Browse Definitions :

Browse Definitions by Alphabet

ENE - EVE

  • energy - Energy is the capacity of a physical system to do work.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • engine - In computer programming, an engine is a program that performs a core or essential function for other programs.
  • Engine Yard - Engine Yard is a platform as a service (PaaS) provider that automates, configures and deploys applications in the cloud.
  • engineering bill of materials (EBOM) - An engineering bill of materials (EBOM) is a product recipe structured from the design standpoint, rather than the manufacturing standpoint.
  • Engineering Data Management (EDM) - Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic storage media.
  • enhanced driver's license (EDL) - An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's biographical and biometric data.
  • Enhanced Interior Gateway Routing Protocol (EIGRP) - Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • ENIAC - ENIAC (Electronic Numerical Integrator And Computer) was the world’s first general-purpose computer.
  • ENISA (European Network and Information Security Agency) - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • ensemble modeling - Ensemble modeling is the process of running two or more related but different analytical models and then synthesizing the results into a single score or spread in order to improve the accuracy of predictive analytics and data mining applications.
  • entangled light-emitting diode (ELED) - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • enterprise - In the computer industry, an enterprise is an organization that uses computers.
  • Enterprise 2.0 - Enterprise 2.
  • enterprise accounting software - Enterprise accounting software is technology that keeps track of an organization's financial transactions and data.
  • enterprise agility - Enterprise agility is a paradigm for scaling agile methodologies beyond development teams.
  • enterprise app store (enterprise application store) - An enterprise app store is a web portal through which end users can access, download and install corporate-approved software applications.
  • enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization.
  • enterprise architecture framework - An enterprise architecture framework (EA framework) is the collection of processes, templates and tools that are used to create an enterprise architecture (EA).
  • enterprise asset management (EAM) - Enterprise asset management (EAM) is the process of managing the lifecycle of physical assets to maximize their use; save money; improve quality and efficiency; and safeguard health, safety and the environment.
  • enterprise cloud storage - Enterprise cloud storage is public cloud storage purchased for a large organization.
  • enterprise collaboration (EC) - Enterprise collaboration is a system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public Internet.
  • enterprise content services - Enterprise content services are the evolution of enterprise content management (ECM); their goal is to adapt to the changing needs of enterprises and the emergence of new technologies, such as cloud computing.
  • enterprise data hub - An enterprise data hub, also referred to as a data lake, is a new big data management model for big data that utilizes Hadoop as the central data repository.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • enterprise DNS - Enterprise DNS is an enterprise-class implementation of the domain name system (DNS) that resolves external and internal queries for large organizations in a centrally managed, scalable, automatable and secure way.
  • enterprise document management (EDM) - Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
  • enterprise information management (EIM) - Enterprise information management (EIM) is the set of business processes, disciplines and practices used to manage the information created from an organization's data as an enterprise asset.
  • Enterprise Integration Patterns (EIP) - "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration.
  • enterprise IT (enterprise-class IT) - Enterprise IT, also known as enterprise-class IT, is hardware and software designed to meet the demands of a large organization.
  • Enterprise JavaBeans (EJB) - Enterprise JavaBeans (EJB) is an architecture for setting up program components, written in the Java programming language, that run in the server parts of a computer network that uses the client/server model.
  • enterprise license agreement (ELA) - An enterprise license agreement (ELA) is a contract between a customer and a vendor that allows purchase of a software product for a company at a discounted, fixed rate for a certain time period.
  • enterprise mashup (or data mashup) - An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes.
  • enterprise master patient index (EMPI) - An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization.
  • enterprise MLC (eMLC) - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • enterprise mobility - Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.
  • enterprise mobility management (EMM) - Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.
  • enterprise risk management (ERM) - Enterprise risk management is the process of planning, organizing, directing and controlling the activities of an organization to minimize the deleterious effects of risk on its capital and earnings.
  • enterprise security governance - Enterprise security governance is a company's strategy to reduce risk by protecting systems and information, as well as its execution of that strategy.
  • enterprise server - An enterprise server is a computer containing programs that collectively serve the needs of an enterprise rather than a single user, department, or specialized application.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • enterprise social networking - Enterprise social networking is an organization's use of social media, internally and externally, to connect individuals who share similar business interests or activities.
  • enterprise social software - Enterprise social software is a general term that describes social networking and collaboration tools used in large organizations.
  • enterprise SSD (enterprise solid-state drive) - An enterprise SSD (also known as an enterprise solid-state drive or enterprise solid-state disk) stores data persistently or caches data temporarily in nonvolatile memory and generally provides higher performance and greater endurance than consumer or client SSDs.
  • enterprise storage - Enterprise storage is a centralized repository for business information that provides common data management, protection and data sharing functions through connections to computer systems.
  • enterprise wipe - Enterprise wipe is a security feature offered by many Mobile Device Management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM.
  • enterprise-mobile integration (EMI) - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • entity - In general, an entity (pronounced N-tih-tee) is an existing or real thing.
  • Entity Relationship Diagram (ERD) - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • entity tag (ETag) - ETags use persistent identification elements (PIE) that have been tagged to the user’s browser.
  • entrepreneur (entrepreneurship) - An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.
  • entropy - Entropy describes a process in which order deteriorates with the passage of time.
  • environmental, social and governance (ESG) - Environmental, social and governance (ESG) is a term used to represent an organization's corporate financial interests that focus mainly on sustainable and ethical impacts.
  • EOM (end of message) - EOM stands for "end of message.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • ephemeral messaging - Ephemeral messaging is the mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient's screen after the message has been viewed.
  • EPIC (Explicitly Parallel Instruction Computing) - (EPIC also stand for Electronic Privacy Information Center.
  • Epic Systems - Epic Systems is one of the largest providers of health information technology, used primarily by large U.
  • Epicor Software Corp. - Epicor Software Corp.
  • epoch - In a computing context, an epoch is the date and time relative to which a computer's clock and timestamp values are determined.
  • EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • EPROM - EPROM (erasable programmable read-only memory) is programmable read-only memory (programmable ROM) that can be erased and re-used.
  • equilibrium price - An equilibrium price, also known as a market-clearing price, is the consumer cost assigned to some product or service such that supply and demand are equal, or close to equal.
  • equipment destruction attack - An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment.
  • erasure coding - Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media.
  • ergonomics - Ergonomics (from the Greek word "ergon" meaning work, and "nomoi" meaning natural laws), is the science of refining the design of products to optimize them for human use.
  • erlang - The Erlang programming language is not the same thing as the erlang, a unit of traffic density.
  • Erlang B - Erlang B is a modeling formula that is widely used in call center scheduling.
  • Erlang C - Erlang C is a traffic modeling formula, primarily used in call center scheduling to calculate delays and to predict waiting times for callers.
  • Erlang programming language - Erlang is a programming language designed for developing robust systems of programs that can be distributed among different computers in a network.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is software designed to manage and integrate the functions of core business processes like finance, HR, supply chain and inventory management in a single system.
  • ERP finance module - The ERP finance module is the software component that handles the main accounting and financial management functions of an enterprise resource planning system.
  • Error messages for Windows XP Pro - MS Windows XP Professional Error Messages.
  • ES-IS (End System-to-Intermediate System) - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • esxtop - Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment.
  • Ethereum - Ethereum is an open source, distributed software platform based on blockchain technology.
  • EtherExpress - EtherExpress is a technology from Intel that is used in network server adapters (devices that attach the server to the network cable) for Ethernet-based local area networks (LANs).
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  • Ethernet hard drive - An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • ethical hacker - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • Euler diagram - An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.
  • Euler's constant (gamma or the Euler-Mascheroni constant) - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • EV SSL certificate (Extended Validation SSL certificate) - An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
  • Evaluation Assurance Level (EAL) - The Evaluation Assurance Level (EAL) is a grade assigned to an IT product or system after completing a Common Criteria security evaluation.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close