Browse Definitions :

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

DIG - INI

  • Digital Negative (DNG) - Digital Negative (DNG) is an imaging specification that provides for long-term storage of digital photographs generated in multiple proprietary formats.
  • digital preservation - As a part of the formalized efforts of library and archival sciences, digital preservation includes the practices required to ensure that information is safe from medium failures as well as software and hardware obsolescence.
  • digital wallet - A digital wallet is a software application that serves as an electronic version of a physical wallet, digitizing credit and debit card information to enable consumers to make purchases from their smartphones.
  • dimension - In data warehousing, a dimension is a collection of reference information about a measurable event (fact).
  • dimension table - A dimension table is a table in a star schema of a data warehouse.
  • dirty data - In a data warehouse, dirty data is a database record that contains errors.
  • disambiguation - Disambiguation (also called word sense disambiguation) is the act of interpreting the intended sense or meaning of a word.
  • disaster recovery (DR) - Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • distributed cache - Distributed cache is a method of configuring a data cache to span multiple servers, storing common requests and enabling quick retrieval.
  • distributed database - A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks.
  • distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
  • distribution - In marketing, distribution is the process of moving a product from its manufacturing source to its customers.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • Dublin Core - Dublin Core is an initiative to create a digital "library card catalog" for the Web.
  • dynamic SQL (Dynamic Structured Query Language) - Dynamic SQL is an enhanced form of Structured Query Language (SQL) that, unlike standard (or static) SQL, facilitates the automatic generation and execution of program statements.
  • e-prescribing (electronic prescribing) - E-prescribing, or electronic prescribing is a technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
  • ebXML (Electronic Business XML) - EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
  • Eclipse (Eclipse Foundation) - Eclipse is an open-source Java Integrated Development Environment (IDE) known for its plug-ins that allow developers to develop and test code written in other programming languages.
  • EDIFACT - EDIFACT (ISO 9735) is the international standard for electronic data interchange (EDI).
  • Elastic - Elastic is a software company that provides products and services related to Elasticsearch, its distributed enterprise search engine.
  • Elastic Stack - Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format and search, analyze, and visualize that data in real time.
  • Electronic Commerce (EC Directive) Regulations 2002 - The Electronic Commerce (EC Directive) Regulations 2002 establishes legal rules that online retailers and service providers must comply with when dealing with consumers in the 27 member countries of the European Union (EU).
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • Engineering Data Management (EDM) - Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic storage media.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • enterprise search - There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.
  • Entity Relationship Diagram (ERD) - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • entity-relationship model (ERM or ER model) - The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.
  • erasure coding - Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media.
  • EU Data Protection Directive (Directive 95/46/EC) - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
  • extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • fact table - A fact table is the central table in a star schema of a data warehouse.
  • fast data - Fast data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
  • Fast Guide: SQL Server 2000 commands - Here are ten commands you need to know!.
  • federated search (universal search) - Federated search is an approach to information retrieval that aggregates query results from multiple information sources.
  • FERPA (Family Educational Rights and Privacy Act of 1974) - FERPA (Family Educational Rights and Privacy Act of 1974) is legislation that protects the privacy of students' personally identifiable information (PII).
  • file extension (file format) - In a computer, a file extension is the layout of a file -- in terms of how the data within the file is organized.
  • file shredder - A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable.
  • file synchronization (file sync) - File synchronization, often used as a form of backup, is the process by which files residing in more than one physical location are kept up to date.
  • file-area network (FAN) - A file-area network (FAN) is a set of technologies that facilitate file sharing and data management over a network.
  • FileMaker (FMP) - FileMaker is a relational database application in which an individual may design -- and easily share on the Internet -- a database file by starting with a blank document or implementing ready-made and customizable templates.
  • financial data management - Financial data management (FDM) is a process and policy, usually assisted by specialized software, that allows an enterprise or institution to consolidate its financial information, maintain compliance with accounting rules and laws, and produce detailed financial reports.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • firmographic data - Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed data (permanent data, reference data, archival data, or fixed-content data) - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • flexfield - In an Oracle environment, a flexfield is a database field that has flexibility built into it so that users can define reporting structures that are relevant to their specific organizations.
  • foreign key - A foreign key is a column or columns of data in one table that connects to the primary key data in the original table.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • fresh data - Fresh data is data that is current and immediately usable and useful.
  • full-text database - A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading.
  • General Data Protection Regulation (GDPR) - The General Data Protection Regulation (GDPR) is legislation that updated and unified data privacy laws across the European Union (EU).
  • golden record - A golden record is a single, well-defined version of all the data entities in an organizational ecosystem.
  • Google Analytics - Google Analytics is a free web analytics service that provides statistics and analytical tools for search engine optimization (SEO) and marketing purposes.
  • Google BigQuery - Google BigQuery is a cloud-based big data analytics web service for processing very large read-only data sets.
  • Google Cloud Storage - Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop data lake - A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.
  • Hadoop Distributed File System (HDFS) - The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications.
  • hashing - Hashing is the process of transforming any given key or a string of characters into another value.
  • HAVA (Help America Vote Act of 2002) - The Help America Vote Act of 2002 (HAVA)is a federal program that reformed aspects of the United States election system.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • heat map (heatmap) - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • help system (help file) - A help system (sometimes called a help file) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities.
  • historical data - Historical data, in a broad context, is collected data about past events and circumstances pertaining to a particular subject.
  • HITSP - HITSP (Healthcare Information Technology Standards Panel) is an organization created to promote standardization and broad scale interoperability among healthcare applications and information systems.
  • host-based replication - Host-based replication is the processes of using servers to copy data from one site to another.
  • hot data - Hot data is a reference to data that is accessed the most by an organization.
  • hybrid online analytical processing (HOLAP or Hybrid OLAP) - Hybrid online analytical processing (HOLAP) is a combination of relational OLAP (ROLAP) and multidimensional OLAP (usually referred to simply as OLAP).
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • initial extent - The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close