Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
d
- Dataflow Event Time Description: Event time in Dataflow refers to the precise moment when an event occurs within a data stream. This concept is fundamental for(...) Read more
- Dataflow Side Inputs Description: Secondary inputs in Dataflow are those provided to a transformation in addition to the main input. In the context of data(...) Read more
- Dataflow Triggers Description: Dataflow triggers are specific conditions that determine when a particular operation should be executed within a data processing(...) Read more
- Dataflow Templates for Batch Description: Batch Dataflow templates are tools specifically designed to facilitate the processing of large volumes of data efficiently and at(...) Read more
- Dataflow Templates for Streaming Description: Dataflow templates for streaming are tools specifically designed to facilitate real-time data processing using cloud-based data(...) Read more
- Distributed Denial of Service (DDoS) Description: Distributed Denial of Service (DDoS) is a malicious attempt to disrupt the normal functioning of a targeted server, service, or(...) Read more
- Decentralized Identity Description: Decentralized identity is a concept that allows individuals to manage their own digital identity without relying on a centralized(...) Read more
- Data Center Security Description: Data center security is a set of practices and technologies designed to protect the physical and virtual infrastructure of a data(...) Read more
- Declarative Infrastructure Description: Declarative Infrastructure is an approach to infrastructure management that allows developers and system administrators to define(...) Read more
- Decentralized Applications Description: Decentralized applications, commonly known as dApps, are programs that operate on a peer-to-peer network rather than being hosted(...) Read more
- Distributed Tracing Description: Distributed tracing is an essential method for monitoring applications, especially those built using microservices architectures.(...) Read more
- DevSecOps Description: DevSecOps is a practice that integrates security into the DevOps process, promoting a culture of collaboration among development,(...) Read more
- DDoS Attack Description: A DDoS (Distributed Denial of Service) attack is a malicious attempt to disrupt the normal functioning of a targeted server,(...) Read more
- Dependency mapping Description: Dependency mapping is the process of identifying and visualizing the interrelationships between different components within a(...) Read more
- Data Center Monitoring Description: Data center monitoring refers to the process of overseeing the infrastructure and operations of a data center, ensuring that all(...) Read more