Browse Definitions :
Definition

Emacs

Emacs (pronounced EE-maks and sometimes spelled "emacs" or "EMACS") is a popular text editor used mainly on Unix-based systems by programmers, scientists, engineers, students, and system administrators. Like other Unix text editors, Emacs provides typed commands and special key combinations that let you add, delete, insert, and otherwise manipulate words, letters, lines, and other units of text. Emacs is commonly used to enter the source statements for programs. Emacs itself is built using the Lisp programming language and users are invited to extend or personalize it using the same language. Emacs also offers a number of convenient capabilities such as the ability to initiate a program compiler and to handle e-mail from within the editor.

Emacs (derived from Editing MACRoS) was created by Richard Stallman at MIT. A popular version is called GNU Emacs. Emacs offers a much longer list of commands than the other widely-used UNIX text editor, vi and the ability to extend the interface. Like vi, the full capabilities of Emacs require a considerable investment in learning (or relearning if you don't use them continually). However, a beginning set of commands makes it possible to get to work immediately.

One or more versions of Emacs have been developed for use on Windows operating systems. A reader suggests another possible derivation for the letters in Emacs: Escape-Meta-Alt-Control-Shift - apparently referring to its use of key combination commands.

This was last updated in September 2005
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close