Browse Definitions :
Definition

Enlightenment (E)

What is Enlightenment (E)?

Enlightenment, also called E, is a popular free and open source (FOSS) windows manager that can serve as a standalone desktop environment. E can also be used along with other desktop environments, such as KDE and GNOME.

Enlightenment is highly customizable and includes the types of themes and high-end graphics familiar to users of Windows and the Mac OS. Many functions can be performed from the keyboard, without the need for mouse manipulation. The command line-driven mode is said to streamline operation. The portable, user-friendly interface is favored by graphics professionals and sophisticated hobbyists.

In addition to the windows manager, E includes a collection of tools to support it and other applications. The three components of the Enlightenment project are Enlightenment DR16, Enlightenment DR17 and the Enlightenment Foundation Libraries.

Carsten 'Rasterman' Haitzler released the first Enlightenment Windows Manager in 1997. Enlightenment DR16 (V.0.16), released in 2000, is still used today. V.16.8.13 was released in May 2008. Enlightenment DR17 (V.0.17), in development, is a complete rewriting of DR16, including a desktop shell. DR17 is expected to enhance graphics quality, improve performance and support new and emerging applications.

This was last updated in August 2008

Continue Reading About Enlightenment (E)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close