Browse Definitions :

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

GZI - OBJ

  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop data lake - A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.
  • Hancock - Hancock is a C-based programming language developed by AT&T specifically for data mining telephone and Internet records.
  • hashing - Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.
  • HAVA (Help America Vote Act of 2002) - The Help America Vote Act of 2002 (HAVA)is a federal program that reformed aspects of the United States election system.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • heat map (heatmap) - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • help system (help file) - A help system (sometimes called a help file) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities.
  • historical data - Historical data, in a broad context, is collected data about past events and circumstances pertaining to a particular subject.
  • HITSP - HITSP (Healthcare Information Technology Standards Panel) is an organization created to promote standardization and broad scale interoperability among healthcare applications and information systems.
  • host-based replication - Host-based replication is the processes of using servers to copy data from one site to another.
  • hot data - Hot data is a reference to data that is accessed the most by an organization.
  • HPFS (High Performance File System) - HPFS (High Performance File System) is the file system introduced with IBM's OS/2 Version 1.
  • hybrid online analytical processing (HOLAP or Hybrid OLAP) - Hybrid online analytical processing (HOLAP) is a combination of relational OLAP (ROLAP) and multidimensional OLAP (usually referred to simply as OLAP).
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • IDEF (Integrated Definition) - IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • import - In a personal computer application, to import is to open a file that is in a format different from the format the application creates on its own.
  • IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Assurance Standard 6 (IAS 6) - The Information Assurance Standard 6 (IAS 6) is legislation enacted by the British government in May 2009 as part of its Security Policy Framework (SPF).
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • initial extent - The initial extent is a set of contiguous blocks in a database segment that is automatically allocated when the segment is created.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • intelligence (intel) - According to the FBI, intelligence is both the information itself and the processes used to collect and analyze it.
  • intelligent database - An intelligent database is a full-text database that employs artficial intelligence (AI), interacting with users to ensure that returned items (hits) contain the most relevant information possible.
  • intelligent video - Intelligent video is digital video technology integrated with analytical software.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • IT incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • JAQL (json query language) - JAQL is a query language for the JavaScript Object Notation (JSON) data interchange format.
  • Java Data Objects (JDO) - Java Data Objects (JDO) is an application program interface (API) that enables a Java programmer to access a database implicitly - that is, without having to make explicit Structured Query Language (SQL) statements.
  • Java Database Connectivity (JDBC) - Java Database Connectivity (JDBC) is an API packaged with the Java SE edition that makes it possible to connect from a Java Runtime Environment (JRE) to external, relational database systems.
  • JDBC Connector (Java Database Connectivity Connector) - The JDBC (Java Database Connectivity) Connector is a program that enables various databases to be accessed by Java application servers that are run on the Java 2 Platform, Enterprise Edition (J2EE) from Sun Microsystems.
  • job - In certain computer operating systems, a job is the unit of work that a computer operator gives to the operating system.
  • job scheduler - A job scheduler is a program that enables an enterprise to schedule and, in some cases, monitor computer 'batch' jobs (units of work, such as the running of a payroll program).
  • job step - In certain computer operating systems, a job step is part of a job, a unit of work that a computer operator (or a program called a job scheduler) gives to the operating system.
  • JOLAP (Java Online Analytical Processing) - JOLAP (Java Online Analytical Processing) is a Java application-programming interface (API) for the Java 2 Platform, Enterprise Edition (J2EE) environment that supports the creation, storage, access, and management of data in an online analytical processing (OLAP) application.
  • Joliet - Joliet is an extension to ISO 9660, the specification for the file system (including file names) for the content on a compact disc (CD); it allows file names up to 64 characters in length (including spaces) and the use of Unicode characters in file names (sometimes needed for internationalization).
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • Kibana - Kibana is an open source data visualization and exploration platform from Elastic that is specialized for large volumes of streaming and real-time data.
  • knowledge base - In general, a knowledge base is a centralized repository for information: a public library, a database of related information about a particular subject, and whatis.
  • knowledge management (KM) - Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • knowledge warehouse (data repository) - A knowledge warehouse is the component of an enterprise's knowledge management system where knowledge is developed, stored, organized, processed, and disseminated.
  • knowledge worker - A knowledge worker is anyone who works for a living at the tasks of developing or using knowledge.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • KW (Knowledge Warehouse) - KW (Knowledge Warehouse; formerly called the Advanced Training Solution) is a product from SAP that provides tools for the development, exchange, integration, translation, and transfer of enterprise knowledge in various media.
  • Lambda architecture - Lambda architecture is an approach to big data management that provides access to batch processing and near real-time processing with a hybrid approach.
  • latent data (ambient data) - Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.
  • level of support (support level) - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • library - In computing, a library is a collection of similar objects that are stored for occasional use - most frequently, programs in source code or object code form, data files, scripts, templates, fonts, and physical storage units such as tape cartridges.
  • LISP (list processing) - LISP, an acronym for list processing, is a programming language that was designed for easy manipulation of data strings.
  • lock - A lock is a mechanism for controlling access to something.
  • LTO-2 (Linear Tape-Open 2) - LTO-2 is the second tape format from the Linear Tape-Open (LTO) Consortium.
  • LTO-8 (Linear Tape-Open 8) - LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Manufacturing 2.0 - Manufacturing 2.
  • MapR - MapR Technologies is a distributed data platform for AI and analytics provider that enables enterprises to apply data modeling to their business processes with the goal of increasing revenue, reducing costs and mitigating risks.
  • MariaDB - MariaDB is an open source relational database management system (DBMS) that is a compatible drop-in replacement for the widely used MySQL database technology.
  • marketing encyclopedia - A marketing encyclopedia is an application with an online interface to a database of information that a sales person might want to help a customer make a purchase decision.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • master data - Master data is the core data that is essential to operations in a specific business or business unit.
  • master data management (MDM) - Master data management (MDM) is a process that creates a uniform set of data on customers, products, suppliers and other business entities from different IT systems.
  • message-driven processing - Message-driven processing is an approach used within the client/server computing model in which a client (for example, your Web browser) sends a service request in the form of a specially-formatted message to a program that acts as a request broker, handling messages from many clients intended for many different server applications.
  • metabase (metadatabase or metadata repository) - A metabase (sometimes called a metadatabase or metadata repository) is a database for storing metadata (data that describes data) for a specific purpose.
  • metadata - Metadata is data that describes other data.
  • metadata management - Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, analyzed and maintained to best effect across an organization.
  • metadata repository - A metadata repository is a database of data about data (metadata).
  • metainformation - Metainformation is information about information.
  • Microsoft Azure - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Azure Data Lake - Microsoft Azure Data Lake is a highly scalable public cloud service that allows developers, scientists, business professionals and other Microsoft customers to gain insight from large, complex data sets.
  • Microsoft Office SharePoint Server (MOSS) - Microsoft Office SharePoint Server (MOSS) is the full version of a portal-based platform for collaboratively creating, managing and sharing documents and Web services.
  • Microsoft PowerPivot - PowerPivot is a free Microsoft Excel tool that increases the capabilities of Excel's pre-existing pivot table tool by allowing users to import data from multiple sources.
  • Microsoft System Center - Microsoft System Center is a suite of individually sold systems management products.
  • Microsoft Visual FoxPro (Microsoft VFP) - Microsoft Visual FoxPro (VFP) is an object-oriented programming environment with a built-in relational database engine.
  • middleware - Middleware is software that is used to bridge the gap between applications and other tools or databases.
  • MOLAP (multidimensional online analytical processing) - MOLAP (multidimensional online analytical processing) is online analytical processing (OLAP) that indexes directly into a multidimensional database.
  • MPP database (massively parallel processing database) - An MPP database is a database that is optimized to be processed in parallel for many operations to be performed by many processing units at a time.
  • multidimensional database (MDB) - A multidimensional database (MDB) is a type of database that is optimized for data warehouse and online analytical processing (OLAP) applications.
  • National eGovernance Plan (NeGP) - National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.
  • National Electronic Disease Surveillance System (NEDSS) - The National Electronic Disease Surveillance System (NEDSS) is a secure online framework that allows healthcare professionals and government agencies to communicate about disease patterns and coordinate national response to outbreaks.
  • national identity card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
  • negative correlation - A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.
  • NetApp Insight - NetApp Insight is an annual technical conference series for NetApp, a computer storage and data management company.
  • noisy data - Noisy data is meaningless data.
  • NoSQL (Not Only SQL database) - NoSQL is an approach to database design that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • NVDIMM (Non-Volatile Dual In-line Memory Module) - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
  • Object Management Group (OMG) - The OMG (Object Management Group) was formed in 1989 by a group of vendors for the purpose of creating a standard architecture for distributed objects (also known as "components") in networks.
  • Object Request Broker (ORB) - Also see ORBS, a term easily confused with ORB.
  • object-oriented database management system (OODBMS) - An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close