Browse Definitions :

Analytics

This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

RDB - ZIP

  • RDBMS (relational database management system) - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • real-time analytics - Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.
  • real-time business intelligence (BI) - Real-time business intelligence is an approach to data analytics that enables business users to get up-to-the-minute data by directly accessing operational systems.
  • recommendation engine - Recommendation engines are common among online retail websites, such as Amazon.
  • records information management (RIM) - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • reputation management - Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.
  • Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • ROI (return on investment) - Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.
  • role sharing - Role sharing occurs when an individual within a VAR or other solution provider's organization assumes multiple roles such as "sales engineer", "field engineer", "account manager" or other roles.
  • rule of five (statistics) - The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
  • Sage CRM - Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.
  • sales lead - A sales lead is a potential sales contact, individual or organization that expresses an interest in your goods or services.
  • sampling error - A sampling error is a problem in the way that members of a population are selected for research or data collection, which impacts the validity of results.
  • SAP BusinessObjects BI - SAP BusinessObjects BI (SAP BO) is a centralized suite of reporting and analytics tools for business intelligence (BI) platforms.
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • SAP ERP - SAP ERP is an enterprise resource planning software developed by the company SAP SE.
  • SAP HANA - SAP HANA is an in-memory database and application development platform for processing high volumes of data in real time.
  • SAP Lumira - SAP Lumira (formerly called SAP Visual Intelligence) is a self-service, data visualization application for business users.
  • SAS Institute Inc. - SAS Institute Inc.
  • Scala (Scalable Language) - Scala is a software programming language that mixes object-oriented methods with functional programming capabilities.
  • scatter plot - A scatter plot is a set of points plotted on a horizontal and vertical axes.
  • scenario planning - Scenario planning allows a business to prepare for various potential events and situations, known as scenarios.
  • Scrum - Scrum is a framework for project management that emphasizes teamwork, accountability and iterative progress toward a well-defined goal.
  • secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • silent monitoring - Silent monitoring refers to the practice of call center managers or senior agents listening to the interaction between an incoming caller and an agent.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • single source of truth (SSOT) - Single source of truth (SSOT) is a concept that an organization can apply as part of its information architecture to ensure that everyone in the organization uses the same data when making business decisions.
  • skewness - Skewness is asymmetry in a statistical distribution, in which the curve appears distorted or skewed either to the left or to the right.
  • SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
  • small data - Small data is data presented in a volume and format that makes it accessible and actionable.
  • small multiples - Small multiples (also called trellis charts or lattice charts) provide data visualization of many small, interrelated graphs clustered together in a single display.
  • small to medium enterprise (SME) - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social media analytics - Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization's strategic business decisions.
  • social media influence - Social media influence is a marketing term that describes an individual’s ability to affect other people's thinking in a social online community.
  • social media listening - Social media listening, also known as social media monitoring, is the process of identifying and assessing what is being said about a company, individual, product or brand.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • Software Process Improvement and Capability dEtermination (SPICE) - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • solution provider - A solution provider is a vendor, a service provider or a value-added reseller (VAR) that comprehensively handles the project needs of their client from concept to installation through support.
  • SOX Section 404 (Sarbanes-Oxley Act Section 404) - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
  • sparkline - A sparkline is a small embedded line graph that illustrates a single trend.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
  • spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
  • SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
  • statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
  • statistical noise - Statistical noise is unexplained variability within a data sample.
  • stochastic optimization - Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness.
  • structured data - Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • Tableau - Tableau is a software company that offers collaborative data visualization services for organizations working with business information analytics.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • TensorFlow - TensorFlow is an open source framework developed by Google researchers to run machine learning, deep learning and other statistical and predictive analytics workloads.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transactional marketing - Transactional marketing is a business strategy that focuses on single, "point of sale" transactions.
  • triple bottom line (TBL) - The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • unstructured data - Unstructured data is information, in many different forms, that doesn't follow conventional data models, making it difficult to store and manage in a mainstream relational database.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is a process in which security teams use monitoring tools to track, collect and assess the network activities of all individuals accessing those system to detect potentially malicious activity.
  • VAR-to-VAR - VAR-to-VAR is a business model based on cooperation between value-added resellers (VARs) that allows the companies to obtain professional services and solutions outside their specialties or geographic areas.
  • virtual (federated) database - A virtual database, also called a federated database, is a system in which several databases appear to function as a single entity.
  • visual analytics - Visual analytics is a form of inquiry in which data that provides insight into solving a problem is displayed in an interactive, graphical manner.
  • Web-Based Enterprise Management (WBEM) - Web-Based Enterprise Management (WBEM) is a set of industry standards that an enterprise can use to manage its information operations in the distributed computing environment of the Internet.
  • what if scenario analysis (WISA) - A business can use what if scenario analysis (WISA) to see how a given outcome, such as project costs, might be affected by changes in particular variables, such as the late delivery of supplies or the unavailability of key personnel.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is BCDR? Business continuity and disaster recovery guide - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • What is business continuity and why is it important? - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • What is customer experience management (CEM or CXM)? - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
  • Windows CardSpace - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
  • workforce analytics - Workforce analytics is a combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management (HRM).
  • xAPI (experience API) - The xAPI (experience API), also known as Tin Can API, is an open source software specification that provides a set of rules for representing the events a learner performs while interacting with a piece of learning content.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close