Browse Definitions :
5,371 results for:

hadoop data lake

chief data officer (CDO)

Definition | WhatIs.com

A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but...

data center infrastructure management (DCIM)

Definition | SearchConvergedInfrastructure

Data center infrastructure management (DCIM) is the convergence of IT and data center facilities functions within an organization.

data deduplication ratio

Definition | SearchDataBackup

To calculate the deduplication ratio, divide the capacity of backed up data before dupliates are removed by the actual capacity used once the backup ...

data cap (broadband cap)

Definition | WhatIs.com

A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month. Because data ...

Salesforce Data.com

Definition | SearchCustomerExperience

Data.com is the sales and lead generation component of Salesforce.com's Sales Cloud customer relationship management (CRM) platform.

data science as a service (DSaaS)

Definition | SearchBusinessAnalytics

Data science as a service (DSaaS) is a form of outsourcing that involves the delivery of information gleaned from advanced analytics applications run...

cardholder data (CD)

Definition | SearchSecurity

Cardholder data (CD) refers to the primary account number (PAN) of a payment card belonging to a cardholder, along with any of the following data ...

Service Data Objects (SDO)

Definition | SearchAppArchitecture

Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from ...

enterprise mashup (or data mashup)

Definition | SearchBusinessAnalytics

An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes. An enterprise ...

converged data center

Definition | SearchDataCenter

A converged data center pre-integrates server, storage and networking hardware with management, hypervisor and operating system platforms, as well as...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close