Browse Definitions :

Business intelligence - business analytics

This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

SOC - ZIP

  • social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social media analytics - Social media analytics is the practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.
  • social media influence - Social media influence is a marketing term that describes an individual’s ability to affect other people's thinking in a social online community.
  • social media listening - Social media listening, also known as social media monitoring, is the process of identifying and assessing what is being said about a company, individual, product or brand.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • Software Process Improvement and Capability dEtermination (SPICE) - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • solution provider - A solution provider is a vendor, a service provider or a value-added reseller (VAR) that comprehensively handles the project needs of their client from concept to installation through support.
  • SOX Section 404 (Sarbanes-Oxley Act Section 404) - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
  • sparkline - A sparkline is a small embedded line graph that illustrates a single trend.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • spend management - In an enterprise, spend management is managing how to spend money to best effect in order to build products and services.
  • SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
  • spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
  • SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
  • statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
  • statistical noise - Statistical noise is unexplained variability within a data sample.
  • stochastic optimization - Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness.
  • storage area management (SAM) - Storage area management (SAM) is a still-evolving set of procedures, services, and standards for comprehensively managing the infrastructure of a storage area network (SAN), including all components within all servers, the disk arrays, the tape libraries, the switches, the routers, and the programs.
  • storage resource management (SRM) - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
  • Streamlined Sales Tax (SST) - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
  • structured data - Structured data contrasts with unstructured and semi-structured data.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • Tableau - Tableau is a software company that offers collaborative data visualization services for organizations working with business information analytics.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • TensorFlow - TensorFlow is an open source framework developed by Google researchers to run machine learning, deep learning and other statistical and predictive analytics workloads.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • time series chart - A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.
  • time series forecasting - Time series forecasting is a technique for the prediction of events through a sequence of time.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transactional marketing - Transactional marketing is a business strategy that focuses on single, "point of sale" transactions.
  • triple bottom line (3BL) - The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • unstructured data - Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is a process in which security teams use monitoring tools to track, collect and assess the network activities of all individuals accessing those system to detect potentially malicious activity.
  • VAR-to-VAR - VAR-to-VAR is a business model based on cooperation between value-added resellers (VARs) that allows the companies to obtain professional services and solutions outside their specialties or geographic areas.
  • virtual (federated) database - A virtual database, also called a federated database, is a system in which several databases appear to function as a single entity.
  • visual analytics - Visual analytics is a form of inquiry in which data that provides insight into solving a problem is displayed in an interactive, graphical manner.
  • Web-Based Enterprise Management (WBEM) - Web-Based Enterprise Management (WBEM) is a set of industry standards that an enterprise can use to manage its information operations in the distributed computing environment of the Internet.
  • what if scenario analysis (WISA) - A business can use what if scenario analysis (WISA) to see how a given outcome, such as project costs, might be affected by changes in particular variables, such as the late delivery of supplies or the unavailability of key personnel.
  • What is BCDR? Business continuity and disaster recovery guide - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • What is business continuity and why is it important? - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • What is customer experience management (CEM or CXM)? - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
  • What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
  • wikinomics - Wikinomics is a term that describes the effects of extensive collaboration and user-participation on the marketplace and corporate world.
  • Windows CardSpace - Windows CardSpace is the code name for an identity management component in Microsoft's upcoming WinFX product suite.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
  • Wired for Management (WfM) - Wired for Management (WfM) is a specification from Intel that allows the performance of certain computer configuration and maintenance functions over a network or dial-up connection.
  • workforce analytics - Workforce analytics is a combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management (HRM).
  • xAPI (experience API) - The xAPI (experience API), also known as Tin Can API, is an open source software specification that provides a set of rules for representing the events a learner performs while interacting with a piece of learning content.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close