Browse Definitions :
Definition

data feed

Contributor(s): Ivy Wigmore

A data feed is an ongoing stream of structured data that provides users with updates of current information from one or more sources.

A data feed may stream continuously or be delivered on demand. Data feeds make it possible to have new content or updates delivered to a computer or mobile device as soon as it is published.  The same technologies are also used to supply data to other software.

Facebook’s News Feed is a commonly-seen example of a data feed. News Feed pulls items from status updates, photos, videos, links, app activity and likes from people, Pages and groups the user follows. Items in the feed may be self-contained or summaries that include links to further information.

There are many other types of data feeds, including news, weather and sports updates, content publication feeds and Twitter timelines. In a security context, threat intelligence feeds provide organizations with constantly updated information about potential or current attacks that could pose a risk to their business.

Data feeds are often described in terms of their methods of delivery. RSS feeds, for example, use an XML-based file format to deliver content from multiple sources to users. An RSS aggregator or RSS reader allows the user to see summaries of all their feeds in one place. Atom, an alternative, open-source specification, provides similar functionality.

This was last updated in November 2015

Continue Reading About data feed

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close