Browse Definitions :
Definition

slice and dice

To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.

The term has its roots in cooking and describes two types of knife skills every chef needs to master. To slice means to cut and to dice means to cut into very small uniform sections and the two actions are often performed sequentially. For example, a chef may first cut an onion into slices and then cut the slices up into dices. In data analysis, the term generally implies a systematic reduction of a body of data into smaller parts or views that will yield more information. The term is also used to mean the presentation of information in a variety of different and useful ways.

Pivot tables are a popular self-service BI tool for slicing and dicing data. Essentially, a pivot table sorts, counts and totals the data stored in one database table or spreadsheet and creates a second table – the actual pivot table – that summarizes the data. Typically, users will use a pivot table to extract information from a BI solution’s data warehouse in order to mine through data in an interactive manner without requiring the IT department to run an ad hoc report.

Slice and dice contrasts with the terms drill down, drill across and roll up. To drill down is to look at more detailed data in progressively deeper levels of a body of information's hierarchy. To drill across is to compare data in similar levels of a body of information's hierarchy, and to roll up is to aggregate data by removing detail levels from the hierarchy.

This was last updated in July 2018
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close