Browse Definitions :
5,424 results for:

data silo

data deduplication hardware

Definition | SearchDataBackup

Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these ...

enterprise data replication (EDR)

Definition | WhatIs.com

Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another. EDR began as database ...

Engineering Data Management (EDM)

Definition | WhatIs.com

Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic ...

association rules (in data mining)

Definition | SearchBusinessAnalytics

Association rules are if-then statements that help to show the probability of relationships between data items within large data sets in various ...

non-disruptive data migration

Definition | SearchStorage

Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.

sensor data

Definition | IoT Agenda

Sensor data is the output of a device that detects and responds to some type of input from the physical environment. The output may be used to ...

data management-as-a-service (DMaaS)

Definition | SearchDataManagement

Data Management-as-a-Service (DMaaS) is a type of cloud service that provides protection, governance and intelligence across a company’s various data...

data type

Definition | SearchAppArchitecture

A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or ...

free/busy data

Definition | WhatIs.com

Free/busy data is information about the availability of individuals within an organization at specified times. The user status data indicates whether...

data source object (DSO)

Definition | SearchAppArchitecture

A data source object (DSO) is a Microsoft ActiveX object embedded within a Web page. It employs a process called data binding, in which an ActiveX ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close