Browse Definitions :
5,424 results for:

data silo

AWS Data Pipeline (Amazon Data Pipeline)

Definition | SearchAWS

AWS Data Pipeline is an Amazon Web Services (AWS) tool that enables an IT professional to process and move data between compute and storage services ...

data activation

Definition | SearchDataManagement

Data activation is a marketing approach that uses consumer information and data analytics to help companies gain real-time insight into target ...

data integration

Definition |

Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, ...

citizen data scientist

Definition | SearchBusinessAnalytics

A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational ...

data analytics (DA)

Definition | SearchDataManagement

Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.

big data management

Definition | SearchDataManagement

Big data management is the organization, administration and governance of large volumes of both structured and unstructured data.

geolocation data

Definition | SearchCompliance

Geolocation data is information associated with an electronic device that can be used to identify its physical location. The most common example of ...

data-driven disaster

Definition |

A data-driven disaster is a serious problem caused by one or more ineffective data analysis processes.

big data

Definition | SearchDataManagement

Big data is an evolving term that describes a large volume of structured, semi-structured and unstructured data that has the potential to be mined ...

transactional data

Definition |

Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence ...




  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.