Browse Definitions:

Storage and Data Management

Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

Backup and recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.

  • Amazon Glacier

    Amazon Glacier is a low-cost cloud storage service for data with longer retrieval times offered by Amazon Web Services (AWS).

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

View All Backup and recovery Definitions

Business intelligence - business analytics

Terms related to business intelligence, including definitions about business analytics and words and phrases about gathering, storing, analyzing and providing access to business data.

  • Total Quality Management (TQM)

    Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

View All Business intelligence - business analytics Definitions Back to Top

Content management

Terms related to content management, including definitions about enterprise content management and words and phrases about content management applications (CMA) and content management systems (CMS).

  • fact checking

    Fact checking is the process of attempting to verify or disprove assertions made in speech, print media or online content.

  • falsifiability

    Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong. That capacity is an essential component of the scientific method and hypothesis testing.

  • What is digital asset management (DAM)?

    Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions. Rich media assets include images, video, audio and other multimedia content.

View All Content management Definitions Back to Top

Customer data management

Terms related to customer data management, including customer data integration (CDI) technology definitions and words and phrases about data quality and data governance.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • EU-US Privacy Shield

    EU-US Privacy Shield is a framework for adherence to E.U. data protection laws for companies that deal with the private data of European Union citizens that is transferred to the United States.

View All Customer data management Definitions Back to Top

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • Oracle

    Oracle is one of the largest vendors in the enterprise IT market, offering a wide variety of software and hardware technologies for use in corporate applications.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • NoSQL (Not Only SQL database)

    NoSQL and Not Only SQL describe an approach to database design that implements a key-value store, document store, column store or graph format for data.

View All Data and data management Definitions Back to Top

Data deduplication

Terms related to data deduplication, including definitions about single-instance storage and words and phrases about eliminating redundant data.

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and disaster recovery.

  • data center

    A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data.

  • data deduplication hardware

    Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these products are sold as appliances or disk libraries, they include software that performs the deduplication.

View All Data deduplication Definitions Back to Top

Database

Terms related to databases, including definitions about relational databases and words and phrases about database management.

  • Oracle

    Oracle is one of the largest vendors in the enterprise IT market, offering a wide variety of software and hardware technologies for use in corporate applications.

  • query

    A query is a question, often expressed in a formal way. A database query can be either a select query or an action query.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

View All Database Definitions Back to Top

NAS

Terms related to network-attached storage (NAS), including hard disk storage definitions and words and phrases about file-level computer data storage.

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

  • cold backup (offline backup)

    Cold backups are ideal for disaster recovery because they protect important data. But the process requires downtime, so it should be conducted during quiet periods.

View All NAS Definitions Back to Top

SAN

Terms related to storage area networks, including definitions about SAN management and words and phrases about virtual SANs, Fibre Channel and iSCSI SANs.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB drives, smartphones and solid-state drives.

  • backup storage device

    A data storage device for backup makes copies of data actively in use. Should the storage medium fail, the original data is recovered from copies on the backup hardware.

  • NVMe over FC (Nonvolatile Memory Express over Fibre Channel)

    Nonvolatile Memory Express over Fibre Channel enables NVMe-based message commands to transfer data between a host and storage subsystem over an FC network fabric.

View All SAN Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close