Browse Definitions :
Definition

Apache Lucene

Apache Lucene is a freely available information retrieval software library that works with fields of text within document files. This evolving venture is also called the Apache Lucene Project. Apache is a server that is distributed under an open source license.

The Lucene application program interface (API) stays the same regardless of the format of the file to be indexed. Provided that the text information can be recovered and extracted, Lucene can index practically any type of text-containing document. Lucene has become popular for use in Internet search engines as well as for single-site search operations.

The Apache Lucene Project comprises four main components:

  • Lucene Core: Indexing, searching, spell checking, hit highlighting, and tokenization.
  • PyLucene: Python port for Lucene Core.
  • Solr: Extensible Markup Language (XML), Hypertext Transfer Protocol (HTTP), and APIs for Javascript Object Notation (JSON), Python, and Ruby, as well as hit highlighting, faceted search, caching, replication, and an interface for Web site administrators.
  • Open Relevance Project: Free distribution of materials for performance testing and relevance evaluation.
This was last updated in May 2013

Continue Reading About Apache Lucene

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close