Browse Definitions:
11,672 results for:

opinion mining (sentiment mining)

Definition | SearchBusinessAnalytics

Opinion mining is a process for tracking the mood of the public about a certain product, for example, by building a system to examine the ...

Software as a Service BI (SaaS BI)

Definition | SearchBusinessAnalytics

Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed ...

Dossia

Definition | SearchCompliance

Dossia is a Web-based framework for storing and managing personal health records (PHR). With Dossia, a qualified individual can aggregate his ...

Data Security Council of India (DSCI)

Definition | WhatIs.com

The Data Security Council of India (DSCI) is a not-for-profit organization created to promote the country as a secure destination for information ...

Unified Medical Language System (UMLS)

Definition | SearchHealthIT

Unified Medical Language System (UMLS) is a comprehensive list of biomedical terms for developing computer systems capable of understanding the ...

spreadmart (spreadsheet data mart)

Definition | SearchBusinessAnalytics

A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department ...

operational business intelligence

Definition | SearchBusinessAnalytics

Operational business intelligence, sometimes called real-time business intelligence, is an approach to data analysis that enables decisions based on ...

OLAP dashboard

Definition | SearchBusinessAnalytics

The “OLAP” designation indicates that one or more of the graphs or reports (sometimes referred to as “panes,” in the dashboard) are based on an OLAP ...

master data management (MDM)

Definition | SearchDataManagement

Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to one file, called a master file, ...

carbon copy (cc)

Definition | SearchWindowsServer

In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close