Browse Definitions :

Data and data management

Terms related to data, including definitions about data warehousing and words and phrases about data management.

E-P - LIS

  • e-prescribing (electronic prescribing) - E-prescribing, or electronic prescribing is a technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
  • ebXML (Electronic Business XML) - EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
  • Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
  • EDIFACT - EDIFACT (ISO 9735) is the international standard for electronic data interchange (EDI).
  • Elastic - Elastic is a software company that provides products and services related to Elasticsearch, its distributed enterprise search engine.
  • Electronic Commerce (EC Directive) Regulations 2002 - The Electronic Commerce (EC Directive) Regulations 2002 establishes legal rules that online retailers and service providers must comply with when dealing with consumers in the 27 member countries of the European Union (EU).
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • Engineering Data Management (EDM) - Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic storage media.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • Entity Relationship Diagram (ERD) - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • erasure coding - Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
  • extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • fact table - A fact table is the central table in a star schema of a data warehouse.
  • fast data - Fast data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
  • federated search (universal search) - Federated search is an approach to information retrieval that aggregates query results from multiple information sources.
  • FERPA (Family Educational Rights and Privacy Act of 1974) - FERPA (Family Educational Rights and Privacy Act of 1974) is legislation that protects the privacy of students' personally identifiable information (PII).
  • file extension (file format) - In a computer, a file extension is the layout of a file -- in terms of how the data within the file is organized.
  • file shredder - A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable.
  • file synchronization (file sync) - File synchronization, often used as a form of backup, is the process by which files residing in more than one physical location are kept up to date.
  • file transfer - File transfer is the movement of one or more files from one location to another.
  • file-area network (FAN) - A file-area network (FAN) is a set of technologies that facilitate file sharing and data management over a network.
  • FileMaker (FMP) - FileMaker is a relational database application in which an individual may design -- and easily share on the Internet -- a database file by starting with a blank document or implementing ready-made and customizable templates.
  • financial data management - Financial data management (FDM) is a process and policy, usually assisted by specialized software, that allows an enterprise or institution to consolidate its financial information, maintain compliance with accounting rules and laws, and produce detailed financial reports.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • firmographic data - Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed data (permanent data, reference data, archival data, or fixed-content data) - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • foreign key - A foreign key is a column or columns of data in one table that connects to the primary key data in the original table.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • fresh data - Fresh data is data that is current and immediately usable and useful.
  • full-text database - A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading.
  • General Data Protection Regulation (GDPR) - The General Data Protection Regulation (GDPR) is legislation that updated and unified data privacy laws across the European Union (EU).
  • globbing - Globbing is the process of expanding a non-specific file name containing a wildcard character into a set of specific file names that exist in storage on a computer, server, or network.
  • golden record - A golden record is a single, well-defined version of all the data entities in an organizational ecosystem.
  • Google Analytics - Google Analytics is a free web analytics service that provides statistics and analytical tools for search engine optimization (SEO) and marketing purposes.
  • Google BigQuery - Google BigQuery is a cloud-based big data analytics web service for processing very large read-only data sets.
  • Google Cloud Storage - Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop data lake - A Hadoop data lake is a data management platform comprising one or more Hadoop clusters.
  • Hadoop Distributed File System (HDFS) - The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications.
  • hashing - Hashing is the process of transforming any given key or a string of characters into another value.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • heat map (heatmap) - A heat map is a two-dimensional representation of data in which values are represented by colors.
  • help system (help file) - A help system (sometimes called a help file) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities.
  • historical data - Historical data, in a broad context, is collected data about past events and circumstances pertaining to a particular subject.
  • HITSP - HITSP (Healthcare Information Technology Standards Panel) is an organization created to promote standardization and broad scale interoperability among healthcare applications and information systems.
  • host-based replication - Host-based replication is the processes of using servers to copy data from one site to another.
  • hot data - Hot data is a reference to data that is accessed the most by an organization.
  • IBM IMS (Information Management System) - IBM IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • ICD-10-CM (Clinical Modification) - The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • in-memory analytics - In-memory analytics queries data residing in a computer’s random access memory (RAM) rather than data stored on physical disks.
  • in-memory data grid - An in-memory data grid (IMDG) is a data structure that resides entirely in RAM (random access memory), and is distributed among multiple servers.
  • in-memory database - An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.
  • infographics - An infographic (information graphic) is a representation of information in a graphic format designed to make the data easily understandable at a glance.
  • information - Information is stimuli that has meaning in some context for its receiver.
  • information asset - An information asset is a body of knowledge that is organized and managed as a single entity.
  • information assurance - Information assurance (IA) is the practice of protecting against and managing risk related to the use, storage and transmission of data and information systems.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • information governance - Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
  • information lifecycle management (ILM) - Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, starting with its creation and acquisition through when it becomes obsolete and is deleted.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • intelligence (intel) - According to the FBI, intelligence is both the information itself and the processes used to collect and analyze it.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • IT incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • JAQL (json query language) - JAQL is a query language for the JavaScript Object Notation (JSON) data interchange format.
  • Java Data Objects (JDO) - Java Data Objects (JDO) is an application program interface (API) that enables a Java programmer to access a database implicitly - that is, without having to make explicit Structured Query Language (SQL) statements.
  • Java Database Connectivity (JDBC) - Java Database Connectivity (JDBC) is an API packaged with the Java SE edition that makes it possible to connect from a Java Runtime Environment (JRE) to external, relational database systems.
  • JDBC Connector (Java Database Connectivity Connector) - The JDBC (Java Database Connectivity) Connector is a program that enables various databases to be accessed by Java application servers that are run on the Java 2 Platform, Enterprise Edition (J2EE) from Sun Microsystems.
  • job - In certain computer operating systems, a job is the unit of work that a computer operator gives to the operating system.
  • job scheduler - A job scheduler is a program that enables an enterprise to schedule and, in some cases, monitor computer 'batch' jobs (units of work, such as the running of a payroll program).
  • job step - In certain computer operating systems, a job step is part of a job, a unit of work that a computer operator (or a program called a job scheduler) gives to the operating system.
  • JOLAP (Java Online Analytical Processing) - JOLAP (Java Online Analytical Processing) is a Java application-programming interface (API) for the Java 2 Platform, Enterprise Edition (J2EE) environment that supports the creation, storage, access, and management of data in an online analytical processing (OLAP) application.
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • Kibana - Kibana is an open source data visualization and exploration platform from Elastic that is specialized for large volumes of streaming and real-time data.
  • knowledge base - In general, a knowledge base is a centralized repository for information: a public library, a database of related information about a particular subject, and whatis.
  • knowledge management (KM) - Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • knowledge worker - A knowledge worker is anyone who works for a living at the tasks of developing or using knowledge.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • Lambda architecture - Lambda architecture is an approach to big data management that provides access to batch processing and near real-time processing with a hybrid approach.
  • latent data (ambient data) - Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.
  • level of support (support level) - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • LISP (list processing) - LISP, an acronym for list processing, is a programming language that was designed for easy manipulation of data strings.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close