Browse Definitions :

Browse Definitions by Alphabet

EMB - END

  • embedded BI (embedded business intelligence) - Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications.
  • embedded device - An embedded device is an object that contains a special-purpose computing system.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
  • embedded IT - Embedded IT is the process of inserting information technology staff and expertise into other business units in order to quickly and more effectively identify and pursue new business opportunities and increase the likelihood that IT projects are deployed successfully.
  • embedded operating system - An embedded operating system (OS) is a specialized operating system designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function.
  • embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
  • embedded systems - An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
  • embedded vision - Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.
  • EmbeddedJava - EmbeddedJava is Sun Microsystems' software development platform for dedicated-purpose devices with embedded systems, such as products designed for the automotive, telecommunication, and industrial device markets.
  • Embrane - Embrane is a company that makes software products for the delivery of SDN (sofware-defined networking) services, including load balancers, firewalls and VPNs.
  • EMC cloud architect certification - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EMC cloud architect certification (EMCCA) - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • EMCCA - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EME - Moonbounce, also called Earth-Moon-Earth (EME), is a form of wireless communication in which the moon is used as a passive satellite.
  • emergency communications plan (EC plan) - An emergency communications plan (EC plan) provides guidelines, contact information and procedures for how information should be shared should a crisis that requires immediate action occur.
  • emergency management plan - An emergency management plan should include measures that provide for the safety of personnel and, if possible, property and facilities.
  • emergency notification system - Emergency notification systems contain names, addresses, phone numbers and email addresses so crucial information can be communicated to employees during a disaster.
  • Emergency Power Off (EPO) button - The Emergency Power Off (EPO) button -- sometimes called an EPO switch -- is a large red device in data centers that kills power to a particular piece of equipment, or to an entire facility, in the event of an emergency.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • emerging growth company - An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.
  • emerging small business - In defense contracting, an emerging small business is any small business concern whose size is no greater than 50 percent of the numerical size standard applicable to the Standard Industrial Classification (SIC) code assigned to a contracting opportunity.
  • EMF - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • EMF (Enhanced MetaFile) - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • EMI - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • EMI - EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • eMLC - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • EMMA (Enabling Mobile Machine Automation) - EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.
  • eMMC (embedded MultiMediaCard) - An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons (Japanese) - In Japan, users have worked out emoticons (text-based "smiley faces") adapted to their culture.
  • emotional intelligence - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • EMP - An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electron s.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • employee activism - Employee activism is actions taken by workers to speak out for or against their employers on controversial issues that impact society.
  • employee advocacy - Employee advocacy is the promotion of an organization by its staff members.
  • employee assessment software - Employee assessment software is technology that helps an organization determine to what degree a job candidate is a match for an open position.
  • employee assistance program - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee assistance program (EAP) - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
  • employee engagement - Employee engagement is the emotional connection an employee experiences that results in a willingness to expend discretionary effort at work.
  • employee engagement software - Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.
  • employee experience - Employee experience is a worker's perceptions about his or her journey through all the touchpoints at a particular company, starting with job candidacy through to the exit from the company.
  • employee life cycle - Employee life cycle -- also spelled employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization in, as well as the role HR plays in optimizing that progress.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
  • employee onboarding and offboarding - Employee onboarding and offboarding are two core HR activities that are gaining in importance.
  • employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
  • employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
  • employee productivity - Employee productivity is an assessment of the efficiency of a worker or group of workers.
  • employee pulse survey - An employee pulse survey is a review model used by employers to receive company feedback from employees in an efficient, routine way.
  • employee referral software - Employee referral software is technology that enables HR managers to collect candidate recommendations from current employees to fill job openings.
  • employee resource groups (ERGs) - Employee resource groups are workplace clubs or more formally realized affinity group organized around a shared interest or identity.
  • employee retention - Employee retention is the organizational goal of keeping talented employees and reducing turnover by fostering a positive work atmosphere to promote engagement, showing appreciation to employees, and providing competitive pay and benefits and healthy work-life balance.
  • employee self service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee sentiment analysis - Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.
  • employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
  • empty set - In mathematical sets, the null set, also called the empty set, is the set that does not contain anything.
  • EMR - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • EMR-shielding - Tempest was the name of a classified (secret) U.
  • EMS - Enhanced Messaging Service (EMS) is an adaptation of the Short Message Service (SMS) that allows users to send and receive ring tones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • emulator - In computers, an emulator is a hardware device or a program that pretends to be another particular device or program that other components expect to interact with.
  • EMV card - An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.
  • enantiomorph - An enantiomorph (pronounced en-ANT-i-o-morf) is a mirror image of something, an opposite reflection.
  • encapsulate - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • enclave - In IBM's OS/390 operating system, an enclave is a representation of a business transaction or unit of work.
  • encoder - In digital audio technology, an encoder is a program that converts an audio WAV file into an MP3 file, a highly-compressed sound file that preserves the quality of a CD recording.
  • encoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encoding and decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encoding/decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encrypt - In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.
  • Encrypting File System - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • Encrypting File System (EFS) - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • encryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • encryption as a service (EaaS) - Encryption as a Service (EaaS) is a subscription model that allows cloud service customers to take advantage of the security that encryption offers without having to install and use encryption on their own.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • encryption/decryption IC - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • Encyclopedia of Ethical Failure (EEF) - The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence.
  • end of message - EOM stands for "end of message.
  • End System to Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System protocol - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close