-
1 telemetry data
"Data that shows how partner products are used including where, how often, with which other software and hardware. This helps them identify user needs and experiences as well as potential marketing and product improvement opportunities over time. Partners and Microsoft can better understand what happens between planning, lab testing, sales data, and real world scenarios over time." -
2 ar-sa يحدث
"An interval of time used by of a zone to determine how often to check if their zone data needs to be refreshed. When the refresh interval expires, the secondary master checks with its source for the zone to see if its zone data is still current or if it needs to be updated using a zone transfer. This interval is set in the SOA (start-of-authority) resource record for each zone." -
3 refresh interval
"An interval of time used by of a zone to determine how often to check if their zone data needs to be refreshed. When the refresh interval expires, the secondary master checks with its source for the zone to see if its zone data is still current or if it needs to be updated using a zone transfer. This interval is set in the SOA (start-of-authority) resource record for each zone." -
4 retry interval
"The time, in seconds after the refresh interval expires, used by secondary masters of a zone to determine how often to try and retry contacting its source for zone data to see if its replicated zone data needs to be refreshed. This interval is set in the for each zone." -
5 telemetry
"Data that shows how partner products are used including where, how often, with which other software and hardware. This helps them identify user needs and experiences as well as potential marketing and product improvement opportunities over time. Partners and Microsoft can better understand what happens between planning, lab testing, sales data, and real world scenarios over time." -
6 ar-sa مسؤول المجال
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
7 error detection
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
8 symmetric encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
9 secret key encryption
"An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data." -
10 persona
"A fictional reality, collecting together real data describing the important characteristics of a particular user group in a fictional character. A persona describes the typical skills, abilities, needs, desires, working habits, tasks,and backgrounds of a particular set of users." -
11 SRK
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
12 storage root key
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
13 Web Analytics
"A set of features that provides data analysis and reporting on Web traffic, search, and SharePoint assets. This information can be used to tailor systems to meet users’ needs, optimize how they use and discover information, and to create targeted content." -
14 dialog
A type of process that displays the input forms and the data that a user needs at each step while interacting with a customer or following a process that requires user input. -
15 app listing
"The description data of a single app that is rendered for display in the consumer side of the store. It consists of several pages of info that provide a composite view of all the details a consumer needs to determine if they want to buy the app. An app listing typically includes the app’s name, the publisher’s name, language support, device support, price tier, screen shots, age rating and customer reviews. The web-based version of this is called an app listing page."
См. также в других словарях:
Data modeling — The data modeling process. The figure illustrates the way data models are developed and used today. A conceptual data model is developed based on the data requirements for the application that is being developed, perhaps in the context of an… … Wikipedia
Data processing — otheruses|Data entry clerk Data processing is any computer process that converts data into information or knowledge. [i.e. data processing can be any computer operation or series of operations performed on data to get insightful information.] The … Wikipedia
Data cleansing — Not to be confused with Sanitization (classified information). Data cleansing, data cleaning, or data scrubbing is the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database. Used… … Wikipedia
Needs assessment — is a systematic process for determining and addressing needs, or gaps between current conditions and desired conditions or wants . The discrepancy between the current condition and wanted condition must be measured to appropriately identify the… … Wikipedia
Data Center Ethernet — (also known as Converged Enhanced Ethernet) describes an enhanced Ethernet that will enable convergence of various applications in data centers (LAN, SAN, and HPC) onto a single interconnect technology.Today data centers deploy different networks … Wikipedia
Data administration — or data resource management is an organizational function working in the areas of information systems and computer science that plans, organizes, describes and controls data resources. Data resources are usually as stored in databases under a… … Wikipedia
Data Intensive Computing — is a class of parallel computing applications which use a data parallel approach to processing large volumes of data typically terabytes or petabytes in size and typically referred to as Big Data. Computing applications which devote most of their … Wikipedia
Data management — comprises all the disciplines related to managing data as a valuable resource. Contents 1 Overview 2 Topics in Data Management 3 Body Of Knowledge 4 Usage … Wikipedia
Data architecture — in enterprise architecture is the design of data for use in defining the target state and the subsequent planning needed to achieve the target state. It is usually one of several architecture domains that form the pillars of an enterprise… … Wikipedia
Data-centric programming language — defines a category of programming languages where the primary function is the management and manipulation of data. A data centric programming language includes built in processing primitives for accessing data stored in sets, tables, lists, and… … Wikipedia
Data exchange — is the process of taking data structured under a source schema and actually transforming it into data structured under a target schema, so that the target data is an accurate representation of the source data[citation needed]. Data exchange is… … Wikipedia