Big Data

  • Showing 1-50 of 229 items
  • 1
  • 2
  • 3
  • ...
  • 5
  • >>
  1. The Top 5 IBM Shareholders

    Learn more about the largest stakeholders of IBM and the role they have played in the company's growth in the software and ...
  2. Adware

    Adware is software that displays advertising on a computer, redirects search results to advertising websites and collects ...
  3. Data Loss

    Data loss occurs when valuable and/or sensitive information on a computer is compromised due to theft, human error, viruses, ...
  4. Robotic Process Automation (RPA)

    Robotic process automation (RPA) refers to software that can be easily programmed to do basic tasks across applications just ...
  5. Malware

    Malware is a software designed to allow an outside party access to a computer without the knowledge of the computer owner.
  6. Structured Repackaged Asset-Backed Trust Security - STRATS

    A structured repackaged asset-backed trust security (STRATS) is a derivative pairing asset-backed securities with an interest ...
  7. EdTech

    EdTech refers to software designed to enhance teacher-led learning in classrooms and improve students' education outcomes. ...
  8. Massively Open Online Course (MOOC)

    A massively online open course (MOOC) is a learning module or series of modules that are accessible over the internet at ...
  9. SEO (Search Engine Optimization)

    SEO (Search Engine Optimization) aims to draw the greatest amount of traffic possible to a website by bringing it to the ...
  10. Business Software & Services Industry ETF

    A business software and services ETF is an exchange-traded fund (ETF) that invests in business software companies to replicate ...
  11. ASC X9

    ASC X9 was established by the American National Standards Institute to develop, establish, maintain and promote financial ...
  12. Web 2.0

    Web 2.0 describes the current state of the web, with more user-generated content and usability for end users, compared to ...
  13. Wombat

    A wombat is a type of financial software used by financial institutions for high-speed market data and messaging.
  14. WSJ's Vigna on Data Privacy & Facebook's Monopoly

    Beyond its uses for cryptocurrency, can blockchain help prevent unauthorized data mining and redistribution by decentralizing ...
  15. eIDV (Electronic Identity Verification)

    eIDV (Electronic Identity Verification) is the use of public and private databases to quickly confirm whether an individual ...
  16. Open Source

    Open source refers to a program with source code that can be modified or enhanced by anyone.
  17. What happens when crypto-bros and big banks collide?

    What do the world's largest banks and manifesto-clutching cypherpunks have in common? A quest for enhanced information security ...
  18. What's Stopping Blockchain from Mainstream Adoption?

    WSJ markets reporter Paul Vigna discusses what's stopping blockchain​​​​​​​ from catapulting into mainstream use.
  19. Data Anonymization

    Data anonymization seeks to protect private or sensitive data by deleting or encrypting personally identifiable information ...
  20. Geolocation

    Geolocation is the ability to track a device’s whereabouts using GPS, cell phone towers, WiFi access points or a combination ...
  21. Mass Payment

    Mass payment is a method of paying multiple recipients online simultaneously.
  22. Peer-to-Peer (P2P) Insurance

    Peer-to-Peer (P2P) insurance is a risk sharing network where a group of individuals pool their premiums together to insure ...
  23. Digital Transaction

    A digital transaction is a seamless system involving one or more participants, where transactions are effected without the ...
  24. Open Banking

    Open Banking is a system that provides a user with a network of financial institutions’ data through the use of application ...
  25. Micropayment

    Micropayments are payments of less than a dollar (and in some cases a fraction of a cent) that are usually made online.
  26. Collaborative Economy

    A collaborative economy is a marketplace where consumers rely on each other instead of large companies to meet their wants ...
  27. Insurtech

    Insurtech refers to the use of technology innovations designed to squeeze out savings and efficiency from the current insurance ...
  28. Customer Information File (CIF)

    A Customer Information File (CIF) is a computerized file that stores all pertinent information about a bank customer's personal ...
  29. RAM Scraping Attack

    A RAM scraping attack is a type of malware intrusion of a point-of-sale computer that is designed to steal large pools of ...
  30. What are the different types of price discrimination?

    Learn the difference between the three major types of price discrimination and how each is used in practical business applications.
  31. Skip Account

    A skip account refers to a borrower who defaults on a loan or skips out on repayment by moving without providing a correct ...
  32. S-Score

    An S-Score is a numerical value that shows how consumers and investors feel about a company, stock, ETF, sector or index ...
  33. Health Insurance Portability and Accountability Act (HIPAA)

    Health Insurance Portabiilty and Accountability ACT (HIPAA) was an act created by the U.S Congress in 1996 to protect privacy ...
  34. American Association Of Insurance Services (AAIS)

    The American Association of Insurance Services is an advisory organization that develops insurance policy forms and loss ...
  35. Development To Policyholder Surplus

    Development to policyholder surplus is the ratio of an insurer’s loss reserve development to its policyholders’ surplus. ...
  36. Nonadmitted Balance

    A non-admitted balance is an item on an insurer’s balance sheet that represents reinsured liabilities for which the reinsurer ...
  37. Brand Potential Index (BPI)

    The brand potential index (BPI) is the correlation between a brand's development index and its market development index for ...
  38. Apple App Store

    The Apple App Store is a digital distribution platform where customers can buy and download digital software and applications.
  39. Peak Pricing

    Peak pricing is a form of congestion pricing where customers pay an additional fee during periods of high demand.
  40. Runoff

    Runoff used to refer to the procedure of printing the end-of-day prices for every stock on an exchange onto ticker tape. ...
  41. Core Retail Sales

    Core retail sales refers to aggregate retail sales in the U.S. excluding automobile and gasoline sales, which are excluded ...
  42. Macroprudential Analysis

    Macroprudential analysis is a method of economic analysis that evaluates the health, soundness and vulnerabilities of a financial ...
  43. Intermarket Analysis

    Intermarket analysis looks at related asset classes or financial markets to determine their strength or weakness.
  44. Sine Wave

    A sine wave is a geometric waveform that oscillates (moves up, down or side-to-side) periodically, and is defined by the ...
  45. Core Durable Goods Orders

    Core durable goods orders refers to new orders for U.S. core durable goods, which are the total durable goods orders, excluding ...
  46. NY Empire State Index

    The NY Empire State Index is a seasonally adjusted index that tracks the results of the Empire State Manufacturing Survey. ...
  47. Doxing

    Doxing is the act of intentionally publishing someone’s private information or identity online without their permission. ...
  48. Noise

    In a broad analytical context, noise refers to information or activity that confuses or misrepresents genuine underlying ...
  49. GDP Gap

    GDP gap is the forfeited output of a country's economy resulting from the failure to create sufficient jobs for all those ...
  50. Search Cost

    Search cost is the time, energy and money expended by a consumer who is researching a product or service for purchase.
  • Showing 1-50 of 229 items
  • 1
  • 2
  • 3
  • ...
  • 5
  • >>
Trading Center