Saturday, August 14, 2010
ATM (asynchronous transfer mode)
a communication switch that handles interface speeds ranging from 25 million to 622 million bps. it multiplexes data streams onto the same BN by using cell rely techniques.
ADSL (asymmetric DSL)
a data link layer technology that provides high sped communication over traditional telephone lines. a DSL modem is used to provide three channels: a traditional voice channel, an upstream channel for communication from the client to the ISP and a downstream channel for communicating from the ISP to the client.
ARQ (automtic repeat request)
a system employing an error detecting code o convinced that any error initiates a repetition of the transmission of the incorrectly received data or massage
ARCnet
attached resource computing network. a proprietary token-bus LAN developed by the datapoint corporation.
ASP (Application Service Provider)
it develops an application system and companies purchase the service without ever installing the software on their computers. they simply use the service
ANSI (American Nationl standards institute)
the principal standards setting body in the United States. It is a no-profit, non-governmental organization.
advanced research and development network operation center(ARDNOC)
the agency founded by the Canadian government to develop new internet 2 technologies and protocols.
AES (Advanced Encryption Standard)
a new single key encryption standard authorized by NIST that replaces DES
ARP (Address Resolution Protocol)
a network layer protocol standard for data link lyer address resolution requests
Sunday, August 8, 2010
Time Stamping
Time Stamping in an application, the procedure of marking each database record with the date and time of the database operation such as insert, update, or delete
MANET
Stands for "Mobile Ad Hoc Network." A MANET is a type of ad hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks. This can be a standard Wi-Fi connection, or another medium, such as a cellular or satellite transmission.
ISO
Stands for "International Organization for Standardization." These standards lead to a more efficient, safer, and cleaner development of products. It also leads to more standardized products for consumers.
The ISO is important to the computer industry, since the organization standardizes many of the technologies used by your computer hardware and software.
The ISO is important to the computer industry, since the organization standardizes many of the technologies used by your computer hardware and software.
ASCII
Stands for "American Standard Code for Information Interchange." ASCII is the universal standard for the numerical codes computers use to represent all upper and lower-case letters, numbers, and puctuation. Without ASCII, each type of computer would use a different way of representing letters and numbers, causing major chaos for computer programmers
Bookmark
Similar to a real-life bookmark, an Internet bookmark acts as a marker for a Web site. In most browsers, to create a bookmark, you simply choose "Add Bookmark" from the Bookmarks menu when you're at a page that you'd like to bookmark.
DDM
Direct digital marketing, also known as "DDM," is a type of marketing that is done exclusively through digital means. It may be used to supplement or even replace traditional physical marketing strategies. The primary channels of direct digital marketing include e-mail and the Web.
Firewall
The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next.
A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall.Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.
A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall.Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.
FTP
Stands for "File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. There are two types of FTP sites: closed(which requires users to have an account and an password) and anonymous(which permits anyone to use them)
PPP
Stands for "Point to Point Protocol." It is the Internet standard for dial-up modem connections. PPP is a set of rules that defines how your modem exchanges packets of data with other systems on the Internet.
IP
Stands for "Internet Protocol." It provides a standard set of rules for sending and receiving data through the Internet.
SNMP
Stands for "Simple Network Management Protocol." SNMP is used for exchanging management information between network devices. For example, SNMP may be used to configure a router or simply check its status.
ODBC
Stands for "Open Database Connectivity." With all the different types of databases available, such as Microsoft Access, Filemaker, and MySQL, it is important to have a standard way of transferring data to and from each kind of database.
Any application that supports ODBC can access information from an ODBC-compatible database, regardless of what database management system the database uses.
For a database to be ODBC-compatible, it must include an ODBC database driver. This allows other applications to connect to and access information from the database with a standard set of commands. The driver translates standard ODBC commands into commands understood by the database's proprietary system.
Any application that supports ODBC can access information from an ODBC-compatible database, regardless of what database management system the database uses.
For a database to be ODBC-compatible, it must include an ODBC database driver. This allows other applications to connect to and access information from the database with a standard set of commands. The driver translates standard ODBC commands into commands understood by the database's proprietary system.
IMAP
Internet Mail Access Protocol is an application-layer protocol standard that covers communication between an e-mail client and an e-mail server
POP
Post Office Protocol (POP) is an application-layer standard used to communicate between the client and the e-mail server
Peer to Peer Communication
1. Communication between two or more processes or programs by which both ends of the session exchange data with equal privilege.
2. Communication between two or more network nodes in which either side can initiate session because no primary-secondary relationship exists.
2. Communication between two or more network nodes in which either side can initiate session because no primary-secondary relationship exists.
CICS
CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
Data Archiving
Data archiving is the process of moving data that is no longer actively used to a separate data storage device for long-term retention. Data archives consist of older data that is still important and necessary for future reference, as well as data that must be retained for regulatory compliance.
CMDM
Collaborative Master Data Management (CMDM) is an integration tool from SAP, the German software company. SAP describes CMDM as a revolutionary product designed to solve the widespread challenges of data integration from multiple systems, physical locations, and diverse vendors
Business Intelligence Dashboard
A business intelligence dashboard is a data visualization tool that displays the current status of metrics and key performance indicators (KPIs) for an enterprise. Dashboards consolidate and arrange numbers, metrics and sometimes performance scorecards on a single screen. They may be tailored for a specific role and display metrics targeted for a single point of view or department. The essential features of a BI dashboard product include a customizable interface and the ability to pull real-time data from multiple sources.
Business Information Warehouse
Business Information Warehouse (sometimes shortened to "Business Warehouse" or BW) is a packaged, comprehensive business intelligence product centered around a data warehouse that is optimized for (but not limited to) the R/3 environment from SAP.
CFML
CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input. Along with the usual Hypertext Markup Language (HTML) tags that determine page layout and appearance, the page creator uses CFML tags to bring in content based on the results of a database query or user input.
Wednesday, August 4, 2010
sparsity
indicates the condition in the data warehouse in which every fact table record in a dimensional model is not necessarily filled with data.
scalability
the ability to support increasing number of users in cost effective increments without adversely affecting business operations.
Massively parallel processing
shared nothing architecture for parallel server hardware where memory and disks are not shared among the processor nodes.
Mission critical system
A Software application that is absolutely essential for the continued operation of an organization.
Tuesday, August 3, 2010
JRE
Stands for "Java Runtime Environment" and may also be written "Java RTE."The JRE software provides a runtime environment in which Java programs can be executed, just like software programs that have been fully compiled for the computer's processor. JRE software is available as both a standalone environment and a Web browser plug-in, which allows Java applets to be run within a Web browser.
KDE
Stands for "K Desktop Environment." KDE is a contemporary desktop environment for Unix systems. It is a Free Software project developed by hundreds of software programmers across the world. Both the KDE source code and the software itself are made freely available to the public.
KDE's primary benefit is the modern graphical user interface GUI it provides for Unix workstations. While Unix systems are notoriously difficult for novice users to operate, KDE makes it possible for the average user to work on a Unix system
KDE's primary benefit is the modern graphical user interface GUI it provides for Unix workstations. While Unix systems are notoriously difficult for novice users to operate, KDE makes it possible for the average user to work on a Unix system
Kernel
To understand what a kernel is, you first need to know that today's operating systems are built in "layers." Each layer has different functions such as serial port access, disk access, memory management, and the user interface itself. The base layer, or the foundation of the operating system, is called the kernel. The kernel provides the most basic "low-level" services, such as the hardware-software interaction and memory management. The more efficient the kernel is, the more efficiently the operating system will ru
Horizontal Market Software
A horizontal market is one that supplies goods to a variety of industries instead of just one. Therefore, horizontal market software is software that can be used by several different types of industries.
For example, word processing and spreadsheet programs are horizontal market applications because they can be used by many types of businesses and consumers.
For example, word processing and spreadsheet programs are horizontal market applications because they can be used by many types of businesses and consumers.
EPS
Stands for "Encapsulated PostScript." EPS is a PostScript image file format that is compatible with PostScript printers and is often used for transferring files between various graphics applications. EPS files will print identically on all PostScript-compatible printers and will appear the same in all applications that can read the PostScript format.
Source Code
Every computer program is written in a programming language, such as Java, C/C++, or Perl. These programs include anywhere from a few lines to millions of lines of text, called source code.
Source code, often referred to as simply the "source" of a program, contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function. Programmers may also add comments to their source code that explain sections of the code. These comments help other programmers gain at least some idea of what the source code does without requiring hours to decipher it.
Source code, often referred to as simply the "source" of a program, contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function. Programmers may also add comments to their source code that explain sections of the code. These comments help other programmers gain at least some idea of what the source code does without requiring hours to decipher it.
Open Source
When a software program is open source, it means the program's source code is freely available to the public. Unlike commercial software, open source programs can be modified and distributed by anyone and are often developed as a community rather than by a single organization. Since the source code of an open source program can be modified by anyone, it makes sense that the software is also free to download and use.
Firmware
Firmware is a software program or set of instructions programmed on a hardware device. It provides the necessary instructions for how the device communicates with the other computer hardware. Firmware is typically stored in the flash ROM of a hardware device
Dashboard
Dashboard is a user-interface feature Apple introduced with the release of Mac OS X 10.4 Tiger. It allows access to all kinds of "widgets" that show the time, weather, stock prices, phone numbers, and other useful data.
Android
Android is a mobile operating system developed by Google. It is used by several smartphones, such as the Motorola Droid, the Samsung Galaxy, and Google's own Nexus One.
The Android operating system (OS) is based on the open Linux kernel. Unlike the iPhone OS, Android is open source, meaning developers can modify and customize the OS for each phone. Therefore, different Android-based phones may have different graphical user interfaces GUIs even though they use the same OS.
The Android operating system (OS) is based on the open Linux kernel. Unlike the iPhone OS, Android is open source, meaning developers can modify and customize the OS for each phone. Therefore, different Android-based phones may have different graphical user interfaces GUIs even though they use the same OS.
top 10 Datawarehouse companies
Bitpipe
Bitpipe, Inc. (www.bitpipe.com) is the leading source of in-depth information technology content including white papers, product literature, webcasts, analyst reports, and case studies.
--------------------------------------------------------------------------------
Dell Inc., Microsoft and AMD
Dell™, Microsoft® and AMD® work together to attain one primary goal - simplify IT.
--------------------------------------------------------------------------------
Dolphin
Dolphin makes crucial business operations such as procure-to-pay, order-to-cash, and data archiving, and management, run better and smarter for organizations using SAP solutions.
--------------------------------------------------------------------------------
Global Knowledge
Global Knowledge is the worldwide leader in IT & Business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning...
--------------------------------------------------------------------------------
IBM
At IBM, we strive to lead in the creation, development and manufacture of the industry's most advanced information technologies, including computer systems, software, networking systems, storage devices and microelectronics.
--------------------------------------------------------------------------------
Intel
For more than three decades, Intel Corporation has developed technology enabling the computer and Internet revolution that has changed the world.
--------------------------------------------------------------------------------
Noetix Corporation
Noetix provides instant operational reporting and packaged analytics for Oracle Applications. Our patented technology and lean architecture deliver the lowest cost BI solution to acquire, implement, and maintain.
--------------------------------------------------------------------------------
Oracle Corporation
Oracle (NASDAQ: ORCL) is the world's most complete, open, and integrated business software and hardware systems company. For more information about Oracle, visit oracle.com
--------------------------------------------------------------------------------
SAP America, Inc.
Founded in 1972, SAP is the recognized leader in providing collaborative business solutions for all types of industries and for every major market.
--------------------------------------------------------------------------------
Talend
The recognized leader in open source data integration, Talend makes data integration solutions available to organizations of all sizes, for all integration needs: integration between operational systems, ETL, migration, and data quality.
--------------------------------------------------------------------------------
Vertica Systems
Vertica Systems is the market innovator for high-performance analytic database management systems. Vertica has developed a remarkably fast data warehouse database that queries large, fast-growing volumes of data 50x-200x faster than most other databases.
Bitpipe, Inc. (www.bitpipe.com) is the leading source of in-depth information technology content including white papers, product literature, webcasts, analyst reports, and case studies.
--------------------------------------------------------------------------------
Dell Inc., Microsoft and AMD
Dell™, Microsoft® and AMD® work together to attain one primary goal - simplify IT.
--------------------------------------------------------------------------------
Dolphin
Dolphin makes crucial business operations such as procure-to-pay, order-to-cash, and data archiving, and management, run better and smarter for organizations using SAP solutions.
--------------------------------------------------------------------------------
Global Knowledge
Global Knowledge is the worldwide leader in IT & Business training. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning...
--------------------------------------------------------------------------------
IBM
At IBM, we strive to lead in the creation, development and manufacture of the industry's most advanced information technologies, including computer systems, software, networking systems, storage devices and microelectronics.
--------------------------------------------------------------------------------
Intel
For more than three decades, Intel Corporation has developed technology enabling the computer and Internet revolution that has changed the world.
--------------------------------------------------------------------------------
Noetix Corporation
Noetix provides instant operational reporting and packaged analytics for Oracle Applications. Our patented technology and lean architecture deliver the lowest cost BI solution to acquire, implement, and maintain.
--------------------------------------------------------------------------------
Oracle Corporation
Oracle (NASDAQ: ORCL) is the world's most complete, open, and integrated business software and hardware systems company. For more information about Oracle, visit oracle.com
--------------------------------------------------------------------------------
SAP America, Inc.
Founded in 1972, SAP is the recognized leader in providing collaborative business solutions for all types of industries and for every major market.
--------------------------------------------------------------------------------
Talend
The recognized leader in open source data integration, Talend makes data integration solutions available to organizations of all sizes, for all integration needs: integration between operational systems, ETL, migration, and data quality.
--------------------------------------------------------------------------------
Vertica Systems
Vertica Systems is the market innovator for high-performance analytic database management systems. Vertica has developed a remarkably fast data warehouse database that queries large, fast-growing volumes of data 50x-200x faster than most other databases.
Sunday, August 1, 2010
Redundancy
Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.Redundancy has a negative connotation when the duplication is unnecessary or is simply the result of poor planning.
PL/SQL
In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL). The purpose of PL/SQL is to combine database language and procedural programming language. The basic unit in PL/SQL is called a block, which is made up of three parts: a declarative part, an executable part, and an exception-building part.
Because PL/SQL allows you to mix SQL statements with procedural constructs, it is possible to use PL/SQL blocks and subprograms to group SQL statements before sending them to Oracle for execution. Without PL/SQL, Oracle must process SQL statements one at a time and, in a network environment, this can affect traffic flow and slow down response time. PL/SQL blocks can be compiled once and stored in executable form to improve response time.
Because PL/SQL allows you to mix SQL statements with procedural constructs, it is possible to use PL/SQL blocks and subprograms to group SQL statements before sending them to Oracle for execution. Without PL/SQL, Oracle must process SQL statements one at a time and, in a network environment, this can affect traffic flow and slow down response time. PL/SQL blocks can be compiled once and stored in executable form to improve response time.
Meta data
Metadata is data that describes other data, and is mainly used for electronically-portrayed information. Metadata helps collect the who, what, where, when, why and how of data and presents it all in a short summary. The summarized information can help display the basics about the data, which can make finding and identifying it easier.
Metadata can be used for a number of different kinds of data files, such as images, videos, text documents and web pages. The metadata descriptions of each file can provide information such as the file’s size, when it was created, what language it is in, and what programs were used to create or modify it, as well as a short description of the file’s contents
Metadata can be used for a number of different kinds of data files, such as images, videos, text documents and web pages. The metadata descriptions of each file can provide information such as the file’s size, when it was created, what language it is in, and what programs were used to create or modify it, as well as a short description of the file’s contents
CMDB
A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective.
SQL
SQL (Structured Query Language) is a standard interactive and programming language for getting information from and updating a database. Although SQL is both an ANSI and an ISO standard, many database products support SQL with proprietary extensions to the standard language. Queries take the form of a command language that lets you select, insert, update, find out the location of data, and so forth. There is also a programming interface
Restore Point
A restore point is a saved "snapshot" of a computer's data at a specific time. Restore points are a component of the Windows System Restore utility. By creating a restore point, you can save the state of the operating system and your own data so that if future changes cause a problem, you can restore the system and your data to the way it was before the changes were made. When a restore point is established, your computer creates a backup copy of all data at that particular time.
DKNF
Domain/key normal form (DKNF). A key uniquely identifies each row in a table. A domain is the set of permissible values for an attribute. By enforcing key and domain restrictions, the database is assured of being freed from modification anomalies. DKNF is the normalization level that most designers aim to achieve.
3NF
Third normal form (3NF)- At the second normal form, modifications are still possible because a change to one row in a table may affect data that refers to this information from another table. For example, using the customer table just cited, removing a row describing a customer purchase (because of a return perhaps) will also remove the fact that the product has a certain price. In the third normal form, these tables would be divided into two tables so that product pricing would be tracked separately.
2NF
Second normal form (2NF). At this level of normalization, each column in a table that is not a determiner of the contents of another column must itself be a function of the other columns in the table. For example, in a table with three columns containing customer ID, product sold, and price of the product when sold, the price would be a function of the customer ID (entitled to a discount) and the specific product.
1NF
First normal form (1NF). This is the "basic" level of normalization and generally corresponds to the definition of any database, namely:
* It contains two-dimensional tables with rows and columns.
* Each column corresponds to a sub-object or an attribute of the object represented by the entire table.
* Each row represents a unique instance of that sub-object or attribute and must be different in some way from any other row (that is, no duplicate rows are possible).
* All entries in any column must be of the same kind. For example, in the column labeled "Customer," only customer names or numbers are permitted.
* It contains two-dimensional tables with rows and columns.
* Each column corresponds to a sub-object or an attribute of the object represented by the entire table.
* Each row represents a unique instance of that sub-object or attribute and must be different in some way from any other row (that is, no duplicate rows are possible).
* All entries in any column must be of the same kind. For example, in the column labeled "Customer," only customer names or numbers are permitted.
Normalization
In creating a database, normalization is the process of organizing it into tables in such a way that the results of using the database are always unambiguous and as intended. Normalization may have the effect of duplicating data within the database and often results in the creation of additional tables.
Normalization is typically a refinement process after the initial exercise of identifying the data objects that should be in the database, identifying their relationships, and defining the tables required and the columns within each table.
Normalization is typically a refinement process after the initial exercise of identifying the data objects that should be in the database, identifying their relationships, and defining the tables required and the columns within each table.
KBA
Knowledge-based authentication (KBA) is an authentication scheme in which the user is asked to answer at least one "secret" question. KBA is often used as a component in multifactor authentication (MFA) and for self-service password retrieval.
JOLAP
OLAP (Java Online Analytical Processing) is a Java application-programming interface (API) for the Java 2 Platform, Enterprise Edition (J2EE) environment that supports the creation, storage, access, and management of data in an online analytical processing (OLAP) application. Hyperion, IBM, and Oracle initiated the development of JOLAP intending it to be a counterpart to Java Database Connectivity (JDBC) specifically for OLAP.
CDO
Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
CDO is really an additional scripting interface to an existing Microsoft messaging model, the Messaging Application Programming Interface (MAPI). Collaborative Data Objects are made available through two CDO libraries. These libraries let you address programmable messaging objects (including folders, messages, recipient addresses, attachments, and other messaging components). These objects are extensions to the programmable objects, such as forms and controls, that are offered as part of Microsoft's Visual Basic program development environment.
CDO is really an additional scripting interface to an existing Microsoft messaging model, the Messaging Application Programming Interface (MAPI). Collaborative Data Objects are made available through two CDO libraries. These libraries let you address programmable messaging objects (including folders, messages, recipient addresses, attachments, and other messaging components). These objects are extensions to the programmable objects, such as forms and controls, that are offered as part of Microsoft's Visual Basic program development environment.
Customer Segmentation
Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests, spending habits, and so on. Using segmentation allows companies to target groups effectively, and allocate marketing resources to best effect.
Customer segmentation procedures include: deciding what data will be collected and how it will be gathered; collecting data and integrating data from various sources; developing methods of data analysis for segmentation; establishing effective communication among relevant business units (such as marketing and customer service) about the segmentation; and implementing applications to effectively deal with the data and respond to the information it provides.
Customer segmentation procedures include: deciding what data will be collected and how it will be gathered; collecting data and integrating data from various sources; developing methods of data analysis for segmentation; establishing effective communication among relevant business units (such as marketing and customer service) about the segmentation; and implementing applications to effectively deal with the data and respond to the information it provides.
Mainframe
A mainframe is an ultra high-performance computer made for high-volume, processor-intensive computing. They are typically used by large businesses and for scientific purposes. The term originally referred to the large cabinets that housed the central processing unit and main memory of early computers
Ad Hoc Network
Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.
Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). If the network is set up for a longer period of time, it is just a plain old local area network (LAN).
Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). If the network is set up for a longer period of time, it is just a plain old local area network (LAN).
Analytic Database
An analytic database is a read-only system that stores historical data on business metrics such as sales performance and inventory levels. The information is updated on a regular basis to incorporate recent transaction data from an organization’s operational systems. An analytic database is specifically designed to support business intelligence (BI) and analytic applications, typically as part of a data warehouse or data mart.
Subscribe to:
Comments (Atom)