Browse Definitions :
5,371 results for:

hadoop data lake

fresh data

Definition | WhatIs.com

Fresh data is data that is current and immediately usable and useful. That means that it is consistently accessible and up to date, its sources can ...

data shadow

Definition | WhatIs.com

A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created....

data virtualization software

Definition | WhatIs.com

Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage ...

data democratization

Definition | WhatIs.com

Data democratization is the ability for information in a digital format to be accessible to the average end user.

big data CRM (big data customer relationship management)

Definition | SearchCustomerExperience

Big data CRM (big data customer relationship management) refers to the practice of integrating big data into a company's CRM processes with the goals...

consumer data

Definition | SearchCIO

Consumer data is the information trail customers leave behind as a result of their Internet use.

Hitachi Vantara (formerly Hitachi Data Systems or HDS)

Definition | SearchConvergedInfrastructure

Hitachi Vantara is a data storage systems provider, previously known as Hitachi Data Systems (HDS).

data science platform

Definition | WhatIs.com

A data science platform is software that includes a variety of technologies for machine learning and other advanced analytics uses, enabling data ...

data loss

Definition | SearchDataBackup

Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization.

big data (infographic)

Definition | WhatIs.com

Big data is a general term used to describe the voluminous and ever-increasing amount of structured, unstructured and semi-structured data being ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close