Browse Definitions :
5,371 results for:

hadoop data lake

enterprise data hub

Definition | SearchCIO

An enterprise data hub, also referred to as a data lake, is a new big data management model for big data that utilizes Hadoop as the central data ...

VMware vSphere Big Data Extensions (BDE)

Definition | SearchVMware

VMware vSphere Big Data Extensions (BDE) is a virtual appliance that enables administrators to deploy and manage the Hadoop clusters for big data ...

SAP HANA Vora

Definition | SearchSAP

SAP HANA Vora is an in-memory computing engine designed to make big data from Hadoop more accessible and usable for enterprises. It takes data stored...

SAP Smart Data Access (SDA)

Definition | SearchSAP

Smart Data Access is a data virtualization feature in SAP HANA that allows customers to access data virtually from remote sources such as Hadoop, ...

data preparation

Definition | SearchBusinessAnalytics

Data preparation is the process of gathering, combining, structuring and organizing data so it can be analyzed as part of data visualization, ...

data engineer

Definition | SearchDataManagement

A data engineer is a worker whose primary job responsibilities involve preparing data for analytical or operational uses.

SAP Data Hub

Definition | SearchSAP

SAP Data Hub is software that enables organizations to manage and govern the flow of data from a variety of sources across the enterprise.

data warehouse

Definition | SearchDataManagement

A data warehouse is a federated repository for all the data collected by an enterprise's various operational systems, be they physical or logical.

big data storage

Definition | SearchStorage

Big data storage is a compute-and-storage architecture that collects and manages large data sets and enables real-time data analytics.

big data analytics

Definition | SearchBusinessAnalytics

Big data analytics is the often complex process of examining large and varied data sets -- or big data -- to uncover information including hidden ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close