Showing terms starting with D (346 terms)
Data Hierarchy
The systematic organization of data, often in a hierarchical form, based on a structure of data elements and their relationships.
Commonly used in General IT
Data Hygiene
The collective processes conducted to ensure the cleanliness of data.
Commonly used in General IT, AI
Data Imputation
The process of replacing missing data with substituted values in order to maintain the integrity of a dataset for analysis.
Commonly used in AI, General IT
Data Inconsistency
The presence of differing data about the same object in different places.
Commonly used in General IT, Security
Data Index
A data structure that improves the speed of data retrieval operations on a database at the cost of additional writes and storage space to maintain the structure.
Commonly used in General IT
Data Ingestion
The process of obtaining and importing data for immediate use or storage in a database.
Commonly used in General IT, AI
Data Ingestion Pipeline
The collection of processes and technologies involved in capturing, processing, and storing data for further use or analysis.
Commonly used in General IT, AI
Data Insight
The understanding and actionable information that can be derived from data analysis.
Commonly used in AI, General IT
Data Integration
The process of combining data from different sources into a single, unified view.
Commonly used in Networking, General IT
Data Integrity
The maintenance of, and the assurance of the accuracy and consistency of, data over its entire lifecycle.
Commonly used in Security, Cybersecurity, General IT
Data Interaction
The ways in which users query, visualize, and interact with data within applications or software environments.
Commonly used in General IT, AI
Data Interchange Standard
A standard that defines a specific format for exchanging data between software applications or within an organization.
Commonly used in General IT, Networking
Data Interoperability
The ability of different systems, devices, and applications to connect and communicate in a coordinated way, share data, and use the information that has been exchanged.
Commonly used in General IT, Networking
Data Isolation
The process of keeping data separate to prevent unauthorized access or accidental sharing of sensitive information.
Commonly used in Security, Cybersecurity
Data Journalism
The practice of gathering and analyzing large datasets to support and convey news stories in a compelling and understandable manner.
Commonly used in General IT, AI
Data Lake
A storage repository that holds a vast amount of raw data in its native format until it is needed.
Commonly used in General IT, AI
Data Lake Analytics
The process of analyzing data stored in a data lake, often using big data processing tools and techniques.
Commonly used in AI, General IT
Data Lakehouse
A new data management architecture that combines the elements of data lakes and data warehouses.
Commonly used in General IT, AI
Data Leakage
The unauthorized transmission of data from within an organization to an external destination or recipient.
Commonly used in Security, Cybersecurity
Data Lifecycle
The series of stages through which data goes, from initial creation or acquisition to retirement or deletion.
Commonly used in General IT, Security
Data Lifecycle Management (DLM)
The process of managing the flow of an information system’s data from creation and initial storage to the time when it becomes obsolete and is deleted.
Commonly used in General IT, Security
Data Lineage
The process of understanding, recording, and visualizing data as it flows from data sources to consumption.
Commonly used in General IT, AI
Data Literacy
The ability to read, understand, create, and communicate data as information.
Commonly used in General IT, Education
Data Loading
The process of transferring data from one system or format into another, typically into a database or data warehouse.
Commonly used in General IT
Data Localization
The practice of storing data on any device that is physically present within the borders of a specific country, which is required by law in some jurisdictions.
Commonly used in Security, Cybersecurity
Data Lock-In
The difficulty of transferring data and services from one provider or platform to another, due to proprietary formats, technologies, or contractual restrictions.
Commonly used in General IT, Security
Data Loss
The process by which data is lost to the user, either by data corruption, data erasure, or data becoming inaccessible.
Commonly used in Security, Cybersecurity
Data Loss Prevention (DLP)
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Commonly used in Security, Cybersecurity
Data Management Platform (DMP)
A centralized computing system for collecting, integrating, managing, and analyzing large sets of structured and unstructured data from disparate sources.
Commonly used in General IT, AI
Data Manipulation Language (DML)
The subset of SQL used to add, update, or delete data in a database.
Commonly used in General IT
Data Mapping
The process of creating data element mappings between two distinct data models.
Commonly used in General IT, AI
Data Mart
A subset of a data warehouse focused on a particular line of business, department, or subject area.
Commonly used in General IT, Networking
Data Masking
The process of hiding original data with modified content (characters or other data).
Commonly used in Security, Cybersecurity
Data Mesh
A decentralized approach to data architecture and organizational design.
Commonly used in General IT, AI
Data Migration
The process of selecting, preparing, extracting, and transforming data and permanently transferring it from one computer storage system to another.
Commonly used in General IT
Data Minimization
The principle of collecting no more personal data than necessary.
Commonly used in Security, Cybersecurity
Data Mining
The process of discovering patterns and knowledge from large amounts of data.
Commonly used in AI, General IT
Data Model
An abstract model that organizes data elements and standardizes how they relate to one another and to the properties of real-world entities.
Commonly used in General IT, AI
Data Modeling
The process of creating a data model for the data to be stored in a database.
Commonly used in General IT, AI
Data Monetization
The process of using data to increase revenue, which includes direct selling of data or using data to improve business processes and decision making.
Commonly used in General IT, Business
Data Munging
Also known as data wrangling, the process of cleaning and unifying complex and messy data sets for easy access and analysis.
Commonly used in AI, General IT
Data Normalization
The process of organizing data in a database to reduce redundancy and improve data integrity.
Commonly used in General IT
Data Obfuscation
The process of deliberately degrading data quality or intelligence in order to obscure the source of the data.
Commonly used in Security, Cybersecurity
Data Onboarding
The process of importing and processing data from external sources into a new system or environment for further analysis and use.
Commonly used in General IT, AI
Data Ontology
A framework for specifying a shared and common understanding of data which can be used between people and across application systems.
Commonly used in AI, General IT
Data Operations (DataOps)
An automated, process-oriented methodology used by analytic and data teams to improve the quality and reduce the cycle time of data analytics.
Commonly used in General IT, AI
Data Orchestration
The automated movement and management of data across an organization’s various data platforms.
Commonly used in General IT, AI
Data Ownership
The rights and responsibilities that individuals or organizations have with respect to data collected, used, stored, or disseminated.
Commonly used in Security, General IT
Data Parsing
The process of analyzing a string of symbols, either in natural language or computer languages, according to the rules of a formal grammar.
Commonly used in AI, General IT
Data Partition
The division of a database or its elements into distinct independent parts to improve manageability, performance, or availability.
Commonly used in General IT, Networking