Showing terms starting with D (346 terms)
Dependency
A state in which one object or process relies on another for its operation or processing.
Commonly used in General IT
Dependency Graph
A directed graph representing dependencies of several objects towards each other.
Commonly used in General IT, AI
Dependency Injection
A technique whereby one object supplies the dependencies of another object.
Commonly used in General IT
Dependency Management
The process of handling the dependencies of software components on other components.
Commonly used in General IT
Deployment
The activities that make a software system available for use.
Commonly used in General IT
Deployment Environment
A set of servers where software can be deployed, which could be development, testing, staging, and production.
Commonly used in General IT
Depth-First Search (DFS)
An algorithm for traversing or searching tree or graph data structures, starting at the root and exploring as far as possible along each branch before backtracking.
Commonly used in AI, General IT
Descriptive Programming
A programming paradigm that is used in automation testing to perform actions on objects that are not present in the object repository.
Commonly used in AI, General IT
Design Pattern
A general repeatable solution to a commonly occurring problem in software design.
Commonly used in General IT, AI
Design Thinking
A method for practical, creative resolution of problems or issues that looks for an improved future result.
Commonly used in General IT, AI
Desktop Application
Software that runs standalone on a desktop or laptop computer, contrasting with a web-based application, which requires the web browser to run.
Commonly used in General IT
Desktop Virtualization
A software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
Commonly used in Networking, General IT
Detection Algorithm
An algorithm for detecting certain conditions or patterns, especially in the context of software and digital signals.
Commonly used in AI, Security
Device Driver
Software that tells the operating system and other software how to communicate with a piece of hardware.
Commonly used in General IT
Device Management
The process of managing the implementation, operation, and maintenance of a physical and/or virtual device.
Commonly used in General IT, Networking
DevOps
A set of practices that combines software development (Dev) and IT operations (Ops) aiming to shorten the systems development life cycle and provide continuous delivery with high software quality.
Commonly used in General IT
DevOps Engineer
Bridges the gap between software development and IT operations to streamline development, deployment, and integration processes.
Commonly used in Software Development, IT Operations
DevOps Toolchain
A set or combination of tools that aid in the delivery, development, and management of applications throughout the software development lifecycle, as coordinated by an organization that uses DevOps practices.
Commonly used in General IT
DevSecOps
An approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle.
Commonly used in Security, General IT
DHCP (Dynamic Host Configuration Protocol)
A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network.
Commonly used in Networking
DHCP Snooping
A security feature on switches that builds a table of DHCP messages and tracks the physical location of hosts.
Commonly used in Networking, Security
Diagnostics
Tools or processes used to identify and resolve issues in software or hardware.
Commonly used in General IT
Digital Asset Management (DAM)
Systems and software solutions for organizing, storing, and retrieving rich media and managing digital rights and permissions.
Commonly used in General IT
Digital Audio Broadcasting (DAB)
A digital radio standard for broadcasting digital audio radio services, used in several countries, especially in Europe.
Commonly used in Networking
Digital Certificate
A digital form of identification, like a passport, which provides information about the identity of an entity, and is used to manage encryption keys and digital signatures.
Commonly used in Security, Cybersecurity
Digital Divide
The gap between those who have ready access to computers and the internet, and those who do not.
Commonly used in General IT, Security
Digital Economy
An economy that is based on digital computing technologies.
Commonly used in General IT
Digital Ecosystem
A distributed, adaptive, open socio-technical system with properties of self-organization, scalability and sustainability inspired from natural ecosystems.
Commonly used in General IT, Networking
Digital Footprint
The information about a particular person that exists on the Internet as a result of their online activity.
Commonly used in Security, Cybersecurity
Digital Forensics
The branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
Commonly used in Security, Cybersecurity
Digital Handshake
A virtual agreement or transaction that takes place over digital networks.
Commonly used in Security, General IT
Digital Identity
An online or networked identity adopted or claimed in cyberspace by an individual, organization, or electronic device.
Commonly used in Security, Cybersecurity
Digital Identity Verification
The process of using digital methods to prove the authenticity of an individual’s claimed identity.
Commonly used in Security, Cybersecurity
Digital Literacy
The ability to find, evaluate, utilize, share, and create content using information technologies and the internet.
Commonly used in General IT, Education
Digital Native
A person born or brought up during the age of digital technology and therefore familiar with computers and the Internet from an early age.
Commonly used in General IT, Education
Digital Nomad
A person who uses telecommunications technologies to earn a living and, more generally, conduct their life in a nomadic manner.
Commonly used in General IT, Networking
Digital Rights
The rights of participants in digital culture, relating to online privacy, freedom of expression, and the right to use and create digital media.
Commonly used in Security, Cybersecurity
Digital Rights Management (DRM)
A set of access control technologies for restricting the use of proprietary hardware and copyrighted works.
Commonly used in Security, General IT
Digital Signal Processing (DSP)
The use of digital processing, such as by computers or more specialized digital signal processors, to perform a wide variety of signal processing operations.
Commonly used in General IT
Digital Signature
A mathematical scheme for verifying the authenticity of digital messages or documents.
Commonly used in Security, Cybersecurity
Digital Subscriber Line (DSL)
A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.
Commonly used in Networking
Digital Transformation
The integration of digital technology into all areas of a business, fundamentally changing how you operate and deliver value to customers.
Commonly used in General IT, Security
Digital Twin
A digital replica of a living or non-living physical entity. By bridging the physical and the virtual world, data is transmitted seamlessly allowing the virtual entity to exist simultaneously with the physical entity.
Commonly used in AI, General IT
Digital Twins
A digital replica of a living or non-living physical entity.
Commonly used in AI, General IT
Digital Wallet
A software-based system that securely stores users’ payment information and passwords for numerous payment methods and websites.
Commonly used in Security, General IT
Digitization
The process of converting information into a digital format, in which the information is organized into bits.
Commonly used in General IT
Direct Access Storage Device (DASD)
A general term for memory storage devices that allow the computer to access data directly from a particular location within them, as opposed to sequential access memory (SAM).
Commonly used in General IT
Direct Attached Storage (DAS)
A digital storage system directly attached to the server or PC, not accessible by other clients.
Commonly used in General IT, Networking
Direct Memory Access (DMA)
A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit (CPU).
Commonly used in General IT
Direct Sequence Spread Spectrum (DSSS)
A modulation technique used in computer networking to minimize the potential for data interference.
Commonly used in Networking