Browse Definitions :

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

SUP - ZON

  • Supply Chain Planning (SCP) - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • support vector machine (SVM) - A support vector machine (SVM) is a type of deep learning algorithm that performs supervised learning for classification or regression of data groups.
  • Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
  • System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
  • T-SQL (Transact-SQL) - T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.
  • table - In computer programming, a table is a data structure used to organize information, just as it is on paper.
  • tablespace - In a database management system (DBMS), a tablespace is a logical group of data files in a database.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.
  • Teraplex (Teraplex Integration Center) - Teraplex (short for Teraplex Integration Center) is the name IBM has given to its 'real life' testing centers whose purpose is to allow IBM customers and business partners to test very large database (VLDB) applications on a full-scale basis by using.
  • text mining (text analytics) - Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.
  • text tagging - Text tagging is the process of manually or automatically adding tags or annotation to various components of unstructured data as one step in the process of preparing such data for analysis.
  • Thunder (Salesforce Thunder) - Salesforce Thunder is a big data pipeline and rules engine designed to capture, filter and respond to events in real time; the platform was created to operate in streaming scenarios such as machine-to-machine (M2M) and Internet of Things (IoT) environments.
  • tModel - A tModel is a data structure representing a service type (a generic representation of a registered service) in the UDDI (Universal Description, Discovery, and Integration) registry.
  • Topic Map Query Language (TMQL) - Topic Map Query Language (TMQL) is an XML-based extension of Structured Query Language (SQL), a query language developed for use in meeting the specialized data access requirements of Topic Maps (TMs).
  • Transaction Processing Performance Council (TPC) - The Transaction Processing Performance Council (TPC) is a worldwide consortium that establishes standards intended to promote the fast, efficient and reliable execution of e-commerce and database transactions.
  • transactional data - Transactional data, in the context of data management, is the information recorded from transactions.
  • transcoding - Transcoding is the ability to adapt digital files so that content can be viewed on different playback devices.
  • transcription error - A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • tree structure - A tree structure is an algorithm for placing and locating files (called records or keys) in a database.
  • trigger - A trigger (from the Dutch trekken, meaning to pull) is a lever which, when pulled by the finger, releases the hammer on a firearm.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • U-SQL - U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.
  • U.K. Data Protection Act 1998 (DPA 1998) - The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled.
  • UCCnet - UCCnet is a standards organization that provides an Internet-based supply chain management (SCM) data registry service for e-commerce companies and companies that have an e-commerce component.
  • UK Identity Cards Act - The UK Identity Cards Act is a framework of enabling legislation for a British National Identity card passed in 2006.
  • United States Census - The United States Census is a national survey conducted every ten years to enumerate the population for taxation and political representation.
  • Universal Data Access (UDA) - Universal Data Access (UDA) is Microsoft's model or framework for a single uniform application program interface to different software makers' databases, both relational and nonrelational.
  • unstructured text - The unstructured text collected from social media activities plays a key role in predictive analytics for the enterprise because it is a prime source for sentiment analysis to determine the general attitude of consumers toward a brand or idea.
  • uplift modeling - Uplift modeling is a type of data analytics that uses predictive modeling to identify individuals who can be positively influenced by a specific outreach effort.
  • user behavior analytics (UBA) - User behavior analytics (UBA) is a process in which security teams use monitoring tools to track, collect and assess the network activities of all individuals accessing those system to detect potentially malicious activity.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, an organization or a business unit on a pay-per-use basis.
  • Versioned Object Base (VOB) - A Versioned Object Base (VOB) is a centralized database that stores version information about the files and folders in a software configuration management (SCM) system.
  • Very Large Database (VLDB) - While there is apparently no official or standard definition for the term Very Large Database (VLDB), it is sometimes used to describe databases occupying magnetic storage in the terabyte range and containing billions of table rows.
  • view - In a database management system, a view is a way of portraying information in the database.
  • virtual (federated) database - A virtual database, also called a federated database, is a system in which several databases appear to function as a single entity.
  • virtual cube - A virtual cube is a subset of one or two existing cubes in a database.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual server backup - Virtual server backup is the copying of data stored on a virtual server to guard against data loss.
  • virtual storage area network (VSAN) - A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN).
  • visual analytics - Visual analytics is a form of inquiry in which data that provides insight into solving a problem is displayed in an interactive, graphical manner.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • Web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider’s web server for use by a client or other web-based programs.
  • Web-Braille - Web-Braille is a delivery system that allows content to be read on a Braille display or transmitted to a Braille embosser.
  • WebLogic - BEA Systems' WebLogic is a server software application that runs on a middle tier, between back-end databases and related applications and browser-based thin clients.
  • webMethods - webMethods is a company that specializes in business process integration software for the enterprise.
  • What is data governance and why does it matter? - Data governance (DG) is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.
  • What is data management and why is it important? - Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth look at the process.
  • wide-area file services (WAFS) - Wide-area file services (WAFS) is a storage technology that makes it possible to access a remote data center as though it were local.
  • Windows Product Activation (WPA) - Windows Product Activation (WPA) is the mandatory product registration system included in Microsoft's Windows XP, Office XP, and recent Office products (such as Word 2002 or Excel 2002) as a means of enforcing compliance with the company's End User License Agreement (EULA).
  • Windows Server Core - Windows Server Core is a minimal installation option for the Windows Server operating system (OS) that has no GUI and only includes the components required to perform server roles and run applications.
  • wipe - Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable.
  • workload - In computing, the workload is the amount of processing that the computer has been given to do at a given time.
  • X - X# is the name that has been given to a "data-centric" programming language that Microsoft is said to be developing in order to make it easier for a programmer to specify XML-defined data and how it should be handled by the program.
  • Xerces - Xerces (the name comes from the Xerces blue butterfly) is a set of parsers compatible with Extensible Markup Language (XML).
  • XKeyscore - XKeyscore (XKS) is the front end search engine interface that interacts with all NSA  federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens.
  • XQuery - XQuery is a specification for a query language that allows a user or programmer to extract information from an Extensible Markup Language (XML) file or any collection of data that can be XML-like.
  • XSD (XML Schema Definition) - XSD is a W3C recommendation that defines the way to utilize the elements in an XML document.
  • yobibyte (YiB) - A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and storage capacity.
  • Zettabyte Era - The Zettabyte Era is the current age in terms of digital data.
  • zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close