Big Data

  • Showing 1-50 of 161 items
  • 1
  • 2
  • 3
  • 4
  • >>
  1. WSJ's Vigna on Data Privacy & Facebook's Monopoly

    Beyond its uses for cryptocurrency, can blockchain help prevent unauthorized data mining and redistribution by decentralizing ...
  2. HIPAA Waiver of Authorization

    A HIPAA waiver of authorization is a legal document that allows an individual’s health information to be used or disclosed ...
  3. Cyber Identity

    Cyber identity refers to the personality or personalities that are created through a person’s online interactions.
  4. Descriptive Analytics

    Descriptive analytics refers to the interpretation of historical data to better understand changes that have happened in ...
  5. What happens when crypto-bros and big banks collide?

    What do the world's largest banks and manifesto-clutching cypherpunks have in common? A quest for enhanced information security ...
  6. Data-Directed Decision Making

    Data-directed decision making refers to using scientifically valid information to inform executive decisions.
  7. De-Anonymization

    De-anonymization is a reverse data mining technique that re-identifies encrypted information.
  8. Behavioral Analytics

    Behavioral analytics is an area of data analytics focuses on providing insight into the actions of people.
  9. Weak AI

    Weak AI is a machine intelligence that is limited to a specific or narrow area.
  10. Strong AI

    Strong AI is a type of machine intelligence that is equivalent to human intelligence.
  11. Machine Learning

    Machine learning is the concept that a computer program can learn and adapt to new data without human interference.
  12. Personally Identifiable Information (PII)

    Personally Identifiable Information (PII) is information that, when used alone or with other relevant data, can identify ...
  13. Predictive Modeling

    Predictive modeling is the process of using known results to create, process and validate a model that can be used to forecast ...
  14. Data Exhaust

    Data exhaust is the trail of information left behind as a result of a person’s digital activity.
  15. Data Analytics

    Data analytics is the science of drawing insights from raw information sources.
  16. Prescriptive Analytics

    Prescriptive analytics is the use of technology to help businesses make better decisions about how to handle specific situations ...
  17. General Data Protection Regulation (GDPR)

    The General Data Protection Regulation (GDPR) sets guidelines for the collection and processing of personal data of individuals ...
  18. Enterprise Information Management (EIM)

    Enterprise information management refers to the optimization, storage and processing of data created and used by a large ...
  19. Cloud Storage

    Cloud storage is a way for businesses and consumers to save data securely online so it can be easily shared and accessed ...
  20. Business Intelligence (BI)

    Business intelligence (BI) refers to the procedural and technical infrastructure that collects, stores and analyzes data ...
  21. First Notice Of Loss (FNOL)

    The First Notice of Loss (FNOL) is the initial report made to an insurance provider following a loss, theft, or damage of ...
  22. Data Science

    Data science is a field of Big Data which seeks to provide meaningful information from large amounts of complex data.
  23. Chief Technology Officer - CTO

    A chief technology officer is an executive who is responsible for the management of an organization's research and development, ...
  24. Top 10 Companies Owned by Amazon

    Learn about 10 of the most important companies that Amazon has acquired.
  25. Issuer Identification Number (IIN)

    The issuer identification number (IIN) is the first few digits of a payment card number issued by a financial institution. ...
  26. Impression

    An impression is a metric used to quantify the display of an advertisement on a web page.
  27. Agent Bank

    An agent bank is a bank that performs services in some capacity on behalf of an entity.
  28. Digital Marketing

    Digital marketing is the use of the internet, mobile devices, social media, search engines, display advertising and other ...
  29. Monthly Active User (MAU)

    Monthly Active User (MAU) is a key performance indicator (KPI) often used by online games, mobile apps and social networking ...
  30. Social Media

    Social media is a computer-based technology that facilitates the sharing of ideas and information and the building of virtual ...
  31. The Top 5 IBM Shareholders (IBM)

    Learn more about the largest stakeholders of IBM and the role they have played in the company's growth in the software and ...
  32. Intel Will Take More Risks, Says CEO in Internal Memo

    Intel is confident it won’t become the next blue chip company to be killed off by technological innovation.
  33. New Economy

    New economy is a buzzword describing new, high-growth industries that are on the cutting edge of technology and are the driving ...
  34. Technology Sector

    The technology sector is a category of stocks relating to the research, development and/or distribution of technologically ...
  35. Big Data

    Big data is the growth in the volume of structured and unstructured data, the speed at which it is created and collected, ...
  36. Bill Gates Invests $80 Million in Arizona Smart City

    Gates’s investment firm made the move shortly after Alphabet announced plans to build a “smart city” in Toronto.
  37. Internet of Things (IoT)

    The Internet of Things (IoT) is a network comprised of physical objects capable of gathering and sharing electronic information. ...
  38. Wearable Technology

    Wearable technology is a blanket term for electronics that can be worn on the body, either as an accessory or as part of ...
  39. Data Warehousing

    Data warehousing is the electronic storage of a large amount of information by a business, in a manner that is secure, reliable, ...
  40. Staying Safe After the Equifax Data Breach

    The recent Equifax breach illustrates why you need to protect your identity. Here's how.
  41. Equifax Data Breach: Why You Shouldn't Follow Their Advice

    This is what you should and shouldn't do in the wake of the massive Equifax data breach.
  42. How Companies Use Initial Coin Offerings

    Using an ICO, a startup company recently raised $36 million… in 24 seconds.
  43. The Biggest Opportunity In Cryptocurrency

    Cryptocurrencies are perhaps the most exciting sector in the markets today. But what does the future hold for them?
  44. Tuur Demeester on Bitcoin's Bubble

    Tuur Demeester, Editor-in-Chief of Adamant Research, shares his take on whether Bitcoin is a booming commodity worth investing ...
  45. What's Next For Quants

    We asked three pros what they're excited about in the future of quantitative analysis.
  46. Sample

    A sample is a smaller, manageable version of a larger group. Samples are used in statistical testing when population sizes ...
  47. Watch Out, LinkedIn! Google May Launch A Job Search App

    The tech giant is developing a job portal called Google Hire.
  48. Microsoft Office Incorporates Blockchain Technology (MSFT)

    An add-in for the company's ubiquitous Office software package will make use of Stampery, a blockchain timestamping service.
  49. Taser - Now Axon - May Be Gathering Image Data

    Taser International has been renamed and will focus on body cameras and services, but why?
  50. IPOs: Why Big Data Cloudera's IPO May Fall Short (INTC, HDP)

    Intel's investment stamped the company with a $4.1 billion value, but can growth keep up?
  • Showing 1-50 of 161 items
  • 1
  • 2
  • 3
  • 4
  • >>
Hot Definitions
  1. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
  2. Liquidity

    Liquidity is the degree to which an asset or security can be quickly bought or sold in the market without affecting the asset's ...
  3. Federal Funds Rate

    The federal funds rate is the interest rate at which a depository institution lends funds maintained at the Federal Reserve ...
  4. Call Option

    An agreement that gives an investor the right (but not the obligation) to buy a stock, bond, commodity, or other instrument ...
  5. Standard Deviation

    A measure of the dispersion of a set of data from its mean, calculated as the square root of the variance. The more spread ...
  6. Entrepreneur

    An entrepreneur is an individual who founds and runs a small business and assumes all the risk and reward of the venture.
Trading Center