Browse Definitions :
5,371 results for:

hadoop data lake

public data

Definition | SearchCIO

Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal ...

Quiz: Data Storage

Definition | SearchStorage

Computer storage is the holding of data in an electromagnetic form for access by a computer processor.

master data management (MDM)

Definition | SearchDataManagement

Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to a common point of reference.

data deduplication hardware

Definition | SearchDataBackup

Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these ...

enterprise data replication (EDR)

Definition | WhatIs.com

Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another. EDR began as database ...

Engineering Data Management (EDM)

Definition | WhatIs.com

Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic ...

association rules (in data mining)

Definition | SearchBusinessAnalytics

Association rules are if-then statements that help to show the probability of relationships between data items within large data sets in various ...

non-disruptive data migration

Definition | SearchStorage

Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.

sensor data

Definition | IoT Agenda

Sensor data is the output of a device that detects and responds to some type of input from the physical environment. The output may be used to ...

data type

Definition | SearchAppArchitecture

A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close