Browse Definitions by Alphabet

  • What is data poisoning (AI poisoning) and how does it work? - Data or AI poisoning attacks are deliberate attempts to manipulate the training data of artificial intelligence and machine learning models to corrupt their behavior and elicit skewed, biased or harmful outputs.
  • What is data preparation? An in-depth guide - Data preparation is the process of gathering, combining, structuring and organizing data for use in business intelligence, analytics and data science applications, as explained in this guide.
  • What is data privacy? - Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, retention, immutability and security of sensitive data.
  • What is data protection and why is it important? - Data protection is the process of safeguarding data and restoring important information in the event the data is corrupted, compromised or lost due to cyberattacks, shutdowns, intentional harm or human error.
  • What is data science as a service (DSaaS)? - Data science as a service (DSaaS) is a form of outsourcing that involves the delivery of information gleaned from advanced analytics applications run by data scientists at an outside company to corporate clients for their business use.
  • What is data science? The ultimate guide - Data science is the process of using advanced analytics techniques and scientific principles to analyze data and extract valuable information for business decision-making, strategic planning and other uses.
  • What is data storytelling? - Data storytelling is the process of translating complex data analyses into understandable terms to inform a business decision or action.
  • What is data validation? - Data validation is the practice of checking the integrity, accuracy and structure of data before it is used for or by one or more business operations.
  • What is data visualization? - Data visualization is the practice of translating information into a visual context, such as a map or graph, to make data easier for the human brain to understand and pull insights from.
  • What is data? - In computing, data is information translated into a form that is efficient for movement or processing.
  • What is database normalization? - Database normalization is intrinsic to most relational database schemes.
  • What is Datadog? - Datadog is a monitoring and analytics tool for information technology (IT) and DevOps teams that can be used to determine performance metrics as well as event monitoring for infrastructure and cloud services.
  • What is decision intelligence? - Decision intelligence is an emerging field that combines data science, artificial intelligence (AI) and decision theory to improve organizational decision-making.
  • What is deep learning and how does it work? - Deep learning is a type of machine learning (ML) and artificial intelligence (AI) that trains computers to learn from extensive data sets in a way that simulates human cognitive processes.
  • What is deepfake technology? - Deepfake technology is a type of artificial intelligence used to create convincing fake images, videos and audio recordings.
  • What is DEI? Diversity, equity and inclusion explained - Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and participation of different groups of individuals.
  • What is Dell EMC? - Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.
  • What is demand shaping? - Demand shaping is an operational supply chain management (SCM) strategy where a company uses tactics such as price incentives, cost modifications and product substitutions to entice customers to purchase specific items.
  • What is denormalization and how does it work? - Denormalization is the process of adding precomputed redundant data to an otherwise normalized relational database to improve read performance.
  • What is dependency injection in object-oriented programming (OOP)? - Dependency injection is a technique used in object-oriented programming (OOP) to reduce the hardcoded dependencies between objects.
  • What is deterministic/probabilistic data? - Deterministic and probabilistic are opposing terms that can be used to describe customer data and how it is collected.
  • What is DevOps 2.0? - DevOps 2.0 is the extension of DevOps practices through the entire organization, beyond development and IT ops.
  • What is DevOps? Meaning, methodology and guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is digital experience (DX)? - Digital experience (DX), also known as 'digital user experience' (UX), is the take-away feeling an end user has after an experience in a digital environment or with a digital technology or device.
  • What is digital health (digital healthcare)? - Digital health, also known as digital healthcare, is the use of digital technologies in healthcare.
  • What is digital labor? - Digital labor is work that's performed by robotic process automation (RPA) systems and interactive applications, including chatbots and digital assistants.
  • What is digital transformation? Everything you need to know - Digital transformation is the incorporation of computer-based technologies into an organization's products, processes and strategies.
  • What is dimensionality reduction? - Dimensionality reduction is a process and technique to reduce the number of dimensions -- or features -- in a data set.
  • What is direct marketing? - Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or website or a request for further information) from a selected group of consumers in response to communication from a marketer.
  • What is distributed cloud and how does it work? - Distributed cloud is public cloud -- any third-party cloud computing service offered over public internet -- deployed in more than one location, ideally in proximity to whoever or whatever wants to access it.
  • What is distributed computing? - Distributed computing is a model in which components of a software system are shared among multiple computers or nodes.
  • What is Domain-based Message Authentication, Reporting and Conformance (DMARC)? - The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet protocols that support email authentication methods.
  • What is DomainKeys Identified Mail (DKIM)? - DomainKeys Identified Mail (DKIM) is a protocol for authenticating email messages using public key cryptography to protect against forged emails.
  • What is dynamic application security testing (DAST)? - Dynamic application security testing (DAST) is the process of analyzing a web application in runtime to identify security vulnerabilities or weaknesses.
  • What is the dark web (darknet)? - The dark web is an encrypted portion of the internet not visible to the general public via a traditional search engine such as Google.
  • What is the Driver's Privacy Protection Act (DPPA)? - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personally identifiable information of licensed drivers from improper use or disclosure.