FREE DM Review Site Registration!
Sign-up today and access DM Review on the Web!

Your FREE registration entitles you to:

FREE email newsletters

FREE access to all DM Review content

FREE access to web seminars, resource portals, our white paper library and more!




If you do not see a particular word or phrase that you would like to know the definition of, please let us know by writing to Julie Langenkamp and indicate the term you would like us to add to the Glossary.

Acronym for abnormal end of task. It refers to software crashes or lossage. Derives from an error message on the IBM 360.

Access Path
The path chosen by a database management system to retrieve the requested data.

Access Provider
A company which provides its customers a service whereby they can access the Internet. The user normally connects to the access provider's computer via a modem using a dial-up connection.

Active Attack
A persistent security assault by someone trying to gain restricted access by altering data. There are multiple techniques, decryption for example, which can be used to lead the attack.

Active Server Pages (ASP)
Active server pages are a set of software components that run on a Web server and allow Web developers to build dynamic Web pages.

Activity-Based Costing (ABC)
Activity-based costing (ABC) is an information system that maintains and processes data on a firm's activities and products. It identifies the activities performed, traces cost to these activities, and then uses various cost drivers to trace the cost of activities to products.*

Activity-Based Management (ABM)
Activity-based management (ABM) is the use of the activity-based costing tool by process owners to control and improve their operations. Because process analysis is conducted in the building of an activity-based cost model, management knows its business much better and can consequently evaluate value-added and nonvalue-added activities. Because a certain volume of work produces a certain outcome, what-if analysis can be conducted to determine what resources are required of operations are scaled back or expanded.*

Ad Clicks
Also called clickthroughs. The number of times a user "clicks" on an online ad, often measured as a function of time (ad clicks per day).

Ad Hoc Query
Any query that cannot be determined prior to the moment the query is issued. A query that consists of dynamically constructed SQL, which is usually constructed by desktop- resident query tools.

Ad Hoc Query Tool
An end-user tool that accepts an English-like or point-and- click request for data and constructs an ad-hoc query to retrieve the desired result.

Administrative Data
In a data warehouse, the data that helps a warehouse administrator manage the warehouse. Examples of administrative data are user profiles and order history data.

Aggregate Data
Data that is the result of applying a process to combine data elements. Data that is taken collectively or in summary form.

This is an e-commerce business model in which the Web site sells products or services which it does not produce or warehouse. An aggregator creates an environment where multiple providers (sellers) must compete on terms determined by the use.

Ajax (Asynchronous Java Script and XML) offers Web developers a means to create rich client-like applications on Web pages without resorting to huge amounts of code or forcing users to download plug-ins.

A notification from an event that has exceeded a pre-defined threshold.

Someone who creates views for analytic interpretation of data, performs calculations and distributes the resulting information in the form of reports.*

Analytic Applications
Packaged software that meets three distinct conditions: process support, separation of function and time-oriented, integrated data Analytic applications expand the reach of business intelligence to an extended user base, packaging these technologies in a business context.

Analytical Profiling
Analytical profiling is the methodology used to examine the business users' process in reporting and analyzing data.

The process and techniques for the exploration and analysis of business data to discover and identify new and meaningful information and trends that allow for analysis to take place.*

A small Java program that can be embedded in an HTML page. They cannot access certain resources on local computers such as files and serial devices and are prohibited from communication with most other computers across a network.

Application Service Provider (ASP)
ASPs provide the infrastructure needed to deliver reliable application access, including enterprise applications, hardware platforms, operating systems, database systems, network hardware as well as the technical expertise to make it all work for a monthly service charge.

American Standard Code for Information Interchange. An eight-bit code for character representation; includes seven bits plus parity.

Application Service Provider. A company that offers access over the Internet to application programs and related services that would otherwise have to be located in other own personal or enterprise computers.

Association Rules
Association rules are information sets discovered through algorithms in data mining or text mining processes that display relationships or associations between specific values of categorical variables in large data sets.

Atomic Data
Data elements that represent the lowest level of detail. For example, in a daily sales report, the individual items sold would be atomic data, while rollups such as invoice and summary totals from invoices are aggregate data.

A field represented by a column within an object (entity). An object may be a table, view or report. An attribute is also associated with an SGML(HTML) tag used to further define the usage.

Authorization Request
A request initiated by a consumer to access data for which the consumer does not presently have access privileges.

Authorization Rules
Criteria used to determine whether or not an individual, group, or application may access reference data or a process.

User access to applications and/or data stores that reside and execute on computing systems accessing information that resides in files and databases supported by an organization's various operating environments.

Industry Vendors