Browse Definitions :
5,371 results for:

hadoop data lake

Hadoop data lake

Definition | SearchDataManagement

A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.

data lake

Definition | SearchAWS

A data lake is a storage repository that holds a vast amount of raw data in its native format until it is needed.

Microsoft Azure Data Lake

Definition | SearchCloudComputing

Microsoft Azure Data Lake is a highly scalable public cloud service that allows developers, scientists, business professionals and other Microsoft ...

Hadoop

Definition | SearchDataManagement

Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered ...

Hadoop as a service (HaaS)

Definition | SearchStorage

Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in the cloud using ...

Hadoop 2

Definition | SearchDataManagement

Apache Hadoop 2 is the second iteration of the Hadoop framework for distributed data processing.  Hadoop 2 adds support for running non-batch ...

SQL-on-Hadoop

Definition | SearchDataManagement

SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements.

Hadoop Distributed File System (HDFS)

Definition | SearchDataManagement

The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications.

Hadoop cluster

Definition | SearchBusinessAnalytics

A Hadoop cluster is a special type of computational cluster designed specifically for storing and analyzing huge amounts of unstructured data in a ...

Apache Hadoop YARN

Definition | SearchDataManagement

Apache Hadoop YARN is the resource management and job scheduling technology in the open source Hadoop distributed processing framework.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close