Showing terms starting with D (346 terms)
Data Warehouse
A system used for reporting and data analysis, and is considered a core component of business intelligence.
Commonly used in General IT, Networking
Data Warehousing
The electronic storage of a large amount of information by a business, in a manner that is secure, reliable, easy to retrieve, and easy to manage.
Commonly used in General IT, Networking
Data Wrangling
The process of cleaning, structuring and enriching raw data into a desired format for better decision making in less time.
Commonly used in General IT, AI
Data-driven Decision Making
Making decisions based on data analysis rather than intuition or observation alone.
Commonly used in General IT, Business
Database (DB)
A structured set of data held in a computer, especially one that is accessible in various ways.
Commonly used in General IT, Networking
Database Administration
The function of managing and maintaining database management systems (DBMS) software.
Commonly used in General IT, Security
Database Administration (DBA)
The function of managing and maintaining database management systems (DBMS) software.
Commonly used in General IT
Database Administrator (DBA)
Manages and maintains database systems to ensure security, integrity, and performance.
Commonly used in Database Management
Database as a Service (DBaaS)
A cloud service model that provides users with access to a database without the need for setting up physical hardware, installing software, or configuring for performance.
Commonly used in Networking, General IT
Database Caching
A technology used to increase the speed of data retrieval by storing a copy of datasets in a temporary storage space known as a cache.
Commonly used in General IT, Networking
Database Clustering
The use of two or more servers, or nodes, with a database management system software that is designed to store and deliver the database services.
Commonly used in General IT, Networking
Database Index
A data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.
Commonly used in General IT
Database Indexing
A data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.
Commonly used in General IT
Database Management
The process of defining, manipulating, retrieving and managing data in databases.
Commonly used in General IT
Database Management System (DBMS)
A software package designed to define, manipulate, retrieve, and manage data in a database.
Commonly used in General IT, Networking
Database Migration
The process of moving databases from one platform to another, which may involve converting the database to a new format or adapting it to new software.
Commonly used in General IT
Database Mirroring
A solution for increasing the availability of a SQL Server database by copying its data to a secondary database.
Commonly used in General IT, Networking
Database Normalization
The process of structuring a relational database in accordance with a series of so-called normal forms in order to reduce data redundancy and improve data integrity.
Commonly used in General IT
Database Query
A request for data or information from a database table or combination of tables.
Commonly used in General IT, AI
Database Schema
The structure of a database described in a formal language supported by the database management system (DBMS).
Commonly used in General IT
Database Security
Measures that ensure that the data stored in a database is protected from compromise and that the data management operations are performed securely.
Commonly used in Security, Cybersecurity
Database Server
A server that provides database services to other computer programs or computers, as defined by the client-server model.
Commonly used in Networking, General IT
Database Sharding
A type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards.
Commonly used in Networking, General IT
Database Snapshot
A read-only, static view of a database (usually for backup or reporting purposes) that reflects the data at a particular point in time.
Commonly used in General IT, Networking
Database Transaction
A unit of work performed within a database management system (or similar system) against a database, and treated in a coherent and reliable way independent of other transactions.
Commonly used in General IT
Datacenter Networking
The network infrastructure, tools, and methodologies used to connect and manage resources and data flow within and between data centers.
Commonly used in Networking, General IT
Datagram
A basic transfer unit associated with a packet-switched network, which is a small packet of information that travels through a network independently of other datagrams.
Commonly used in Networking
DDoS Attack (Distributed Denial of Service Attack)
An attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Commonly used in Security, Cybersecurity
Debugging
The process of finding and resolving defects or problems within a computer program that prevent correct operation.
Commonly used in General IT
Debugging Tool
Software for testing and debugging programs and applications.
Commonly used in General IT
Decentralized Application (DApp)
An application that runs on a distributed computing system.
Commonly used in General IT, Security
Decentralized Autonomous Organization (DAO)
An organization represented by rules encoded as a computer program that is transparent, controlled by the organization members and not influenced by a central government.
Commonly used in Security, Cybersecurity
Decentralized Finance (DeFi)
Financial software built on blockchain technology that enables peer-to-peer transactions without the need for traditional financial intermediaries.
Commonly used in Security, Cybersecurity
Decentralized Identifier (DID)
A new type of identifier that enables verifiable, self-sovereign digital identities. DIDs are fully under the control of the DID subject, independent from any centralized registry, identity provider, or certificate authority.
Commonly used in Security, Cybersecurity
Decentralized Network
A network structure in which some functions and decisions are decentralized to individual or local units.
Commonly used in Networking, Security
Decision Support System (DSS)
An information system that supports business or organizational decision-making activities.
Commonly used in General IT, AI
Decryption
The process of converting encrypted data back into its original form, so it can be understood.
Commonly used in Security, Cybersecurity
Deep Fake
Synthetic media in which a person in an existing image or video is replaced with someone else’s likeness using artificial neural networks.
Commonly used in AI, Security
Deep Learning
A subset of machine learning in artificial intelligence (AI) that has networks capable of learning unsupervised from data that is unstructured or unlabeled.
Commonly used in AI
Deep Linking
The use of a hyperlink that links to a specific, generally searchable or indexed, piece of web content.
Commonly used in General IT, Networking
Deep Packet Inspection (DPI)
A form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point.
Commonly used in Networking, Security
Deep Web
The part of the web that is not indexed by standard search engines.
Commonly used in Security, General IT
Default Gateway
The device that passes traffic from the local subnet to devices on other subnets.
Commonly used in Networking
Defense in Depth
A strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information.
Commonly used in Security, Cybersecurity
Defragmentation
The process of consolidating fragmented files on a user’s hard drive.
Commonly used in General IT
Delay Tolerant Networking (DTN)
An approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity.
Commonly used in Networking
Delegation
In computing, the process whereby an object or method passes on a task to another object or method. It’s often used in reference to security delegation, where a user or process delegates permissions to another user or process.
Commonly used in General IT, Security
Delete
The operation of removing data from a database or removing a file from a filesystem.
Commonly used in General IT
Denial of Service (DoS) Attack
An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming it with traffic or sending it information that triggers a crash.
Commonly used in Security, Cybersecurity
Denormalization
The process of attempting to optimize the read performance of a database by adding redundant data or by grouping data.
Commonly used in General IT, Networking