D
D3.js
A JavaScript library for producing dynamic, interactive data visualizations in web browsers.
aiDaemonSet
A Kubernetes object that ensures that all (or some) Nodes run a copy of a specific Pod.
cloudDanksharding
The final design for Ethereum sharding that focuses on data availability and simplifies the architecture.
webDark Launching
The practice of deploying a new feature to production but keeping it hidden from users to test its performance and stability.
devDark Silicon
The portion of an integrated circuit that cannot be powered on at the same time due to thermal constraints.
hardwareDash
A productive Python framework for building analytical web applications.
aiDashboard
A type of graphical user interface which often provides at-a-glance views of key performance indicators (KPIs) relevant to a particular objective or business process.
aiDashboarding
The visual representation of metrics, logs, and traces to provide a real-time overview of system health and performance.
devData Analytics
The process of examining data sets in order to find trends and draw conclusions about the information they contain.
aiData Archiving
The process of moving data that is no longer actively used to a separate storage device for long-term retention.
aiData Augmentation
A technique used to increase the diversity of training data without collecting new examples, by creating modified versions of existing data.
aiData Availability
The assurance that data is accessible to authorized users and applications when and where they need it.
aiDatabase per Service
A microservices pattern where each service has its own private database that cannot be accessed directly by other services.
devData Catalog
A centralized metadata management service that helps users discover, understand, and manage data assets across their organization.
cloudData Cleansing
The process of identifying and correcting corrupt, inaccurate, or irrelevant records from a record set, table, or database.
aiData Consistency
The requirement that any given database transaction must change affected data only in allowed ways.
aiData Democratization
The process of making data accessible to all users within an organization, regardless of their technical expertise.
aiData Dictionary
A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.
aiData Disposal
The process of permanently deleting or destroying data so that it can no longer be read or reconstructed.
aiDatadog
A cloud-scale monitoring and security platform that provides full-stack observability for modern applications.
cloudData Durability
The ability of a system to keep data stored and intact over long periods, even in the event of system failures or power outages.
aiData Engineering
The practice of designing and building systems for collecting, storing, and analyzing data at scale.
aiData Fabric
An integrated architecture that provides a unified view of data across disparate sources using metadata and automation.
aiData Federation
A form of data virtualization where multiple databases are combined into a single virtual database.
aiData Governance
The overall management of the availability, usability, integrity and security of data used in an enterprise.
aiData Integration
The process of combining data from different sources into a single, unified view.
aiData Lake
A centralized repository that allows you to store all your structured and unstructured data at any scale.
aiData Lakehouse
A new, open data management architecture that combines the flexibility, cost-efficiency, and scale of data lakes with the data management and transactions of data warehouses.
aiData Leakage
A common error in machine learning where information from outside the training dataset is used to create the model, leading to overly optimistic performance results.
aiData Level Parallelism(DLP)
A form of parallelism where the same operation is performed on multiple data points simultaneously.
hardwareData Lineage
A data life cycle that includes the data's origins and where it moves over time.
aiData Link Layer
The second layer of the OSI model, responsible for node-to-node data transfer and error detection on the physical link.
networkData Literacy
The ability to read, understand, create, and communicate data as information.
aiData Loss Prevention(DLP)
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
securityData Mesh
A decentralized data architecture that organizes data by business domain, treating data as a product.
aiData Mining
The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
aiData Modeling
The process of creating a visual representation of either a whole information system or parts of it to communicate connections between data points and structures.
aiData Pipeline
A series of automated processes that collect, transform, and move data from various sources to a destination for analysis or model training.
aiData Privacy
The branch of data protection that deals with the proper handling of data focusing on compliance with data protection regulations.
securityData Profiling
The process of examining, analyzing, and creating useful summaries of data to understand its structure, content, and quality.
aiData Quality
A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.
aiData Residency
The physical or geographic location of where an organization's data or information is stored.
securityData Retention
The practice of keeping data for a specific period to meet business, legal, or regulatory requirements.
aiData Sampling
The selection of a subset of individuals from within a statistical population to estimate characteristics of the whole population.
aiData Science
The field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.
aiData Scrubbing
A specific type of data cleansing that focuses on removing or modifying data that is incorrect, incomplete, improperly formatted, or duplicated.
aiData Sovereignty
The idea that data is subject to the laws and governance structures within the nation it is collected.
securityData Synchronization
The process of ensuring that data in two or more locations is consistent and up-to-date.
aiData Virtualization
An approach to data management that allows applications to retrieve and manipulate data without requiring technical details about the data, such as how it is formatted or where it is physically located.
aiData Visualization
The graphical representation of information and data.
aiData Visualization Principles
A set of guidelines and best practices for creating effective and accurate graphical representations of data.
aiData Warehouse
A system used for reporting and data analysis, storing structured data from multiple sources.
aiData Warehouse Service
A managed, large-scale data storage and analysis service optimized for complex queries and business intelligence.
cloudData Wrangling
The process of transforming and mapping data from one 'raw' data form into another format with the intent of making it more appropriate and valuable for a variety of downstream purposes such as analytics.
aiDBSCAN(DBSCAN)
Density-Based Spatial Clustering of Applications with Noise; a clustering algorithm that groups together points that are closely packed together.
aiDDR4
The fourth generation of Double Data Rate (DDR) synchronous dynamic random-access memory.
hardwareDDR5
The fifth and latest generation of Double Data Rate (DDR) synchronous dynamic random-access memory.
hardwareDecentralized Application(dApp)
An application that runs on a distributed computing system, typically a blockchain, rather than on a centralized server.
webDecentralized Exchange(DEX)
A peer-to-peer marketplace where users can trade cryptocurrencies directly without a central intermediary.
webDecentralized Identity(DID)
A type of identity that allows individuals to own and control their digital identity without relying on a central authority.
webDecentralized Social Media(DeSo)
Social networking platforms that operate on decentralized protocols, giving users control over their data, identity, and content.
webDecentralized Storage
A system where data is stored across a network of multiple nodes rather than on a single centralized server.
webDecentralized Web(DWeb)
A movement and set of technologies aimed at creating a more distributed internet that is not controlled by a few large entities.
webDecorator Pattern
A structural design pattern that lets you attach new behaviors to objects by placing these objects inside special wrapper objects that contain the behaviors.
devDedicated Infrastructure
Cloud resources that run on physical hardware dedicated to a single customer, providing higher isolation and meeting specific compliance requirements.
cloudDeep Learning
A subset of machine learning based on artificial neural networks with multiple layers that can learn complex patterns from large amounts of data.
aiDeep Packet Inspection(DPI)
A form of network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point.
networkDefault Gateway
The node in a computer network that serves as an access point to another network, typically a router.
networkDefense in Depth(DiD)
A security strategy that uses multiple layers of defense to protect an organization's assets, ensuring that if one control fails, others are in place to stop the attack.
securityDelegated Proof of Stake(DPoS)
A consensus mechanism where network users vote for 'delegates' who are responsible for validating transactions and maintaining the blockchain.
webDenial of Service(DoS)
An attack meant to shut down a machine or network, making it inaccessible to its intended users.
securityDennard Scaling
The principle that as transistors get smaller, their power density stays constant, allowing for higher clock speeds without increasing heat.
hardwareDeno
A secure runtime for JavaScript and TypeScript that was created by Ryan Dahl, the original creator of Node.js.
webDenormalization
A database optimization technique in which we add redundant data to one or more tables to avoid costly joins.
aiDependency Management
The process of identifying, resolving, and managing the external libraries and modules that a software project relies on.
devDeployment
A Kubernetes object that provides declarative updates for Pods and ReplicaSets.
cloudDeployment Frequency
How often an organization successfully releases code to production.
devDeployment Pipeline
An automated manifestation of the process for getting software from version control into the hands of users.
devDescriptive Statistics
Brief descriptive coefficients that summarize a given data set, which can be either a representation of the entire population or a sample of a population.
aiDesign Patterns
Typical solutions to common problems in software design, acting as blueprints that can be customized to solve a particular design problem in your code.
devDevice Orientation API
A browser API that provides information about the physical orientation and motion of the device.
webDevOps Topology
The organizational structure and patterns of interaction between development and operations teams.
devDevSecOps
An approach to software development that integrates security practices into the DevOps pipeline.
devDHCP(DHCP)
A network management protocol used to dynamically assign IP addresses and other network configuration parameters to devices.
networkDictionary Attack
A type of brute force attack that uses a pre-defined list of common words, phrases, and previously leaked passwords.
securityDifferential Privacy(DP)
A mathematical framework for sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals.
aiDifferentiated Services(DiffServ)
A scalable QoS architecture that marks packets with priority levels to determine how they should be treated by routers.
networkDiffusion Model
A class of generative models that create data by gradually reversing a process of adding noise to data.
aiDigital Forensics
The branch of forensic science encompassing the recovery and investigation of material found in digital devices.
securityDigital Signature
A mathematical scheme for demonstrating the authenticity of digital messages or documents.
securityDimensionality Reduction
The process of reducing the number of random variables under consideration by obtaining a set of principal variables.
aiDimension Table
A table in a star schema that contains attributes that describe business entities.
aiDirect Connect
A dedicated network connection from an on-premises data center to a cloud provider, bypassing the public internet.
cloudDirect Memory Access(DMA)
A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the CPU.
hardwareDisaster Recovery(DR)
A set of policies and procedures to enable the recovery of technology systems following a disaster.
cloudDisaster Recovery Planning(DRP)
A documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
securityDisplayPort(DP)
A digital display interface developed by a consortium of PC and chip manufacturers and standardized by VESA.
hardwareDistance Vector Routing
A class of routing protocols that determine the best path based on the distance (metric) and direction (vector) to a destination.
networkDistributed Denial of Service(DDoS)
A DoS attack where the incoming traffic flooding the victim originates from many different sources.
securityDistributed Ledger Technology(DLT)
A digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
webDistributed Tracing
A method used to monitor and profile applications, especially those built using microservices, by tracking the path of a single request as it moves through various services.
devDNAT(DNAT)
A process that changes the destination IP address of a packet as it passes through a router or firewall.
networkDocker
A platform that uses OS-level virtualization to deliver software in packages called containers.
cloudDocument Object Model(DOM)
A programming interface for web documents that represents the page so that programs can change the document structure, style, and content.
webDomain-Driven Design(DDD)
An approach to software development that centers the design on a complex domain and its logic, using a shared model between technical and business experts.
devDomain Name System(DNS)
The hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet.
cloudDoping (Semiconductor)
The intentional introduction of impurities into an intrinsic semiconductor to modulate its electrical properties.
hardwareDORA Metrics(DORA)
A set of four key metrics identified by the DevOps Research and Assessment (DORA) group to measure the performance of software delivery teams.
devDot1q(802.1Q)
The industry-standard protocol for VLAN tagging on Ethernet networks.
networkDouble Data Rate(DDR)
A class of memory integrated circuits that transfer data on both the rising and falling edges of the clock signal.
hardwareDouble Spending
The risk that a digital currency can be spent more than once, which blockchain prevents through consensus.
webDREAD Model(DREAD)
A risk assessment model used to rate and prioritize security threats based on five key criteria.
securityDropout
A regularization technique where randomly selected neurons are ignored during training, preventing them from co-adapting too much.
aiDRY (Don't Repeat Yourself)(DRY)
A principle of software development aimed at reducing repetition of software patterns, replacing it with abstractions or using data normalization.
devDVI(DVI)
Digital Visual Interface; a video display interface used to connect a video source to a display device.
hardwareDynamic Application Security Testing (DAST)(DAST)
A security testing methodology that evaluates a running application from the outside to find vulnerabilities that an attacker could exploit.
securityDynamic RAM(DRAM)
A type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit.
hardwareDynamic Routing
A process where routers automatically discover and maintain routes using routing protocols to adapt to network changes.
networkDynamic Service Discovery
The process of automatically detecting devices and services on a computer network.
devDynamic Voltage and Frequency Scaling(DVFS)
A power management technique where the voltage and clock frequency of a processor are adjusted on the fly based on workload.
hardware