Browse Definitions :
5,371 results for:

hadoop data lake

Data as a Service (DaaS)

Definition | SearchDataManagement

Data as a Service (DaaS) is an information provision and distribution model in which data files (including text, images, sounds, and videos) are made...

data center resiliency

Definition | SearchDataCenter

Data center resiliency is the ability of a server, network, storage system, or an entire data center, to continue operating even when there has been ...

data protection officer (DPO)

Definition | WhatIs.com

A data protection officer (DPO) is an enterprise security officer tasked with ensuring that data management is compliant with the European Union’s ...

data center migration plan

Definition | SearchStorage

A data center migration plan is a strategy created by an organization to migrate a data center with minimal downtime.

data warehouse as a service (DWaaS)

Definition | SearchDataManagement

Data warehousing as a service (DWaaS) is an outsourcing model in which a service provider configures and manages the hardware and software resources ...

data center services

Definition | SearchDataCenter

Data center services is a collective term for the supporting components necessary for the proper operation of a repository for storage, management ...

data science

Definition | SearchEnterpriseAI

Data science is the study of where information comes from, what it represents and how it can be turned into a valuable resource in the creation of ...

data federation software

Definition | SearchDataManagement

Data federation software is programming that provides an organization with the ability to collect data from disparate sources and aggregate it in a ...

data warehouse appliance

Definition | SearchConvergedInfrastructure

A data warehouse appliance is an all-in-one “black box” solution optimized for data warehousing.  The appliance consists of a server pre-built with ...

green data center

Definition | SearchDataCenter

A green data center is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close