Browse Definitions :

Browse Definitions by Alphabet

  • DRAM (dynamic random access memory) - DRAM (dynamic random access memory) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Dridex malware - Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials to gain access to their financial assets.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
  • dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • Drupal - Drupal is a free, open source content management system (CMS) to build and maintain websites, online directories, e-commerce stores, intranets and other types of digital content.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
  • DTMF (dual tone multi-frequency) - Dual tone multi-frequency (DTMF) is the sounds or tones generated by a telephone when the numbers are pressed.
  • dual SIM phone - A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards.
  • dual sourcing - Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service.
  • dual Wi-Fi antenna - A dual Wi-Fi antenna is a pair of identical antennas on a wireless router or Wi-Fi-equipped device, intended to eliminate signal fading and dead spots.
  • Dublin Core - Dublin Core is an international metadata standard formally known as the Dublin Core Metadata Element Set and includes 15 metadata (data that describes data) terms.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • ducting (data center cooling) - Ducting is an approach to air management that uses a series of metal or plastic pipes to carry heated or cooled air from one place to another.
  • dumbphone (dumb phone) - A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • Duo Security - Duo Security is a vendor of cloud-based two-factor authentication products.
  • dynamic and static - In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.
  • dynamic application security testing (DAST) - A dynamic application security test (DAST) is a program used by developers to analyze a web application (web app), while in runtime, and identify any security vulnerabilities or weaknesses.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • dynamic voltage and frequency scaling (DVFS) - Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device's various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power saving when those resources are not needed.
  • software documentation - In the software development process, software documentation is the information that describes the product to the people who develop, deploy and use it.
  • uplink and downlink - In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite.
  • What is data architecture? A data management blueprint - Data architecture is a discipline that documents an organization's data assets, maps how data flows through its systems and provides a blueprint for managing data.
  • What is data backup? An in-depth guide - Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
  • What is Data Encryption Standard (DES)? - Data Encryption Standard (DES) is an outdated symmetric key method of data encryption.
  • What is data governance and why does it matter? - Data governance is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal standards and policies that also control data usage.
  • What is data management and why is it important? - Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth look at the process.
  • What is data preparation? An in-depth guide to data prep - Data preparation is the process of gathering, combining, structuring and organizing data so it can be used in business intelligence (BI), analytics and data visualization applications.
  • What is data protection and why is it important? - Data protection is the process of safeguarding data and restoring important information in the event the data is corrupted, compromised or lost due to cyberattacks, shutdowns, intentional harm or human error.
  • What is data science? The ultimate guide - Data science is the process of using advanced analytics techniques and scientific principles to analyze data and extract valuable information for business decision-making, strategic planning and other uses.
  • What is DevOps? The ultimate guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is digital transformation? Everything you need to know - Digital transformation is the incorporation of computer-based technologies into an organization's products, processes and strategies.
  • What is the dark web (darknet)? - The dark web is an encrypted portion of the internet not visible to the general public via a traditional search engine such as Google.
Networking
  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

Security
CIO
  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

HRSoftware
  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close