-
1 data enrichment
"A feature that allows the user to choose an external data provider, and update the records in the CRM system based on the information from that data provider." -
2 Data Protection API
"A set of routines, protocols, and tools that provides information confidentiality to user and system processes by applying password-based cryptographic protection at the local operating system level." -
3 American Standard Code for Information Interchange
"A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or ""high"") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols."English-Arabic terms dictionary > American Standard Code for Information Interchange
-
4 sorting
"A method of arranging data based on the order of specified information. For example, records sorted by class would list all records within a class before moving to records in the next class." -
5 Simple Object Access Protocol
"A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging.""""Simple Object Access Protocol"" بروتوكول"English-Arabic terms dictionary > Simple Object Access Protocol
-
6 SOAP
"A simple, XML-based protocol for exchanging structured data and type information on the World Wide Web. The protocol is currently the de facto standard for XML messaging." -
7 Public Key Cryptography Standards
"A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc."English-Arabic terms dictionary > Public Key Cryptography Standards
-
8 Outlook Social Connector
"A set of features that incorporates elements of social networking into the Outlook experience. It provides relevant contextual information about the people whom users interact with in Outlook, based on local data (e-mail and calendar items) and social activity (news feeds and status updates)." -
9 OSC
"A set of features that incorporates elements of social networking into the Outlook experience. It provides relevant contextual information about the people whom users interact with in Outlook, based on local data (e-mail and calendar items) and social activity (news feeds and status updates)." -
10 early-launch boot driver
"An antimalware driver that loads early in the boot process, to evaluate the safety of the other drivers being loaded. Based on a comparison against historical data for those drivers, the antimalware driver returns information to the kernel, which makes initialization decisions for each driver." -
11 Early Launch Antimalware driver
"An antimalware driver that loads early in the boot process, to evaluate the safety of the other drivers being loaded. Based on a comparison against historical data for those drivers, the antimalware driver returns information to the kernel, which makes initialization decisions for each driver."English-Arabic terms dictionary > Early Launch Antimalware driver
-
12 ELAM driver
"An antimalware driver that loads early in the boot process, to evaluate the safety of the other drivers being loaded. Based on a comparison against historical data for those drivers, the antimalware driver returns information to the kernel, which makes initialization decisions for each driver."
См. также в других словарях:
Information visualization — the interdisciplinary study of the visual representation of large scale collections of non numerical information, such as files and lines of code in software systems [S.G. Eick (1994). Graphically displaying text . In: Journal of Computational… … Wikipedia
Data integration — involves combining data residing in different sources and providing users with a unified view of these data.[1] This process becomes significant in a variety of situations, which include both commercial (when two similar companies need to merge… … Wikipedia
Data warehouse — Overview In computing, a data warehouse (DW) is a database used for reporting and analysis. The data stored in the warehouse is uploaded from the operational systems. The data may pass through an operational data store for additional operations… … Wikipedia
Data virtualization — describes the process of abstracting disparate data sources (databases, applications, file repositories, websites, data services vendors, etc.) through a single data access layer (which may be any of several data access mechanisms). This… … Wikipedia
Information — as a concept has a diversity of meanings, from everyday usage to technical settings. Generally speaking, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning,… … Wikipedia
Data Intensive Computing — is a class of parallel computing applications which use a data parallel approach to processing large volumes of data typically terabytes or petabytes in size and typically referred to as Big Data. Computing applications which devote most of their … Wikipedia
Data Discovery and Query Builder — (DDQB) is a data abstraction technology, developed by IBM, that allows users to retrieve information from a data warehouse, in terms of the user s specific area of expertise instead of SQL. DDQB serves the user through a web based graphical user… … Wikipedia
Data-centric programming language — defines a category of programming languages where the primary function is the management and manipulation of data. A data centric programming language includes built in processing primitives for accessing data stored in sets, tables, lists, and… … Wikipedia
Information overload — refers to excess amounts of information being provided, making the processing and absorbing tasks very difficult for the individual because we cannot see the validity behind the information (Yang, 2003 [Yang, C.C. (2003) Decision Support Systems … Wikipedia
Data farming — is the process of using a high performance computer or computing grid to run a simulation thousands or millions of times across a large parameter and value space. The result of Data Farming is a “landscape” of output that can be analyzed for… … Wikipedia
Data mining — Not to be confused with analytics, information extraction, or data analysis. Data mining (the analysis step of the knowledge discovery in databases process,[1] or KDD), a relatively young and interdisciplinary field of computer science[2][3] is… … Wikipedia