MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with D
  • DBX

    It is a file extension used by the Microsoft Outlook Express email application. DBX files contain folders that have been created by the Microsoft Outlook Express email program. These folders contain the email messages that are stored in a specific mailbox.

    IT Blogs (2) IT Reviews (1)
  • DCCA (Data Center Certified Associate)

    Skill Level: Foundation Status: ActiveFor individuals who are interested in designing and building or upgrading the physical infrastructure of data centers. Certified individuals will have a base level proficiency in the elements of cooling, medstore power, racks, cabling, fire protection, management and physical security.

  • DCDC (Data Center Design Consultant)

    Data Center Design Consultant (DCDC) by BICSI

  • DCML (Data Center Markup Language)

    A data format and model for exchanging information that describes a data center environment. DCML is intended to provide a common description of a data center. It allows an enterprise to describe the state of the data center environment. 

  • DCOM (Distributed Component Object Model)

    A set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network. DCOM is based on the Component Object Model (COM).

  • DCP (D-Link Certified Professional - Switching)

    D-Link Certified Professional - Switching (DCP) by D-Link

  • DDoS Mitigation

    DDoS mitigation is a technique for resisting distributed denial of service (DDoS) attacks on networks attached to the Internet by passing network traffic addressed to the attacked network through high-capacity networks with "traffic scrubbing" filters.

    IT Blogs (2)
  • De-anonymization

    A data mining strategy in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source. Any information that distinguishes one data source from another can be used for de-anonymization. 

  • De-perimeterization

    In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.

  • Debian

    An open source computer operating system that uses the Linux kernel and other program components obtained from the GNU project. Debian can be downloaded over the Internet or, for a small charge, obtained on CD.  

    IT Courses & Reviews (16)
  • DebugDiag

    DebugDiag is a post mortem debugging tool which captures memory dumps for different types of issues (Hang/Crash/Memory), run basic analysis on the captured dumps and generates a report to understand the results and exposes an object model which can be used to easily access the information available inside the memory dump file (memory dump file extensions are usually DMP / PDMP / MDMP)

    IT Courses & Reviews (2)
  • Debugging

    The process of locating and fixing or bypassing bugs (errors) in computer program code or the engineering of a hardware device. To debug a program or hardware device is to start with a problem, isolate the source of the problem, and then fix it. 

    IT Blogs (1) IT Courses & Reviews (393)
  • Decision tree software

    A type of application used in data mining to simplify complex strategic challenges and evaluate the cost-effectiveness of research and business decisions. The intent is to ensure that data is accurately described, categorized and analyzed.

  • Decoupled Architecture

    A  framework for complex work that allows components to remain completely autonomous and unaware of each other. E.g. in Cloud computing, the cloud provider manages the physical infrastructure, but not the applications or data hosted on it.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to