Browse Definitions :

Browse Definitions by Alphabet

EVE - WHA

  • Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
  • Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
  • evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
  • evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
  • Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • exception handling - Exception handling is the process of responding to unwanted or unexpected events when a computer program runs.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
  • executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
  • executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
  • executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
  • exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
  • exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
  • EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
  • expert system - An expert system is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expertise and experience in a particular field.
  • explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
  • extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
  • extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • extension strategy - An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline.
  • Exterior Gateway Protocol (EGP) - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • external drive enclosure (disk enclosure, disk caddy, drive caddy) - An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
  • Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • extrapolation and interpolation - Extrapolation refers to estimating an unknown value based on extending a known sequence of values or facts.
  • Extreme Programming (XP) - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • Oracle extents - Oracle extents are a set of contiguous blocks allocated in an Oracle database.
  • What is edge computing? Everything you need to know - Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
  • What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close