Browse Definitions :

Browse Definitions by Alphabet

ELE - EMB

  • Electronic Data Management - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • electronic data processing - EDP (electronic data processing), an infrequently used term for what is today usually called "IS" (information services or systems) or "MIS" (management information services or systems), is the processing of data by a computer and its programs in an environment involving electronic communication.
  • electronic discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • electronic discovery (e-discovery or ediscovery) - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • Electronic Document Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • Electronic Document Management - EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.
  • Electronic Evidence - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • Electronic Evidence Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • Electronic File Transfer Access Method - File Transfer Access Method (FTAM), also known as File Transfer Access and Management or Electronic File Transfer Access Method (EFTAM), is an ISO standard that specifies methods of transfering files between networked computers.
  • electronic filing - E-filing is the electronic submission of information that is required by law.
  • electronic form - An e-form (electronic form) is a computer program version of a paper form.
  • Electronic Frontier Foundation (EFF) - The Electronic Frontier Foundation is the primary watchdog for the preservation of civil liberties on the Internet.
  • Electronic Funds Transfer - Electronic Funds Transfer (EFT) is a system of transferring money from one bank account directly to another without any paper money changing hands.
  • Electronic Funds Transfer (EFT) - Electronic Funds Transfer (EFT) is a system of transferring money from one bank account directly to another without any paper money changing hands.
  • electronic health record - An electronic health record (EHR) is an individual's official health document that is shared among multiple facilities and agencies.
  • electronic health record (EHR) - An electronic health record (EHR) is an individual's official health document that is shared among multiple facilities and agencies.
  • Electronic Industries Alliance - The Electronic Industries Association (EIA) comprises individual organizations that together have agreed on certain data transmission standards such as EIA/TIA-232 (formerly known as RS-232).
  • Electronic Industries Association - The Electronic Industries Association (EIA) comprises individual organizations that together have agreed on certain data transmission standards such as EIA/TIA-232 (formerly known as RS-232).
  • Electronic Information Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic intensive care unit (eICU) - An Electronic Intensive Care Unit (eICU) is a form of telemedicine that utilizes state of the art technology to provide an additional layer of critical care service.
  • electronic logging device (ELD) - An electronic logging device (ELD) is electronic hardware used to record the working hours of a commercially-operated motor vehicle.
  • electronic magazine - The term ezine is short for "electronic magazine.
  • electronic mail - E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • electronic medical billing - Electronic medical billing is the process by which a health care provider electronically submits a bill, or claim, to a health insurance company, or payer, for the rendering of medical services.
  • electronic medical record - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • electronic medical record (EMR) - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • electronic newspaper - An electronic newspaper is a self-contained, reusable, and refreshable version of a traditional newspaper that acquires and holds information electronically.
  • electronic nose - An electronic nose (e-nose) is a device that identifies the specific components of an odor and analyzes its chemical makeup to identify it.
  • electronic nose (e-nose) - An electronic nose (e-nose) is a device that identifies the specific components of an odor and analyzes its chemical makeup to identify it.
  • electronic paper - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • electronic paper display - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • electronic postmaster - An electronic postmaster is the capability in a program, usually a special program designated as an e-mail server, for handling the distribution, forwarding, and receiving of e-mail in a network.
  • electronic prescribing - E-prescribing, or electronic prescribing is a technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
  • Electronic Privacy Information Center (EPIC) - The Electronic Privacy Information Center (EPIC) is a non-profit public interest research organization for the promotion of privacy and civil liberties, constitutional values and free speech in the information age.
  • Electronic Product Environmental Assessment Tool - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • electronic program guide - An electronic program guide (EPG) is an application used with digital set-top boxes and newer television sets to list current and scheduled programs that are or will be available on each channel and a short summary or commentary for each program.
  • electronic program guide (EPG) - An electronic program guide (EPG) is an application used with digital set-top boxes and newer television sets to list current and scheduled programs that are or will be available on each channel and a short summary or commentary for each program.
  • electronic protected health information - Electronic protected health information (ePHI) refers to any protected health information (PHI) that is covered under Health Insurance Portability and Accountability Act of 1996 (HIPAA) security regulations and is produced, saved, transferred or received in an electronic form.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
  • electronic publishing on demand - Electronic publishing on demand (EPOD) is the use of a digital printer to create a book.
  • electronic publishing on demand (EPOD) - Electronic publishing on demand (EPOD) is the use of a digital printer to create a book.
  • electronic reader - An e-reader (electronic reader) is a device for reading content, such as e-books, newspapers and documents.
  • electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • electronic retailing - E-tailing (less frequently: etailing) is the selling of retail goods on the Internet.
  • electronic services - E-services, a business concept developed by Hewlett Packard (HP), is the idea that the World Wide Web is moving beyond e-business and e-commerce (that is, completing sales on the Web) into a new phase where many business services can be provided for a business or consumer using the Web.
  • electronic signature - A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
  • Electronic Signatures in Global and National Commerce Act - The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.
  • Electronic Signatures in Global and National Commerce Act (e-signature bill) - The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.
  • electronic terrorism - According to the U.
  • electronic ticket - An e-ticket (electronic ticket) is a paperless electronic document used for ticketing passengers, particularly in the commercial airline industry.
  • electronic voting - E-voting is an election system that allows a voter to record his or her secure and secret ballot electronically.
  • Electronic Worldwide Switch Digital - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • Electronic-discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • electronically stored information (ESI) - Electronically stored information (ESI) is data created, altered, communicated and stored in digital form.
  • Electronics Industries Alliance - The Electronic Industries Association (EIA) comprises individual organizations that together have agreed on certain data transmission standards such as EIA/TIA-232 (formerly known as RS-232).
  • electrophotography - Xerography, also known as electrophotography, is a printing and photocopying technique that works on the basis of electrostatic charges.
  • electrostatic discharge - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • electrostatic discharge (ESD) - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • electrostatic field - When two objects in each other's vicinity have different electrical charges, an electrostatic field exists between them.
  • ELED - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • elegant solution - The word elegant, in general, is an adjective meaning of fine quality.
  • element - In chemistry and physics, an element is a substance that cannot be broken down into simpler components by any non-nuclear chemical reaction.
  • element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object, or number belongs to a certain set.
  • elementary charge - An elementary charge is the electrical charge carried by a single electron.
  • elevator pitch - An elevator pitch is a brief, prepared statement that defines a product, service or the value of an organization or individual in as little as 15 seconds, the length of time of a typical elevator ride.
  • ELF - ELF (extremely low frequency) refers to an electromagnetic field having a frequency much lower than the frequencies of signals typically used in communications.
  • ELF (extremely low frequency) - ELF (extremely low frequency) refers to an electromagnetic field having a frequency much lower than the frequencies of signals typically used in communications.
  • ELINT (electronic intelligence) - Electronic intelligence (ELINT) is intelligence gathered by the use of electronic sensors.
  • Elk Cloner - Elk Cloner was the first computer virus known to have spread in the wild.
  • elliptical curve cryptography - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
  • elliptical curve cryptography (ECC) - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
  • ELM - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • Elm - Elm is a popular e-mail program for users of UNIX-based operating systems.
  • ELMS - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • Eloqua - Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.
  • EM field - An electromagnetic field, sometimes referred to as an EM field, is generated when charged particles, such as electrons, are accelerated.
  • EM shielding (electromagnetic shielding) - EM shielding (electromagnetic shielding) is the practice of surrounding electronics and cables with conductive or magnetic materials to guard against incoming or outgoing emissions of electromagnetic frequencies (EMF).
  • Emacs - Emacs (pronounced EE-maks and sometimes spelled "emacs" or "EMACS") is a popular text editor used mainly on Unix-based systems by programmers, scientists, engineers, students, and system administrators.
  • email - E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email - Email (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email address internationalization (EAI) - Email address internationalization (EAI) is a process that enables email addresses with either the domain name or mailbox name in different languages and scripts to work properly when sending and receiving emails.
  • email archiving - Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email messages to enable fast retrieval.
  • email bankruptcy - Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether.
  • Email Discoverability - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • eMail Evidence Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email response management service - An email response management service (ERMS) is a set of programs that automatically handles email messages and attachments according to user-defined rules.
  • email response management service (ERMS) - An email response management service (ERMS) is a set of programs that automatically handles email messages and attachments according to user-defined rules.
  • email retention - An e-mail retention policy is list of parameters created by an organization to determine what e-mail and instant messaging records need to be kept for compliance or other business reasons.
  • eMail Search and Discovery - Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.
  • email spoofing - Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
  • email virus - An email virus consists of malicious code that is distributed in email messages, and it can be activated when a user clicks on a link in an email message, opens an email attachment or interacts in some other way with the infected email message.
  • emanation monitoring - Tempest was the name of a classified (secret) U.
  • embedded analytics - Embedded analytics is the integration of business intelligence (BI) tools and capabilities into business software, including customer relationship management (CRM), enterprise resource planning (ERP), marketing automation and financial systems.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close