Browse Definitions :

Storage and Data Mgmt

Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

Customer data management

Terms related to customer data management, including customer data integration (CDI) technology definitions and words and phrases about data quality and data governance.

  • social media analytics

    Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization's strategic business decisions.

  • Gramm-Leach-Bliley Act (GLBA)

    The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

  • What is a private cloud?

    Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.

View All Customer data management Definitions

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • data exploration

    Data exploration is the first step in data analysis involving the use of data visualization tools and statistical techniques to uncover data set characteristics and initial patterns.

  • encoding and decoding

    Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.

  • metadata

    Often referred to as data that describes other data, metadata is structured reference data that helps to sort and identify attributes of the information it describes.

View All Data and data management Definitions Back to Top

Data backup - disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • encoding and decoding

    Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.

  • What is network-attached storage (NAS) and how does it work?

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.

View All Data backup - disaster recovery Definitions Back to Top

Data deduplication

Terms related to data deduplication, including definitions about single-instance storage and words and phrases about eliminating redundant data.

  • data scrubbing (data cleansing)

    Data scrubbing, also referred to as data cleansing, is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted or duplicated.

  • data center

    A data center (or datacenter) is a facility composed of networked computers and storage that businesses and other organizations use to organize, process, store and disseminate large amounts of data.

  • What is data management and why is it important?

    Data management is the process of ingesting, storing, organizing and maintaining the data created and collected by an organization, as explained in this in-depth look at the process.

View All Data deduplication Definitions Back to Top

Database management

Terms related to databases, including definitions about relational databases and words and phrases about database management.

  • encoding and decoding

    Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.

  • columnar database

    A columnar database is a database management system (DBMS) that stores data in columns instead of rows.

  • What is failover?

    Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

View All Database management Definitions Back to Top

Enterprise content management

Terms related to content management, including definitions about enterprise content management and words and phrases about content management applications (CMA) and content management systems (CMS).

  • content management system (CMS)

    A content management system (CMS) is a software application or set of related programs that help create and manage digital content.

  • knowledge management (KM)

    Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

View All Enterprise content management Definitions Back to Top

NAS

Terms related to network-attached storage (NAS), including hard disk storage definitions and words and phrases about file-level computer data storage.

  • FDDI (Fiber Distributed Data Interface)

    FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.

  • What is failover?

    Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

View All NAS Definitions Back to Top

Solid state storage

This glossary contains definitions related to solid state storage. Some definitions explain the meaning of words used to describe flash storage in consumer technology. Other definitions are related to the capabilities of solid-state applications and the role of all-flash arrays in enterprise storage. Visit <a href="https://searchsolidstatestorage.techtarget.com/">SearchSolidStateStorage.com</a> to learn about the tools and strategies that will help you build a solid state storage architecture and manage solid state drives (SSDs).

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • Serial ATA (Serial Advanced Technology Attachment or SATA)

    Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).

  • M.2 SSD

    An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage expansion cards.

View All Solid state storage Definitions Back to Top

Storage Admin

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID set before any data is lost.

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer speed of data between enterprise and client systems and SSDs over a computer's high-speed PCIe bus.

View All Storage Admin Definitions Back to Top

SAN

Terms related to storage area networks, including definitions about SAN management and words and phrases about virtual SANs, Fibre Channel and iSCSI SANs.

  • What is failover?

    Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

  • What is network-attached storage (NAS) and how does it work?

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities.

View All SAN Definitions Back to Top
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close