IT Terms tagged with 'Data Management'
- Database Column
- Data Modeling
- Commit
- Database Clustering
- Cardinality
- Candidate Key
- Blind Drop
- Bypass Airflow
- Contact Manager
- Data Center
- Latecomer
- V.32
- V.35
- Legacy System
- Unified Storage
- Burst
- Data Infrastructure Hygiene
- Error Correction
- Keyboard Wedge
- Master Data
- Sliding Window
- File Format
- Transcoding
- Automatic Fall-over
- Availability
- Backup Window
- Bad Sector
- Disaster Recovery Team
- Cluster (Servers)
- Cold Site
- Cold Standby
- Compressed Sensing
- Data Center Management
- Data Custodian
- Data Services
- Data Synchronization
- Data Virtualization
- Disk Array
- Forms Processing
- Holographic Data Storage
- Swivel Chair Interface
- Compliance
- Consolidation
- Data Deduplication
- Data Mirroring
- Hot Potato Routing
- Online Data Storage
- Tiered Storage
- Data Structure
- Heap
- Queue
- Codd's Rules
- Data Migration
- Data Mining
- Dbase
- Join
- Normalization
- Record
- Replication
- Schema
- Table
- Database Trigger
- Tuple (Database)
- Back Office Application
- Binhex
- Breadcrumb Navigation
- Data Miner
- Web Analytics
- Email Appending
- False Positive
- Content Package
- Encryption Algorithm
- Key
- Symmetric Encryption
- Video Conferencing
- Checksum
- Error Detection
- Even Parity
- Hamming Code
- Odd Parity
- Application Log
- Lock
- Wildcard Character
- YMODEM
- LaTeX
- Data Center Container
- Spot Cooling
- The Green Grid
- Bus
- Pentium 4
- Blade Server
- Bogon
- Egress Traffic
- Ingress Traffic
- Peering
- Domain Migration
- Packet Collision Rate
- Governance Plan
- Roaming
- Modulation Fallback
- ARccOS
- Compulsory License
- Black Hole
- Bridge Router
- Hub (Computing)
- Inbound Filters
- Component
- Copyleft
- Data Set
- Data Type
- Fault Tolerance
- Remote Desktop
- Ingres
- PostgreSQL
- Algorithm
- Choke Packet
- Flag
- Flow Control
- Macro
- Tweaking
- Key Escrow
- Leech
- Malicious Code
- Masquerade Attack
- Password Cracking
- Polymorphic Virus
- Secure Server
- Token
- Load Balancing
- Proxy Server
- SharePoint Records Management
- Clickwrap Agreement
- Range
- Database Row
- G.723
- G.727
- G.7xx
- Parallel Processing
- Clipboard
- SELECT (Databases)
- Storage Virtualization
- Autodiscovery
- Mashboard
- Mirror Site
- Linked Data
- Tag
- Boot Disk
- Volume
- Site Map
- Dock
- Root
- Null
- Primary Key
- Standby
- Interleaving
- Query
- Asynchronous Transmission
- Carrier
- Composite Key
- Data Architecture
- Data Mapping
- Data Portability
- Data Transformation
- FileMaker Pro
- Flat File Database
- Foreign Key
- Indexing
- List Processing
- Magnetic Tape
- Makefile
- Paradox
- Rollback
- Site Survey
- Trunking
- Undelete
- UPDATE
- Upstream
- Work Flow
- X Terminal
- X.500
- Information Security Audit
- Authorization
- Biometrics
- Dictionary
- Data Validation
- Hungarian Notation
- Round Robin
- Synchronization
- Workload
- Contingency Plan
- Decoding
- Two-Factor Authentication
- Grid Storage
- Problem Management
- Removable Media
- Data Classification
- Columnar Database
- Data Federation Technology
- Virtual Database
- Cost Management
- Drizzle
- Kanban
- Predictive Modeling
- Project Planning
- Waterfall Model
- Talking Translator
- Cold Buffer
- Content Filtering
- Hashing
- Depository
- Elegant Solution
- Midrange
- Data Aggregation
- Pivot Table
- Data Preprocessing
- Microsoft Amalga
- Data Archiving
- Data Availability
- Data Corruption
- Data Warehouse Appliance
- Database Replication
- Data Hiding
- Green Data Center
- Layer 3
- Network Coding
- Progressive Download
- Silicon Photonics
- Hashtag
- Data Card
- Electro-Optical Fingerprint Recognition
- Hard Drive Encryption
- Netfinity
- Network Convergence
- Distributed Search
- Canonicalization
- Data Binding
- E-Speak
- Single-Sourcing
- Stream Recorder
- Fault Management
- Dumb Network
- Stack Smashing
- Flooding
- File Sharing
- Instance
- Cabinet File
- GLib
- HTM
- Nroff
- Transaction
- Defense In Depth
- Risk Analysis
- System Migration
- Lag
- Communications Server
- Congestion
- Data Driven
- Data Redundancy
- Digital Dashboard
- Flow Chart
- Lotus Notes
- Network Database
- Relation
- Data Repository
- Data Storage
- Datastore
- Document Management
- Message Board
- Remote Computer
- Transaction Isolation Level
- Backup and Recovery
- Database Administration
- Database Object
- Companding
- Backpressure
- Accreditation
- Fuzzy Matching
- Katmai
- Mobile Search
- Patent Pending
- Indexer
- Isolated Storage
- .INI File
- J2EE Application Deployer and Administrator
- Business Components
- Entity Bean
- Warm Server
- Browser-Safe Palette
- DB2
- Default Values - Database
- Vulnerability Discovery and Remediation
- Webby
- Brownfield
- Parameterized Query
- Database Encryption and Decryption
- Perfect RAM
- Relationship
- Database Report
- Self-Join
- Snapshot Replication
- SQL Agent
- SQL Profiler
- Transactional Replication
- Unique Constraint
- Relational Model
- Software Architecture
- SQLite
- Merge Replication
- Cybersecurity
- RSS Feed
- Address Book
- Binary Number System
- Data Encapsulation
- Program Layer
- Compartmented Security Mode
- Contamination
- Information Security Policy
- Information Sharing
- Hot Site
- Bates Number
- Derivative Work Right
- Fair Dealing
- GNUnet
- Load File
- Right Holder
- Section 508
- Licensing Collective
- Render Right
- System Checkpoint
- Utility Right
- Digital Watermarking
- Digital Rights
- Cryptoanarchism
- Mobility Management
- Multihoming
- Vertical Handover
- Data De-Identification
- RSA Identification Verification for Health Care
- Data Perturbation
- Electronic Audit Trail
- Automated Treatment Plan
- Electronic Patient Release of Information Form
- Incentive Payment
- Health Care Data Encryption
- Traffic Contract
- Hold Down Timer
- One-to-Many Relationship
- View
- Metacomputing
- Backup on the Web
- Non-Relational Database
- .NET Data Provider
- Video Graphics Array (VGA) Connector
- Installation Restore Point
- Integrated Search
- Adaptive Route
- File Hosting Service
- Collection
- Packet Analyzer
- Data Extraction
- Data Loading
- Flat Database
- ANSI Bomb
- Card Skimming
- Extraction
- Ambient Networks
- Security Event Management
- Single Source Proof Of Concept
- Federal Information Technology Strategic Plan of 2011-2015
- Asynchronous Groupware
- Supervisor Call
- CIA Triad of Information Security
- IT Risk Management
- Simple Directmedia Layer
- Database Engine Tuning Advisor
- Flat File
- Isolation
- Disk Mirroring
- R/3 Client/Server Application
- WebFOCUS
- Informatica PowerCenter
- QualityStage
- Information Analyzer
- Data Profiling
- Teradata
- Channel Bank
- Interconnection Agreement
- Mono Silverlight
- T-3 Carrier
- Static Members
- Challenge-Response Authentication
- Rsync
- Biometric Engine
- Static Routing
- Disk Enclosure
- Data Filtering
- Enterprise Data Warehouse
- Clustered Index
- Connectionless Service
- Fire Walking
- Burndown Chart
- FastIP
- Hub (Networking)
- Affiliate Reporting Service
- Cloud Application Portability
- Asynchronous Messaging
- Amazon SimpleDB
- Automated Data Tiering
- Cloud Database
- Deep Analytics
- Google Fusion Tables
- MobileMe
- Werner Buchholz
- Google Data Liberation Front
- Zoho Office Suite
- URL Snooping
- Lights Out Data Center
- Biometric Data
- Google Takeout
- Heartbeat Cable
- Primary Server
- Automatic Failover
- Pre-Emption
- File Locking
- Data Collision
- Armstrong's Axiom
- Many-to-Many Relationship
- Managed Heap
- Accounting
- Embedded SQL
- Zero-Bit Insertion
- Log Shipping
- Multiple Regression
- Not-Null Constraint
- Database Concurrency
- Consistency
- Cursor
- Durability
- Facility Management
- Stack Buffer
- View (MVC)
- Model (MVC)
- Data Dictionary
- Data Integrity
- Cloning Software
- Anonymization
- Availability Management
- Conceptual Data Model
- Data Archaeology
- Data Audit
- Data Augmentation
- Data Consolidation
- Data Forensics
- Data Enrichment
- Data Lineage
- Data Matching
- Data Purging
- Intelligent Matching
- Data Cholesterol
- Data Smog
- Semantic Repository
- Data Integration
- Speech Analytics
- Data Administration
- Data Flow Model
- Petabyte Age
- Object Metamodeling
- Client
- Data Intelligence
- Semi-Structured Data
- NIST 800-53
- Data Sandbox
- Schema Matching
- Identity Resolution
- Data Steward
- Data Ownership
- Google BigTable
- 3V's
- Database Backup
- Cognitive Analytics
- Data Architect
- Data Center Design
- Data Center Management Software
- Data Acquisition
- Data Acquisition System
- Data Center Storage
- Apache Sqoop
- Apache Slider
- Data Lake
- Data Visualization
- Data Visualization Software
- Cloud Data Protection
- Data Protection Policy
- Test Data Management
- Data Management Strategy
- Data Science
- Datafication
- In-Memory Data Management
- Unstructured Data Analysis
- Informatics
- Parallel Data Analysis
- Redis
- Semantic Data Model
- Data Discovery
- Database Performance Monitoring
- Database Performance Management
- Graph Database
- Metadata Management
- Database Schema
- Infonomics
- Copy Data
- Curation
- Apache Kafka
- Data Verification
- Data Boomerang
- Hot Data
- Warm Data
- Cold Data
- Hash List
- Sorting Algorithm
- Data Wrangling
- Data Annotation
- Data Engineer
- Machine Learning Workflow
- Address-of Operator (&)
- First Normal Form (1NF)
- Second Normal Form (2NF)
- Two-Phase Commit (2PC)
- Third Normal Form (3NF)
- Fourth Normal Form (4NF)
- Attribute-Based Access Control (ABAC)
- Automatic Backup System (ABS)
- Atomicity Consistency Isolation Durability (ACID)
- Application Compatibility Toolkit (ACT)
- ActiveX Data Objects (ADO)
- Automated Fingerprint Identification System (AFIS)
- Advanced Function Presentation (AFP)
- Automatic Identification and Data Capture (AIDC)
- Automated Litigation Support (ALS)
- Application Management (AM)
- Amazon Virtual Private Cloud (Amazon VPC)
- Advanced Microcontroller Bus Architecture (AMBA)
- Automatic Memory Management (AMM)
- Artificial Neural Network (ANN)
- Adaptive Packet Assembly (APA)
- Automatic Repeat reQuest (ARQ)
- American Standard for Information Interchange (ASCII)
- Abstract Syntax Notation One (ASN.1)
- Application Service Provider (ASP)
- American Society for Testing and Materials Continuity of Care Record (ASTM-CCR)
- Acceptable Use Policy (AUP)
- Automatic Identification (Auto ID)
- Bearer Channel (B Channel)
- Boyce-Codd Normal Form (BCNF)
- Business Event Management (BEM)
- Business Intelligence (BI)
- Business Intelligence 2.0 (BI 2.0)
- Business Intelligence Software (BI Software)
- Business Object (BO)
- Business Process Automation (BPA)
- Business Technology Management (BTM)
- Business Information Warehouse (BW)
- Computer-Aided Engineering (CAE)
- Computer-Aided Manufacturing (CAM)
- Campus Area Network (CAN)
- Content Addressable Storage (CAS)
- CD-Read Writable (CD-RW)
- Customer Data Integration (CDI)
- Customer Data Management (CDM)
- Content Delivery Network (CDN)
- Continuous Data Protection (CDP)
- Cellular Digital Packet Data (CDPD)
- Call Detail Record (CDR)
- Converged Enhanced Ethernet (CEE)
- Customer Feedback Management (CFM)
- Change Mode (chmod)
- Configuration Management (CM)
- Configuration Management Database (CMDB)
- Collaborative Master Data Management (CMDM)
- Computerized Maintenance Management System (CMMS)
- Course Management System (CMS)
- Content Management System (CMS)
- Card Not Present (CNP)
- COMPUter SECurity (COMPUSEC)
- Content-Aware Data Loss Prevention (Content-Aware DLP)
- Central Processing Unit (CPU)
- Customer Relationship Management Analytics (CRM Analytics)
- Create, Retrieve, Update and Delete (CRUD)
- Critical Security Parameter (CSP)
- Customer Self Service (CSS)
- Comma-Separated Values File (CSV)
- Computer Telephony Integration (CTI)
- Control Unit (CU)
- Controlled Unclassified Information (CUI)
- Disk-to-Disk (D2D)
- Desktop Administration (DA)
- Digital Asset Management (DAM)
- Data Management Association (DAMA)
- Ethernet Data Acquisition (DAQ)
- DataStage Parallel Extender (DataStage PX)
- Database (DB)
- Database Manager (DB Manager)
- Database Management System (DBMS)
- Data Center Manager (DCM)
- Distributed Component Object Model (DCOM)
- Double-density (DD)
- Development Data Platform (DDP)
- Disk-Based Data Protection (DDP)
- Distributed Data Protection (DDP)
- Double Data Rate (DDR)
- Deep Reinforcement Learning (Deep RL)
- Demultiplex (DEMUX)
- Distributed File System (DFS)
- Data Governance (DG)
- Data Governance Office (DGO)
- Data Link Control (DLC)
- Data Link Switching (DLSw)
- Digital Millennium Copyright Act (DMCA)
- Data Management and Integration (DMI)
- Data Manipulation Language (DML)
- Data Management Software (DMS)
- Dialed Number Identification Service (DNIS)
- Data Obfuscation (DO)
- Data Quality as a Service (DQaaS)
- Data Quality Management (DQM)
- Distributed Relational Database Architecture (DRDA)
- Data Robot (Drobo)
- Decision Support System (DSS)
- Data Transformation Services (DTS)
- Diffusing Update Algorithm (DUAL)
- Multimedia Home Platform (DVB-MHP or MHP)
- Digital Video Broadcasting - Terrestrial (DVB-T)
- Data Warehouse (DW)
- Dynamic Database Management System (Dynamic DBMS)
- Electronic Ink (E Ink)
- Electronic Discovery (E-Discovery)
- Expansion Port (E_Port)
- Enterprise Archive File (EAR)
- Error Control (EC)
- Error Correction Code (ECC)
- Enterprise Content Management (ECM)
- Enterprise Collaboration System (ECS)
- Extra-high Density (ED)
- Electronic Data Interchange (EDI)
- Entity Data Model (EDM)
- Enterprise Data Management (EDM)
- Enterprise Data Quality (EDQ)
- Electronic Health Record (EHR)
- Enterprise Information Archiving (EIA)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Enterprise Information Integration (EII)
- Electronic Image Stabilization (EIS)
- Electronic Medication Administration Records (eMAR)
- Enterprise Metadata Management (EMM)
- Telephone Number Mapping (ENUM)
- Entity-Relationship Model (ER Model)
- Entity Resolution and Analysis (ER&A)
- Emergency Responder Electronic Health Record (ER-EHR)
- Entity-Relationship Diagram (ERD)
- Enterprise Service Bus (ESB)
- Electronically Stored Information (ESI)
- Event-Stream Processing (ESP)
- Executive Support System (ESS)
- Extract Transform Load (ETL)
- First Come, First Served (FCFS)
- Food and Drug Administration (FDA)
- Fixed Disk (FDISK)
- Federal Intrusion Detection Network (FIDNET)
- Federated Identity Management (FIM)
- Federal Information Security Management Act (FISMA)
- Frames Per Second (FPS)
- Functional Specification (FS)
- Generic Access Network (GAN)
- Global File System (GFS)
- Google File System (GFS)
- Gramm-Leach-Bliley Act (GLB Act or GLBA)
- Globalization Management System (GMS)
- IEEE 488 (GPIB)
- GPRS Tunneling Protocols (GTP)
- High Availability (HA)
- Hardware Abstraction Layer (HAL)
- Hadoop Distributed File System (HDFS)
- High-Speed Data Acquisition (High-Speed DAQ)
- Health Information Organization (HIO)
- Host Identity Protocol (HIP)
- Home Location Register (HLR)
- High-Performance File System (HPFS)
- Hierarchical Storage Management (HSM)
- Input/Output (I/O)
- Information Assurance (IA)
- Information Architecture (IA)
- Infrastructure as a Service (IaaS)
- Internet Architecture Board (IAB)
- Identity and Access Management (IAM)
- Intelligent Character Recognition (ICR)
- Integrated Drive Electronics (IDE)
- Intrusion Detection System (IDS)
- Index (IDX)
- Integrated Financial Management System (IFMS)
- Intelligent Information Management (IIM)
- Information Life Cycle Management (ILM)
- Information Management (IM)
- Information Management System (IMS)
- Inverse Multiplexer (IMUX)
- Internet Network Operations Center (INOC)
- Interrupt Request (IRQ)
- Information Systems or Information Services (IS)
- Information Security (IS)
- Information System (IS)
- International Standard Works Code (ISWC)
- Incompatible Timesharing System (ITS)
- Internet Exchange Point (IXP)
- Java Database Connectivity Connector (JDBC Connector)
- Java Database Connectivity Interface (JDBC Interface)
- Karnaugh Map (K-Map)
- Kilobit (Kb or kbit)
- Knowledge Discovery in Databases (KDD)
- Knowledge Base (klog)
- Light Intensity Modulated Direct Overwrite (LIMDOW)
- Linear Tape Open (LTO)
- Logical Unit Number (LUN)
- Media Access Control (MAC)
- Megabit (Mb)
- Multidimensional Database (MDB)
- Multidimensional Database Management System (MDBMS)
- Master Data Management (MDM)
- Master Data Management Software (MDM Software)
- Media Dispatch Protocol (MDP)
- Managed Document Service (MDS)
- Microsoft Foundation Class Library (MFC Library)
- Managed Print Service (MPS)
- Mini SQL (mSQL)
- Microsoft XML Core Services (MSXML)
- Meaningful Use (MU)
- Mutual Exclusion (Mutex)
- Multiplexer (MUX)
- Multivalued Field (MVF)
- Mobile Virtual Network Enabler (MVNE)
- Microsoft Exchange Server (MXS)
- NetBIOS Session Service (NBSS)
- National Information Assurance Partnership (NIAP)
- Network-based Intrusion Prevention System (NIPS)
- Non Return to Zero Inverted (NRZI)
- New Technology File System (NTFS)
- Operational Database (ODB)
- Open Database Connectivity (ODBC)
- Open Document Format (ODF)
- Open Document Management API (ODMA)
- Operational Data Store (ODS)
- Online Analytical Processing (OLAP)
- Online Transaction Processing (OLTP)
- Office of the National Coordinator - Authorized Testing and Certification Body (ONC-ATCB)
- Office of the National Coordinator for Health Information Technology (ONCHIT)
- Object-Oriented Database (OODB)
- Object-Oriented Database Management System (OODBMS)
- Oracle Database (Oracle DB)
- Object-Relational Database Management System (ORDBMS)
- Open Rights Group (ORG)
- Organic Search Engine Optimization (Organic SEO)
- Object-Based Storage Device (OSD)
- Open Shortest Path First (OSPF)
- Phase Change Memory (PCM)
- Product Data Management (PDM)
- Penetration Testing (Pen-Testing)
- Program Evaluation Review Technique Chart (PERT Chart)
- Protected Health Information (PHI)
- Personally Identifiable Information (PII)
- Product Information Management (PIM)
- Public Key Infrastructure (PKI)
- Product Lifecycle Management (PLM)
- Practice Management Software (PMS)
- Pages Per Minute (PPM)
- PRojects IN Controlled Environments (PRINCE2)
- PostScript (PS)
- Phase-Shift Keying (PSK)
- Quality In, Quality Out (QIQO)
- Quick Response Code (QR Code)
- Redundant Array of Independent Disks (RAID)
- Relational Database (RDB)
- Relational Database Management System (RDBMS)
- Radio Frequency Identification Reader (RFID Reader)
- Regional Health Information Exchange (RHIE)
- Referential Integrity (RI)
- Remote Monitoring (RMON)
- Records Management System (RMS)
- Recovery Point Objective (RPO)
- Recovery Time Objective (RTO)
- System Administrator (SA)
- Software Asset Management (SAM)
- Service Advertising Protocol (SAP)
- Security by Design (SbD)
- Supervisory Control and Data Acquisition (SCADA)
- Supply Chain Management (SCM)
- Supply Chain Visibility (SCV)
- Service Data Objects (SDO)
- Secure Electronic Transaction (SET)
- Secure File Transfer Protocol (SFTP)
- Simple File Transfer Protocol (SFTP)
- System Global Area (SGA)
- Security Information Management (SIM)
- Switched Multimegabit Data Service (SMDS)
- Storage Management Initiative Specification (SMI-S)
- Service-Oriented Architecture Repository (SOA Repository)
- Social Master Data Management (Social MDM)
- Service-Oriented Modeling and Architecture (SOMA)
- Serial Presence Detect (SPD)
- Sequenced Packet Protocol (SPP)
- Statistical Package for the Social Sciences (SPSS)
- Structured Query Language (SQL)
- Storage Resource Management (SRM)
- Static Database Management System (Static DBMS)
- Spanning Tree Protocol (STP)
- Apache Subversion (SVN)
- System Log (Syslog)
- Transact-SQL (T-SQL)
- Tape Backup Unit (TBU)
- Trusted Computing Base (TCB)
- Time Division Multiple Access (TDMA)
- Time-Domain Reflectometry (TDR)
- Trivial File Transfer Protocol (TFTP)
- Transaction Process System (TPS)
- Usenet Death Penalty (UDP)
- Unified Endpoint Management (UEM)
- Value-Added Network (VAN)
- Visual Basic (VB)
- Virtual Channel Identifier (VCI)
- Virtual Desktop Infrastructure (VDI)
- Virtual Data Room (VDR)
- Very High Speed Digital Subscriber Line (VDSL)
- Virtual Master Data Management (Virtual MDM or VMDM)
- Visitor Location Register (VLR)
- Vocabulary Management Solution (VMS)
- Virtual Tape Library (VTL)
- Web Content Management (WCM)
- Extensible Stylesheet Language Transformations (XSLT)