Browse Definitions :
5,371 results for:

hadoop data lake

data destruction

Definition | SearchStorage

Data destruction is the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely ...

data products

Definition | SearchCIO

A data product is digital information that can be purchased. 

AWS Data Pipeline (Amazon Data Pipeline)

Definition | SearchAWS

AWS Data Pipeline is an Amazon Web Services (AWS) tool that enables an IT professional to process and move data between compute and storage services ...

data integration

Definition | WhatIs.com

Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, ...

citizen data scientist

Definition | SearchBusinessAnalytics

A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational ...

geolocation data

Definition | SearchCompliance

Geolocation data is information associated with an electronic device that can be used to identify its physical location. The most common example of ...

data-driven disaster

Definition | WhatIs.com

A data-driven disaster is a serious problem caused by one or more ineffective data analysis processes.

transactional data

Definition | WhatIs.com

Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence ...

data integrity

Definition | SearchDataCenter

Data integrity is the assurance that digital information is uncorrupted and can only be accessed or modified by those authorized to do so. Integrity ...

Data-Link layer

Definition | SearchNetworking

The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close