Browse Definitions :
5,371 results for:

hadoop data lake

data splitting

Definition | SearchSecurity

Data splitting is an approach to protecting sensitive data from unauthorized access by encrypting the data and storing different portions of a file ...

latent data (ambient data)

Definition | WhatIs.com

Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not...

data gravity

Definition | WhatIs.com

Data gravity is an attribute of data that is manifest in the way software and services are drawn to it relative to its mass (the amount of data).

data structure

Definition | SearchSQLServer

A data structure is a specialized format for organizing, processing, retrieving and storing data.

data reduction

Definition | SearchDataBackup

Data reduction is the process of reducing the amount of capacity required to store data.

Clinical Data Repository/Health Data Repository (CHDR)

Definition | SearchHealthIT

Clinical Data Repository/Health Data Repository (CHDR) is a storage interface between the data repositories of the Department of Defense and the ...

data stewardship

Definition | SearchDataManagement

Data stewardship is the management and oversight of an organization's data assets to provide business users with high quality data that is easily ...

data citizen

Definition | WhatIs.com

A data citizen is an employee who relies on data to make decisions and perform job responsibilities. In both a government context and a data context,...

data in motion

Definition | WhatIs.com

Data in motion, also referred to as data in transit or data in flight, is digital information that is in the process of being transported between ...

data replication

Definition | SearchDisasterRecovery

Data replication copies data from one location to another using a SAN, LAN or local WAN. This allows organizations to have current data available in ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close