer.
  • diode - A diode is a specialized electronic component with two electrodes called the anode and the cathode.
  • direct access - In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the data is physically located on the device rather than having to move sequentially from one physical location to the next to find the correct data.
  • direct access storage device (DASD) - A direct access storage device (DASD) is a type of secondary storage device that supports direct access to the stored data, as opposed to sequential access, which is slower and less efficient.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • direct inward dialing (DID) - Direct inward dialing (DID) is a method organizations use to route incoming calls to specific private branch exchange (PBX) systems without an operator.
  • direct market reseller (DMR) - A direct market reseller (DMR), also known as an e-tailer, is a company that sells directly to consumers online without operating storefront operations of any kind.
  • direct marketing - Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or website or a request for further information) from a selected group of consumers in response to communication from a marketer.
  • Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided by some computer bus architectures that enables data to be sent directly from an attached device to the computer's main memory.
  • direct-attached storage (DAS) - Direct-attached storage (DAS) is a type of storage that is attached directly to a computer without going through a network.
  • Direct-to-Consumer (D2C or DTC) - D2C (Direct-to-consumer, or Direct2Consumer) is a type of business-to-consumer (B2C) retail sales strategy where a business will build, market, sell and ship a product directly to the customer.
  • Director of Employee Engagement - Director of employee engagement is one of the job titles for an HR manager who is responsible for an organization's employee engagement strategy.
  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a Safe Mode boot option for Windows Server domain controllers.
  • directory traversal - Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the server's root directory.
  • disaggregated server - A disaggregated server is a server whose components and resources are divided into subsystems.
  • disambiguation - Disambiguation is the process of determining a word's meaning -- or sense -- within its specific context.
  • disaster recovery (DR) - Disaster recovery (DR) is an organization's ability to respond to and recover from an event that negatively affects business operations.
  • disaster recovery (DR) test - A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's business continuity/disaster recovery (BCDR) planning process.
  • disaster recovery as a service (DRaaS) - Disaster recovery as a service (DRaaS) is a cloud computing service model offered by third-party vendors that provides failover in the event of a natural catastrophe, power outage or other type of business disruption.
  • disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • disaster recovery site (DR site) - An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization's business continuity and disaster recovery procedures.
  • Disciplined Agile Delivery (DAD) - Disciplined Agile Delivery (DAD) is a scalable Agile software delivery framework.
  • discontinuous transmission (DTX) - Discontinuous transmission (DTX) is a method of momentarily powering-down, or muting, a mobile or portable wireless telephone set when there is no voice input to the set.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • discrete manufacturing - Discrete manufacturing is an industry term for the manufacturing of finished products that are distinct items capable of being easily counted, touched or seen.
  • disk array - A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object storage.
  • disk backup or disk-based backup - Disk backup, or disk-based backup, is a data backup and recovery method that backs data up to hard disk storage.
  • disk image - A disk image is a compressed file that contains a copy of the entire contents of a computer's hard drive or other storage media, such as optical discs or solid-state drives.
  • disk mirroring (RAID 1) - Disk mirroring, also known as RAID 1, is the replication of data across two or more disks.
  • diskpart (Disk Partition Utility) - Diskpart is a command line utility in Windows operating systems (OSs) that is used to manage disks, partitions, and volumes.
  • displacement - Displacement (symbolized d or s), also called length or distance, is a one-dimensional quantity representing the separation between two defined points.
  • display - In computing, a display is a device with a screen that shows a rendered electronic image made up of pixels that are illuminated in a way that distinguishes text and graphic elements.
  • DisplayPort - DisplayPort is an interface for digital displays, particularly computer monitors.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • disposable phone number - A disposable phone number is a virtual phone number that is usable temporarily.
  • disruptive innovation - Disruptive innovation is the idea that when a product or service is introduced into an established industry and performs better and/or costs less than existing offerings, it can displace the market leaders and even transform the industry.
  • disruptive technology (disruptive innovation) - Disruptive technology, often referred to as disruptive innovation, is when a new business model attracts an underserviced market or revenue stream and grows until it supplants incumbent competitors.
  • distributed antenna system (DAS) - In a distributed antenna system (DAS), a single signal source is connected to a group of antennas instead of to a single antenna.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.
  • Distributed Component Object Model (DCOM) - Distributed Component Object Model (DCOM) is an extension to Component Object Model (COM) that enables software components to communicate with each other across different computers on a local area network (LAN), on a wide area network (WAN) or across the internet.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers or nodes.
  • distributed control system (DCS) - A distributed control system (DCS) is a digital automated industrial control system (ICS) that uses geographically distributed control loops throughout a factory, machine or control area.
  • distributed database - A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks.
  • distributed denial-of-service (DDoS) attack - A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
  • distributed energy resources (DER) - Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.
  • distributed file system (DFS) - A distributed file system (DFS) is a file system that enables clients to access file storage from multiple hosts through a computer network as if the user was accessing local storage.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
  • distributed tracing - Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.
  • distribution center - A distribution center is a product storage and shipping building that stores goods a company produces.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • distribution list - In email applications, a distribution list is a list of email addresses that can be mass mailed via automation without having to add members individually.
  • distribution requirements planning (DRP) - Distribution requirements planning (DRP) is a systematic process to make the delivery of goods more efficient by determining which goods, in what quantities and at what location, are required to meet anticipated demand.
  • distributive bargaining - Distributive bargaining is an adversarial type of negotiation in which it is assumed that any gain of a competitor is a loss to the other party.
  • distributor - A distributor is an intermediary entity between a producer of a product, or manufacturer, and a downstream entity in the distribution channel or supply chain.
  • distributor agreement (distribution agreement) - A distributor agreement, also known as a distribution agreement, is a contract between channel partners that stipulates the responsibilities of both parties.
  • diversity, equity and inclusion (DEI) - Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and participation of different groups of individuals.
  • DMAIC (define, measure, analyze, improve, control) - DMAIC (define, measure, analyze, improve, control) is Six Sigma tool for improving an existing process.
  • DMZ in networking - In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet.
  • DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).
  • DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • Docker - Docker is an open source software platform used to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Engine - Docker Engine is the underlying client-server technology that supports the tasks and workflows involved in building, shipping and running containerized applications using Docker's components and services.
  • Docker image - A Docker image is a file used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a container orchestration tool for clustering and scheduling Docker containers.
  • document - A document is a form of information that might be useful to a user or set of users.
  • document sanitization - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • document-oriented database - A document-oriented database is a type of NoSQL database in which data is stored in binary document files.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
  • domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
  • domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
  • domain generation algorithm (DGA) - A domain generation algorithm (DGA) is a program that generates a large list of domain names.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet protocols that support email authentication methods.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • DomainKeys Identified Mail (DKIM) - DomainKeys Identified Mail (DKIM) is a protocol for authenticating email messages using public key cryptography to protect against forged emails.
  • doomscrolling - Doomscrolling, sometimes also called doomsurfing, refers to constantly checking disturbing or upsetting news articles or videos online, often via social media.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
  • dot product (scalar product) - The dot product, also called scalar product, is a measure of how closely two vectors align with each other, in terms of the directions they point.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double extortion ransomware - Double extortion ransomware is a novel form of malware that combines ransomware with elements of extortionware to maximize the victim's potential payout.
  • double-slit experiment - The double-slit experiment is a 19th century investigation into the properties of light that has since been found to demonstrate the wave-particle duality of photons, electrons and other particle types as well as demonstrate other quantum properties, such as superposition and interference.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Dridex malware - Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials to gain access to their financial assets.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close