Browse Definitions :

Browse Definitions by Alphabet

DNN - DVD

  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • DNS amplification attack - A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack.
  • DNS attack - A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).
  • DNS over HTTPS (DoH) - DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.
  • DNS rebinding attack - DNS rebinding is an exploit in which the attacker uses JavaScript in a malicious Web page to gain control of the victim's router.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • Docker - Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Content Trust - Docker Content Trust is a feature in the Docker containerization platform that enables remote registry content to be digitally signed, ensuring that the content is unaltered and is the most current available version when users access it.
  • Docker Engine - Docker Engine is the underlying client-server technology that builds and runs containers using Docker's components and services.
  • Docker Hub - Docker Hub is a cloud-based repository in which Docker users and partners create, test, store and distribute container images.
  • Docker image - A Docker image is a file used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a clustering and scheduling tool for Docker containers.
  • DOCSIS (Data Over Cable Service Interface Specifications) - Now known as CableLabs Certified Cable Modems, DOCSIS (Data Over Cable Service Interface Specifications) is a standard interface for cable modems, the devices that handle incoming and outgoing data signals between a cable TV operator and a personal or business computer or television set.
  • document - A document is a form of information that might be useful to a user or set of users.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • document lifecycle - The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction.
  • document metadata - Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own metadata.
  • Document Object Model (DOM) - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • document reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • document sanitization - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • Document Type Definition (DTD) - A Document Type Definition (DTD) is a specific document defining and constraining definition or set of statements that follow the rules of the Standard Generalized Markup Language (SGML) or of the Extensible Markup Language (XML), a subset of SGML.
  • document-oriented database - A document-oriented database is a type of NoSQL database in which data is stored in binary document files.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • dogcow - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple Macintosh operating system to help tell users about their printing options.
  • dogfood - Dogfood is an expression that means to use the product or service that you are trying to sell.
  • Dolby Digital - Dolby Digital, formerly known as AC-3, is a digital audio coding technique that reduces the amount of data needed to produce high quality sound.
  • dollarization - Dollarization is the adoption of a foreign country’s currency as legal tender for monetary transactions.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • domain - In general, a domain is an area of control or a sphere of knowledge.
  • domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
  • domain fluxing - Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down.
  • domain generation algorithm (DGA) - A domain generation algorithm (DGA) is a program that generates a large list of domain names.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • domain rotation - Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • DOS (disk operating system) - A DOS, or disk operating system, is an operating system that runs from a disk drive.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • dot address - Tip:To find out the dot address (such as 205.
  • dot pitch - The dot pitch specification for a display monitor tells you how sharp the displayed image can be.
  • dot product (scalar product) - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • DOT4 - DOT4 is a protocol that allows a device that is part of a multifunction peripheral (MFP) to send and receive multiple data packets simultaneously across a single physical channel to other devices on the MFP.
  • dots per inch (dpi) - In computers, dots per inch (dpi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.
  • double blind test - Double blind test is an experiment where both the subject and observer are unaware that the exercise in practice is a test.
  • double factorial - The double factorial, symbolized by two exclamation marks (!!), is a quantity defined for all integers greater than or equal to -1.
  • double-slit experiment - The double-slit experiment is a nineteenth-century investigation into the properties of light that has since been found to demonstrate both the duality of photons and the concepts of superposition and quantum interference.
  • Dovetail Software - Dovetail Software is a software vendor based in Austin, Texas, that specializes in providing web-based HR and help desk software to businesses in the United States and internationally.
  • downcycling - Downcycling is a recycling practice that involves breaking an item down into its component elements or materials.
  • downlink and uplink - These terms should not be confused with downstream and upstream.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • downsizing - In a business enterprise, downsizing is reducing the number of employees on the operating payroll.
  • DRAM (dynamic random access memory) - Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  • DRBD (Distributed Replicated Block Device) - DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring.
  • Dridex malware - Dridex is a form of malware that targets its victim's banking information.
  • driver - A driver is a program that interacts with a particular device or special (frequently optional) kind of software.
  • driver assistance - Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • driver-based planning - Driver-based planning is an approach to management that identifies an organization's key business drivers and creates a series of business plans that mathematically model how those things most necessary for the organization's success would be affected by different variables.
  • drone (UAV) - A drone is an unmanned aircraft.
  • drone journalism - Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.
  • drone photography - Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
  • drone services (UAV services) - Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
  • drone surveillance - Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.
  • dronie - A dronie is a self-portrait photograph (selfie) still or, more commonly, video recorded by a camera attached to a personal drone.
  • Dropbox - Dropbox is a cloud storage provider (sometimes referred to as an online backup service) that is frequently used as a file-sharing service.
  • dropout - Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.
  • dropper - A dropper is a small helper program that facilitates the delivery and installation of malware.
  • dropshipping - Dropshipping is an e-commerce retail model that allows stores to sell products without keeping any physical inventory.
  • DRTC (Don't read the comments) - DRTC is an initialism for "Don't read the comments.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • Druva - Druva is a cloud data protection and management software company based in Sunnyvale, Calif.
  • DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
  • DSC pull server - A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.
  • DSTP (Data Space Transfer Protocol) - DSTP (Data Space Transfer Protocol) is a protocol that is used to index and retrieve data from a number of databases, files, and other data structures using a key that can find all the related data about a particular object across all of the data.
  • DTMF (dual tone multi-frequency) - Dual tone multi-frequency (DTMF) is the sounds or tones generated by a telephone when the numbers are pressed.
  • dual persona (mobile device management) - Dual persona, in a mobile management context, is the provisioning and maintenance of two separate and independent end user environments on a single mobile device.
  • dual sourcing - Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service.
  • dual Wi-Fi antenna - A dual Wi-Fi antenna is a pair of identical antennas on a wireless router or Wi-Fi-equipped device, intended to eliminate signal fading and dead spots.
  • dual-SIM phone - A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards.
  • Dublin Core - Dublin Core is an initiative to create a digital "library card catalog" for the Web.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • ducting (data center cooling) - Ducting is the use of a metal or plastic pipe to carry air from one place to another.
  • due diligence - Due diligence definition: Due diligence is the process of systematically researching and verifying the accuracy of a particular statement.
  • due process - Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government.
  • dumbphone (dumb phone) - A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • Dunning-Kruger effect - The Dunning-Kruger effect is a cognitive bias that leads incompetent people to overestimate their own intelligence and capability.
  • Duo Security - Duo Security is a vendor of cloud-based two-factor authentication products.
  • duopoly - A duopoly is a scenario in which two companies dominate the market for a product or service.
  • duplex - In telecommunication, duplex communication means that both ends of the communication can send and receive signals at the same time.
  • Duqu (W32.Duqu) - Duqu is a remote access Trojan (RAT) that is designed to steal data from computers it infects.
  • duty cycle - Duty cycle is the proportion of time during which a component, device, or system is operated.
  • DVD (digital video disk) - DVD is an optical disc technology with a 4.
  • DVD-Audio (DVD-A) - DVD-Audio (DVD-A) is a Digital Versatile Disc (DVD) format, developed by Panasonic, that is specifically designed to hold audio data, and particularly, high-quality music.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • blended threat

    A blended threat is an exploit that combines elements of multiple types of malware and usually employs various attack vectors to ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close