Browse Definitions :
5,441 results for:

data silo

operational data store (ODS)

Definition | SearchOracle

An operational data store (ODS) is a type of database that's often used as an interim logical area for a data warehouse.

streaming data architecture

Definition | WhatIs.com

A streaming data architecture is an information technology framework that puts the focus on processing data in motion and treats ...

copy data management (CDM)

Definition | SearchStorage

Copy data management (CDM) is an approach to reducing storage consumption that involves eliminating the unnecessary duplication of production data.

data glove

Definition | WhatIs.com

A data glove is an interactive device, resembling a glove worn on the hand, which facilitates tactile sensing and fine-motion control in robotics and...

data transfer rate (DTR)

Definition | SearchUnifiedCommunications

Data transfer rate (DTR) is the amount of digital data that is moved from one place to another in a given time.

data sovereignty

Definition | WhatIs.com

Data sovereignty is the concept that information which has been converted and stored in binary digital form is subject to the laws of the country in ...

social BPM (business process management)

Definition | WhatIs.com

Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more ...

cardholder data environment (CDE)

Definition | SearchSecurity

A cardholder data environment or CDE is a computer system or networked group of IT systems that processes, stores and/or transmits cardholder data or...

change data capture (CDC)

Definition | WhatIs.com

Change data capture (CDC) is the process of capturing changes made at the data source and applying them throughout the enterprise.

public data

Definition | SearchCIO

Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close