Browse Definitions :
Definition

data feed

A data feed is an ongoing stream of structured data that provides users with updates of current information from one or more sources.

A data feed may stream continuously or be delivered on demand. Data feeds make it possible to have new content or updates delivered to a computer or mobile device as soon as it is published.  The same technologies are also used to supply data to other software.

Facebook’s News Feed is a commonly-seen example of a data feed. News Feed pulls items from status updates, photos, videos, links, app activity and likes from people, Pages and groups the user follows. Items in the feed may be self-contained or summaries that include links to further information.

There are many other types of data feeds, including news, weather and sports updates, content publication feeds and Twitter timelines. In a security context, threat intelligence feeds provide organizations with constantly updated information about potential or current attacks that could pose a risk to their business.

Data feeds are often described in terms of their methods of delivery. RSS feeds, for example, use an XML-based file format to deliver content from multiple sources to users. An RSS aggregator or RSS reader allows the user to see summaries of all their feeds in one place. Atom, an alternative, open-source specification, provides similar functionality.

This was last updated in November 2015

Continue Reading About data feed

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close