MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
  • De-anonymization

    A data mining strategy in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source. Any information that distinguishes one data source from another can be used for de-anonymization. 

  • De-perimeterization

    In network security, deperimeterization is a strategy for protecting a company's data on multiple levels by using encryption and dynamic data-level authentication.

  • Debian

    An open source computer operating system that uses the Linux kernel and other program components obtained from the GNU project. Debian can be downloaded over the Internet or, for a small charge, obtained on CD.  

    IT Courses & Reviews (16)
  • DebugDiag

    DebugDiag is a post mortem debugging tool which captures memory dumps for different types of issues (Hang/Crash/Memory), run basic analysis on the captured dumps and generates a report to understand the results and exposes an object model which can be used to easily access the information available inside the memory dump file (memory dump file extensions are usually DMP / PDMP / MDMP)

    IT Courses & Reviews (2)
  • Debugging

    The process of locating and fixing or bypassing bugs (errors) in computer program code or the engineering of a hardware device. To debug a program or hardware device is to start with a problem, isolate the source of the problem, and then fix it. 

    IT Blogs (1) IT Courses & Reviews (393)
  • Decision tree software

    A type of application used in data mining to simplify complex strategic challenges and evaluate the cost-effectiveness of research and business decisions. The intent is to ensure that data is accurately described, categorized and analyzed.

  • Decoupled Architecture

    A  framework for complex work that allows components to remain completely autonomous and unaware of each other. E.g. in Cloud computing, the cloud provider manages the physical infrastructure, but not the applications or data hosted on it.

  • Decoupled Architecture (Computing)

    Describes a processor in a computer program that uses a buffer to separate the fetch and decode stages from the execution stage. It allows each component to perform its tasks independently of the others.

  • DECT (Digital Enhanced Cordless Telecommunications)

    A digital wireless telephone technology that is expected to make cordless phones much more common in both businesses and homes in the future. 

  • Dedicated Hosting

    Dedicated hosting is a hosting configuration in which a server is devoted to a single organisation or for a single purpose, such as a website. A dedicated hosting service is sometimes referred to as a dedicated server and can be set up in-house or externally as a service from within a data center. The host not only provides the server equipment, but may also provide administration and other services. This is considered a more flexible arrangement for the client because unlike in shared server arrangements, it gives the organization total control over the server, its software and security systems.

    IT Blogs (36) IT Reviews (1)
  • Dedicated server

    The rental and exclusive use of a computer that includes a Web server, related software, and connection to the Internet, housed in the Web hosting company's premises.

    IT Blogs (53) IT Reviews (1)
  • Deduplication software

    A Software that helps your reduce storage needs by eliminating redundant data and maintaining  replaced data with a pointer to the unique data copy. 

    IT Blogs (1)
  • Deep Learning

    Deep Learning is the application of algorithms that rely on multiple levels of processing in order to reach a conclusion (often in classification problems). These algorithms are trained prior to application in problem solving.

    IT Blogs (4)
  • Deep Packet Inspection (DPI)

    An advanced method of packet filtering that functions at the Application layer of the OSI reference model. The use of DPI makes it possible to find, identify, classify, reroute or block packets with specific data or code payloads.

    IT Courses & Reviews (7)
  • Deep web

    The Deep Web (also called the Deepnet, the Invisible Web, the Undernet or the Hidden Web) is World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.

    IT Blogs (3)
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to