Saturday, August 14, 2010

ATM (asynchronous transfer mode)

a communication switch that handles interface speeds ranging from 25 million to 622 million bps. it multiplexes data streams onto the same BN by using cell rely techniques.

ADSL (asymmetric DSL)

a data link layer technology that provides high sped communication over traditional telephone lines. a DSL modem is used to provide three channels: a traditional voice channel, an upstream channel for communication from the client to the ISP and a downstream channel for communicating from the ISP to the client.

ARQ (automtic repeat request)

a system employing an error detecting code o convinced that any error initiates a repetition of the transmission of the incorrectly received data or massage

ARPANET

one of the early packet switching networks, it was a predecessor of the internet

ARCnet

attached resource computing network. a proprietary token-bus LAN developed by the datapoint corporation.

ASP (Application Service Provider)

it develops an application system and companies purchase the service without ever installing the software on their computers. they simply use the service

apple talk

a set of communication protocols that defines networking for apple computers

ANSI (American Nationl standards institute)

the principal standards setting body in the United States. It is a no-profit, non-governmental organization.

advanced research and development network operation center(ARDNOC)

the agency founded by the Canadian government to develop new internet 2 technologies and protocols.

AES (Advanced Encryption Standard)

a new single key encryption standard authorized by NIST that replaces DES

ARP (Address Resolution Protocol)

a network layer protocol standard for data link lyer address resolution requests

Address

a coded representation of the destination of data or of the originating source.

ACM (Association for computing machinery)

it is an association of computer professionals

Access point

the prt of the wireless LAN that connects the LAN to other network

Sunday, August 8, 2010

Time Stamping

Time Stamping in an application, the procedure of marking each database record with the date and time of the database operation such as insert, update, or delete

MANET

Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks. This can be a standard Wi-Fi connection, or another medium, such as a cellular or satellite transmission.

ISO

Stands for "International Organization for Standardization." These standards lead to a more efficient, safer, and cleaner development of products. It also leads to more standardized products for consumers.
The ISO is important to the computer industry, since the organization standardizes many of the technologies used by your computer hardware and software.

ASCII

Stands for "American Standard Code for Information Interchange." ASCII is the universal standard for the numerical codes computers use to represent all upper and lower-case letters, numbers, and puctuation. Without ASCII, each type of computer would use a different way of representing letters and numbers, causing major chaos for computer programmers

Bookmark

Similar to a real-life bookmark, an Internet bookmark acts as a marker for a Web site. In most browsers, to create a bookmark, you simply choose "Add Bookmark" from the Bookmarks menu when you're at a page that you'd like to bookmark.

DDM

Direct digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means. It may be used to supplement or even replace traditional physical marketing strategies. The primary channels of direct digital marketing include e-mail and the Web.

Firewall

The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next.
A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall.Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.

FTP

Stands for "File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. There are two types of FTP sites: closed(which requires users to have an account and an password) and anonymous(which permits anyone to use them)

PPP

Stands for "Point to Point Protocol." It is the Internet standard for dial-up modem connections. PPP is a set of rules that defines how your modem exchanges packets of data with other systems on the Internet.

IP

Stands for "Internet Protocol." It provides a standard set of rules for sending and receiving data through the Internet.

SNMP

Stands for "Simple Network Management Protocol." SNMP is used for exchanging management information between network devices. For example, SNMP may be used to configure a router or simply check its status.

ODBC

Stands for "Open Database Connectivity." With all the different types of databases available, such as Microsoft Access, Filemaker, and MySQL, it is important to have a standard way of transferring data to and from each kind of database.
Any application that supports ODBC can access information from an ODBC-compatible database, regardless of what database management system the database uses.
For a database to be ODBC-compatible, it must include an ODBC database driver. This allows other applications to connect to and access information from the database with a standard set of commands. The driver translates standard ODBC commands into commands understood by the database's proprietary system.

IMAP

Internet Mail Access Protocol is an application-layer protocol standard that covers communication between an e-mail client and an e-mail server

POP

Post Office Protocol (POP) is an application-layer standard used to communicate between the client and the e-mail server

Peer to Peer Communication

1. Communication between two or more processes or programs by which both ends of the session exchange data with equal privilege.
2. Communication between two or more network nodes in which either side can initiate session because no primary-secondary relationship exists.

CICS

CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.

Data Archiving

Data archiving is the process of moving data that is no longer actively used to a separate data storage device for long-term retention. Data archives consist of older data that is still important and necessary for future reference, as well as data that must be retained for regulatory compliance.

CMDM

Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company. SAP describes CMDM as a revolutionary product designed to solve the widespread challenges of data integration from multiple systems, physical locations, and diverse vendors

Business Intelligence Dashboard

A business intelligence dashboard is a data visualization tool that displays the current status of metrics and key performance indicators (KPIs) for an enterprise. Dashboards consolidate and arrange numbers, metrics and sometimes performance scorecards on a single screen. They may be tailored for a specific role and display metrics targeted for a single point of view or department. The essential features of a BI dashboard product include a customizable interface and the ability to pull real-time data from multiple sources.

Business Information Warehouse

Business Information Warehouse (sometimes shortened to "Business Warehouse" or BW) is a packaged, comprehensive business intelligence product centered around a data warehouse that is optimized for (but not limited to) the R/3 environment from SAP.

CFML

CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input. Along with the usual Hypertext Markup Language (HTML) tags that determine page layout and appearance, the page creator uses CFML tags to bring in content based on the results of a database query or user input.

Wednesday, August 4, 2010

sparsity

indicates the condition in the data warehouse in which every fact table record in a dimensional model is not necessarily filled with data.

scalability

the ability to support increasing number of users in cost effective increments without adversely affecting business operations.

Massively parallel processing

shared nothing architecture for parallel server hardware where memory and disks are not shared among the processor nodes.

Mission critical system

A Software application that is absolutely essential for the continued operation of an organization.

Tuesday, August 3, 2010

JRE

Stands for "Java Runtime Environment" and may also be written "Java RTE."The JRE software provides a runtime environment in which Java programs can be executed, just like software programs that have been fully compiled for the computer's processor. JRE software is available as both a standalone environment and a Web browser plug-in, which allows Java applets to be run within a Web browser.

KDE

Stands for "K Desktop Environment." KDE is a contemporary desktop environment for Unix systems. It is a Free Software project developed by hundreds of software programmers across the world. Both the KDE source code and the software itself are made freely available to the public.
KDE's primary benefit is the modern graphical user interface GUI it provides for Unix workstations. While Unix systems are notoriously difficult for novice users to operate, KDE makes it possible for the average user to work on a Unix system

Kernel

To understand what a kernel is, you first need to know that today's operating systems are built in "layers." Each layer has different functions such as serial port access, disk access, memory management, and the user interface itself. The base layer, or the foundation of the operating system, is called the kernel. The kernel provides the most basic "low-level" services, such as the hardware-software interaction and memory management. The more efficient the kernel is, the more efficiently the operating system will ru

Horizontal Market Software

A horizontal market is one that supplies goods to a variety of industries instead of just one. Therefore, horizontal market software is software that can be used by several different types of industries.
For example, word processing and spreadsheet programs are horizontal market applications because they can be used by many types of businesses and consumers.

EPS

Stands for "Encapsulated PostScript." EPS is a PostScript image file format that is compatible with PostScript printers and is often used for transferring files between various graphics applications. EPS files will print identically on all PostScript-compatible printers and will appear the same in all applications that can read the PostScript format.

Source Code

Every computer program is written in a programming language, such as Java, C/C++, or Perl. These programs include anywhere from a few lines to millions of lines of text, called source code.
Source code, often referred to as simply the "source" of a program, contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function. Programmers may also add comments to their source code that explain sections of the code. These comments help other programmers gain at least some idea of what the source code does without requiring hours to decipher it.

Open Source

When a software program is open source, it means the program's source code is freely available to the public. Unlike commercial software, open source programs can be modified and distributed by anyone and are often developed as a community rather than by a single organization. Since the source code of an open source program can be modified by anyone, it makes sense that the software is also free to download and use.

Firmware

Firmware is a software program or set of instructions programmed on a hardware device. It provides the necessary instructions for how the device communicates with the other computer hardware. Firmware is typically stored in the flash ROM of a hardware device

Dashboard

Dashboard is a user-interface feature Apple introduced with the release of Mac OS X 10.4 Tiger. It allows access to all kinds of "widgets" that show the time, weather, stock prices, phone numbers, and other useful data.

Android

Android is a mobile operating system developed by Google. It is used by several smartphones, such as the Motorola Droid, the Samsung Galaxy, and Google's own Nexus One.
The Android operating system (OS) is based on the open Linux kernel. Unlike the iPhone OS, Android is open source, meaning developers can modify and customize the OS for each phone. Therefore, different Android-based phones may have different graphical user interfaces GUIs even though they use the same OS.

top 10 Datawarehouse companies

Bitpipe
Bitpipe, Inc. (www.bitpipe.com) is the leading source of in-depth information technology content including white papers, product literature, webcasts, analyst reports, and case studies.


--------------------------------------------------------------------------------

Dell Inc., Microsoft and AMD
Dell™, Microsoft® and AMD® work together to attain one primary goal - simplify IT.


--------------------------------------------------------------------------------

Dolphin
Dolphin makes crucial business operations such as procure-to-pay, order-to-cash, and data archiving, and management, run better and smarter for organizations using SAP solutions.


--------------------------------------------------------------------------------

Global Knowledge
Global Knowledge is the worldwide leader in IT & Business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning...


--------------------------------------------------------------------------------

IBM
At IBM, we strive to lead in the creation, development and manufacture of the industry's most advanced information technologies, including computer systems, software, networking systems, storage devices and microelectronics.


--------------------------------------------------------------------------------

Intel
For more than three decades, Intel Corporation has developed technology enabling the computer and Internet revolution that has changed the world.


--------------------------------------------------------------------------------

Noetix Corporation
Noetix provides instant operational reporting and packaged analytics for Oracle Applications. Our patented technology and lean architecture deliver the lowest cost BI solution to acquire, implement, and maintain.


--------------------------------------------------------------------------------

Oracle Corporation
Oracle (NASDAQ: ORCL) is the world's most complete, open, and integrated business software and hardware systems company. For more information about Oracle, visit oracle.com


--------------------------------------------------------------------------------

SAP America, Inc.
Founded in 1972, SAP is the recognized leader in providing collaborative business solutions for all types of industries and for every major market.


--------------------------------------------------------------------------------

Talend
The recognized leader in open source data integration, Talend makes data integration solutions available to organizations of all sizes, for all integration needs: integration between operational systems, ETL, migration, and data quality.


--------------------------------------------------------------------------------

Vertica Systems
Vertica Systems is the market innovator for high-performance analytic database management systems. Vertica has developed a remarkably fast data warehouse database that queries large, fast-growing volumes of data 50x-200x faster than most other databases.

Sunday, August 1, 2010

Redundancy

Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.Redundancy has a negative connotation when the duplication is unnecessary or is simply the result of poor planning.

PL/SQL

In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL). The purpose of PL/SQL is to combine database language and procedural programming language. The basic unit in PL/SQL is called a block, which is made up of three parts: a declarative part, an executable part, and an exception-building part.
Because PL/SQL allows you to mix SQL statements with procedural constructs, it is possible to use PL/SQL blocks and subprograms to group SQL statements before sending them to Oracle for execution. Without PL/SQL, Oracle must process SQL statements one at a time and, in a network environment, this can affect traffic flow and slow down response time. PL/SQL blocks can be compiled once and stored in executable form to improve response time.

Meta data

Metadata is data that describes other data, and is mainly used for electronically-portrayed information. Metadata helps collect the who, what, where, when, why and how of data and presents it all in a short summary. The summarized information can help display the basics about the data, which can make finding and identifying it easier.

Metadata can be used for a number of different kinds of data files, such as images, videos, text documents and web pages. The metadata descriptions of each file can provide information such as the file’s size, when it was created, what language it is in, and what programs were used to create or modify it, as well as a short description of the file’s contents

CMDB

A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective.

SQL

SQL (Structured Query Language) is a standard interactive and programming language for getting information from and updating a database. Although SQL is both an ANSI and an ISO standard, many database products support SQL with proprietary extensions to the standard language. Queries take the form of a command language that lets you select, insert, update, find out the location of data, and so forth. There is also a programming interface

Restore Point

A restore point is a saved "snapshot" of a computer's data at a specific time. Restore points are a component of the Windows System Restore utility. By creating a restore point, you can save the state of the operating system and your own data so that if future changes cause a problem, you can restore the system and your data to the way it was before the changes were made. When a restore point is established, your computer creates a backup copy of all data at that particular time.

DKNF

Domain/key normal form (DKNF). A key uniquely identifies each row in a table. A domain is the set of permissible values for an attribute. By enforcing key and domain restrictions, the database is assured of being freed from modification anomalies. DKNF is the normalization level that most designers aim to achieve.

3NF

Third normal form (3NF)- At the second normal form, modifications are still possible because a change to one row in a table may affect data that refers to this information from another table. For example, using the customer table just cited, removing a row describing a customer purchase (because of a return perhaps) will also remove the fact that the product has a certain price. In the third normal form, these tables would be divided into two tables so that product pricing would be tracked separately.

2NF

Second normal form (2NF). At this level of normalization, each column in a table that is not a determiner of the contents of another column must itself be a function of the other columns in the table. For example, in a table with three columns containing customer ID, product sold, and price of the product when sold, the price would be a function of the customer ID (entitled to a discount) and the specific product.

1NF

First normal form (1NF). This is the "basic" level of normalization and generally corresponds to the definition of any database, namely:

* It contains two-dimensional tables with rows and columns.
* Each column corresponds to a sub-object or an attribute of the object represented by the entire table.
* Each row represents a unique instance of that sub-object or attribute and must be different in some way from any other row (that is, no duplicate rows are possible).
* All entries in any column must be of the same kind. For example, in the column labeled "Customer," only customer names or numbers are permitted.

Normalization

In creating a database, normalization is the process of organizing it into tables in such a way that the results of using the database are always unambiguous and as intended. Normalization may have the effect of duplicating data within the database and often results in the creation of additional tables.

Normalization is typically a refinement process after the initial exercise of identifying the data objects that should be in the database, identifying their relationships, and defining the tables required and the columns within each table.

KBA

Knowledge-based authentication (KBA) is an authentication scheme in which the user is asked to answer at least one "secret" question. KBA is often used as a component in multifactor authentication (MFA) and for self-service password retrieval.

JOLAP

OLAP (Java Online Analytical Processing) is a Java application-programming interface (API) for the Java 2 Platform, Enterprise Edition (J2EE) environment that supports the creation, storage, access, and management of data in an online analytical processing (OLAP) application. Hyperion, IBM, and Oracle initiated the development of JOLAP intending it to be a counterpart to Java Database Connectivity (JDBC) specifically for OLAP.

CDO

Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
CDO is really an additional scripting interface to an existing Microsoft messaging model, the Messaging Application Programming Interface (MAPI). Collaborative Data Objects are made available through two CDO libraries. These libraries let you address programmable messaging objects (including folders, messages, recipient addresses, attachments, and other messaging components). These objects are extensions to the programmable objects, such as forms and controls, that are offered as part of Microsoft's Visual Basic program development environment.

Customer Segmentation

Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests, spending habits, and so on. Using segmentation allows companies to target groups effectively, and allocate marketing resources to best effect.
Customer segmentation procedures include: deciding what data will be collected and how it will be gathered; collecting data and integrating data from various sources; developing methods of data analysis for segmentation; establishing effective communication among relevant business units (such as marketing and customer service) about the segmentation; and implementing applications to effectively deal with the data and respond to the information it provides.

Mainframe

A mainframe is an ultra high-performance computer made for high-volume, processor-intensive computing. They are typically used by large businesses and for scientific purposes. The term originally referred to the large cabinets that housed the central processing unit and main memory of early computers

Ad Hoc Network

Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.
Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). If the network is set up for a longer period of time, it is just a plain old local area network (LAN).

Analytic Database

An analytic database is a read-only system that stores historical data on business metrics such as sales performance and inventory levels. The information is updated on a regular basis to incorporate recent transaction data from an organization’s operational systems. An analytic database is specifically designed to support business intelligence (BI) and analytic applications, typically as part of a data warehouse or data mart.

Saturday, July 31, 2010

Bitmapped Indexing

Bitmapped Indexing is a sophisticated and fast indexing technique using the binary values of individual bits to indicate values of attributes in relational database tables. This technique is very effective in a data warehouse for a low-selectivity data, that is, for attributes that have only a few indexed values

Baseboars Management Controller (BMC)

A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.

Blue Cloud

Blue Cloud is an approach to shared infrastructure developed by IBM. The goal of IBM's Blue Cloud is to provide services that automate fluctuating demands for IT resources. The set of all the connections involved is sometimes called the "cloud."
The primary objective of the Blue Cloud project is to facilitate distributed computing within data centers, rather than performing tasks on individual machines or through remote servers.

BIC (Business Information Center)

A business information center (BIC) is an incubator for entrepreneur s designed to offer information, education, training and access to other services at one location. BICs provide free on-site counseling, training, workshops, networking opportunities and other resources that address the needs of start up companies.

Business Impact Analysis

Business impact analysis (BIA) is an essential component of an organization's business continuance plan; it includes an exploratory component to reveal any vulnerabilities, and a planning component to develop strategies for minimizing risk.

BGP (border Gateway Protcol)

BGP (Border Gateway Protocol) is a protocol for exchanging routing information between gateway hosts (each with its own router) in a network of autonomous systems. BGP is often the protocol used between gateway hosts on the Internet.

BBS (Bulletin Bord System)

A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.

BAPI (Business Application Programming Interface)

BAPI (Business Application Programming Interface) is a set of interfaces to object-oriented programming methods that enable a programmer to integrate third-party software into the proprietary R/3 product from SAP.

BAM (Business activity monitor)

Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency. The BAM paradigm can be used to evaluate external as well as internal factors.

backplane

A backplane is an electronic circuit board containing circuitry and sockets into which additional electronic devices on other circuit boards or cards can be plugged; in a computer, generally synonymous with or part of the motherboard.

Back Door

A back door is a means of access to a computer program that bypasses security mechanisms.
A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes.

Front-end & Back-end

Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
A "front-end" application is one that application users interact with directly.
A "back-end" application or program serves indirectly in support of the front-end services, usually by being closer to the required resource or having the capability to communicate with the required resource.

Thursday, July 29, 2010

Snowflake Schema

A normalized version of the STAR schema in which dimension tables are partially or fully normalized. Not generally recommended because it compromises query performance and simplicity for understanding.

Surrogate Key

It is an artificial key field, usually with system-assigned sequential numbers, used in the dimensional model to link a dimension table to the fact table. In the dimensional table, the surrogate key is the primary key which becomes a foreign key in the fact table.

STAR Schema

STAR Schema is the arrangement of the collection of fact and dimensions tables in the dimensional data model, resembling a star formation, with the fact table placed in the middle surrounded by the dimension tables. Each dimension table is in a one-to-many relationship with the fact table.

Referential Integrity

Referential Integrity refers to two relational tables that are directly related. Referential Integrity between related tables is established if non-null values in the foreign key field of the child table are primary key values in the parent table.

MOLAP

Multidimensional Online Analytical Processing is an analytical processing technique in which multidimensional data cubes are created and stored in separate proprietary databases.

ROLAP

Relational Online Analytical Processing(ROLAP) is an alternative to the MOLAP (Multidimensional OLAP) technology. While both ROLAP and MOLAP analytic tools are designed to allow analysis of data through the use of a multidimensional data model, ROLAP differs significantly in that it does not require the pre-computation and storage of information. Instead, ROLAP tools access the data in a relational database and generate SQL queries to calculate information at the appropriate level when an end user requests it.

HOLAP

Hybrid Online Analytical Processing is an approach to analytical processing that combines the MOLAP and ROLAP techniques. HOLAP allows storing part of the data in a MOLAP store and another part of the data in a ROLAP store. The degree of control that the cube designer has over this partitioning varies from product to product

EIS (Executive Information System)

Application specially designed for senior executives to perform information look up and trend analysis.

Database

A repository where an ordered and integrated collection of the enterprise data is stored for computer processing an information sharing.

BLOB (Binary Large Object)

Very large binary representation of multimedia objects that can be stored and used in some enhanced relational databases.

Alert System

A software system that notifies and events take place such as some business indicator exceeding a present threshold value.

Agent Technology

A technology where specialized software modules act to produce desired results based on specified events. this software is structurally transparent user.

Crosstab

It refers to cross tabulation of data in tabular format with totals of coluns and row for summarization and analysis

Clustering

A method of keeping database files physically close to one another on the storage media for improving performance through sequential pref-etch operations.

Knowledge Management

A computing environment for accumulating encoding, storing and managing enterprise knowledge.

Indexing

The method for speeding up the database access by creating index files that point of data files.

GUI (Graphical User Interface)

A graphical user interface (GUI)is a type of user interface item that allows people to interact with programs in more ways than typing.

DSS (Decision Support System)

Decision support systems constitute a class of computer-based information systems including knowledge-based systems that support decision-making activities.

Client/ Server Computing

Client–server model of computing is a distributed application structure that partitions tasks or workloads between service providers, called servers, and service requester, called clients

CGI (Common Gateway Interface)

The Common Gateway Interface (CGI) is a standard that defines how web-server software can delegate the generation of web-pages to a text-based application.

Tuesday, July 27, 2010

DBMS

A Database Management System (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of a database. It allows organizations to place control of database development in the hands of database administrators (DBAs) and other specialists. A DBMS is a system software package that helps the use of integrated collection of data records and files known as databases. It allows different user application programs to easily access the same database.Thus it is a software system to store, access, maintain, manage and safeguard data in database.

CIO

Chief Information Officer is a executive who heads the information services division of an organization. The CIO, usually reporting directly to the CEO, has the responsibility for all the organization's computing and data communications.

DDL

A Data Definition Language or Data Description Language (DDL) is a computer language for defining data structures. DDL is a component in database management system used for defining data structures in the data dictionary.

Data Dictionary

A data dictionary is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format". Thus data dictionary is a catalog or directory in a database management system that stores data structures and relationships

CRM

Customer Relationship Management (CRM) refers to the set of procedures and computer applications designed to manage and improve customer service in an enterprise. Data Warehousing, with integrated data about each customer, is suitable for CRM

Data Mining

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform the data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery.

Data Mart

A data mart is a subset of an organizational data store, usually oriented to a specific purpose or major data subject that may be distributed to support business needs. Data marts are analytical data stores designed to focus on specific business functions for a specific community within an organization. Data marts are often derived from subsets of data in a data warehouse, though in the bottom-up data warehouse design methodology the data warehouse is created from the union of organizational data marts.

CORBA

Common Object Request Broker Architecture(CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together. CORBA is useful because it enables separate pieces of software written in different languages and running on different computers to work together as a single application or set of services. More specifically, CORBA is a mechanism in software for normalizing the method-call semantics between application objects that reside either in the same address space (application) or remote address space (same host, or remote host on a network)

CASE

Computer Aided Software Engineering (CASE) is the scientific application of a set of tools and methods to a software system which is meant to result in high quality, defect-free and maintainable software products. It also refers to methods for the development of information systems together with automated tools that can be used in the software development process

OLAP

Online analytical processing, or OLAP is an approach to answer multi-dimensional analytical queries. OLAP is part of the broader category of business intelligence which also encompasses relational reporting and data mining. The typical applications of OLAP are in business reporting for sales, marketing, management reporting, business process management(BPM), budgeting and forecasting, financial reporting and similar areas. Database configured for OLAP use a multi-dimensional data model, allowing for complex analytical and ad-hoc queries with a rapid execution time. They borrow aspects of navigational databases and hierarchical databases that are faster than relational databases.

Monday, July 26, 2010

ACT

Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment. The Toolkit can also be used to diagnose and fix problems that may be related to compatibility.

ACD

An Automatic Call Distributor (ACD) is a telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions. Many companies offering sales and service support use ACDs to validate callers, make outgoing responses or calls, forward calls to the right party, allow callers to record messages, gather usage statistics, balance the use of phone lines, and provide other services.
ACDs often provide some form of Automatic Customer/Caller Identification (ACIS) such as that provided by Direct Inward Dialing (DID), Dialed Number Identification Service (DNIS), or Automatic Number Identification (ANI).

Data Aggregation

Data aggregation is any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis. A common aggregation purpose is to get more information about particular groups based on specific variables such as age, profession, or income. The information about such groups can then be used for Web site personalization to choose content and advertising likely to appeal to an individual belonging to one or more groups for which data has been collected.

B-tree

A B-tree is a method of placing and locating files (called records or keys) in a database. (The meaning of the letter B has not been explicitly defined.) The B-tree algorithm minimizes the number of times a medium must be accessed to locate a desired record, thereby speeding up the process.
B-trees are preferred when decision points, called nodes, are on hard disk rather than in random-access memory (RAM).

ADO

ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.

ACPI

ACPI (Advanced Configuration and Power Interface) is an industry specification for the efficient handling of power consumption in desktop and mobile computers. ACPI specifies how a computer's basic input/output system, operating system, and peripheral devices communicate with each other about power usage.
ACPI is in part a response to global concerns about energy conservation and environmental control.

API

An application programming interface (API) is an interface implemented by a software program which enables it to interact with other software. It facilitates interaction between different software programs similar to the way the user interface facilitates interaction between humans and computers. An API is implemented by applications, libraries, and operating systems to determine their vocabularies and calling conventions, and is used to access their services.

SDLC

The Systems Development Life Cycle (SDLC), or Software Development Life Cycle is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems.

Data

The term data refers to groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.
Data are often viewed as the lowest level of abstraction from which information and knowledge are derived.
Raw data refers to a collection of numbers, characters, images or other outputs from devices that collect information to convert physical quantities into symbols, that are unprocessed.

Database

A database consists of an organized collection of data for one or more uses, typically in digital form. One way of classifying databases involves the type of their contents.