Browse Definitions :

Browse Definitions by Alphabet

EMA - END

  • email spoofing - Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
  • email virus - An email virus consists of malicious code that is distributed in email messages, and it can be activated when a user clicks on a link in an email message, opens an email attachment or interacts in some other way with the infected email message.
  • emanation monitoring - Tempest was the name of a classified (secret) U.
  • embedded analytics - Embedded analytics is the integration of business intelligence (BI) tools and capabilities into business software, including customer relationship management (CRM), enterprise resource planning (ERP), marketing automation and financial systems.
  • embedded BI (embedded business intelligence) - Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications.
  • embedded device - An embedded device is an object that contains a special-purpose computing system.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
  • embedded IT - Embedded IT is the process of inserting information technology staff and expertise into other business units in order to quickly and more effectively identify and pursue new business opportunities and increase the likelihood that IT projects are deployed successfully.
  • embedded operating system - An embedded operating system (OS) is a specialized operating system designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function or functions within a larger system.
  • embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
  • embedded systems - An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
  • embedded vision - Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.
  • EmbeddedJava - EmbeddedJava is Sun Microsystems' software development platform for dedicated-purpose devices with embedded systems, such as products designed for the automotive, telecommunication, and industrial device markets.
  • Embrane - Embrane is a company that makes software products for the delivery of SDN (sofware-defined networking) services, including load balancers, firewalls and VPNs.
  • EMC cloud architect certification - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EMC cloud architect certification (EMCCA) - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • EMCCA - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EME - Moonbounce, also called Earth-Moon-Earth (EME), is a form of wireless communication in which the moon is used as a passive satellite.
  • emergency communications plan (EC plan) - An emergency communications plan (EC plan) provides guidelines, contact information and procedures for how information should be shared should a crisis that requires immediate action occur.
  • emergency management plan - An emergency management plan should include measures that provide for the safety of personnel and, if possible, property and facilities.
  • emergency notification system - Emergency notification systems contain names, addresses, phone numbers and email addresses so crucial information can be communicated to employees during a disaster.
  • Emergency Power Off (EPO) button - The Emergency Power Off (EPO) button -- sometimes called an EPO switch -- is a large red device in data centers that kills power to a particular piece of equipment, or to an entire facility, in the event of an emergency.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • emerging growth company - An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.
  • emerging small business - In defense contracting, an emerging small business is any small business concern whose size is no greater than 50 percent of the numerical size standard applicable to the Standard Industrial Classification (SIC) code assigned to a contracting opportunity.
  • EMF - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • EMF (Enhanced MetaFile) - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • EMI - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • EMI - EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • eMLC - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • EMMA (Enabling Mobile Machine Automation) - EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.
  • eMMC (embedded MultiMediaCard) - An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons (Japanese) - In Japan, users have worked out emoticons (text-based "smiley faces") adapted to their culture.
  • emotional intelligence - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • EMP - An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electron s.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • employee activism - Employee activism is actions taken by workers to speak out for or against their employers on controversial issues that impact society.
  • employee advocacy - Employee advocacy is the promotion of an organization by its staff members.
  • employee assessment software - Employee assessment software is technology that helps an organization determine to what degree a job candidate is a match for an open position.
  • employee assistance program - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee assistance program (EAP) - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
  • employee engagement - Employee engagement is the emotional connection an employee experiences that results in a willingness to expend discretionary effort at work.
  • employee engagement software - Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.
  • employee experience - Employee experience is a worker's observations and perceptions about his or her employment at a particular company.
  • employee life cycle - Employee life cycle -- also spelled employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization in, as well as the role HR plays in optimizing that progress.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
  • employee onboarding and offboarding - Employee onboarding and offboarding are two core HR activities that are gaining in importance.
  • employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
  • employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
  • employee productivity - Employee productivity is an assessment of the efficiency of a worker or group of workers.
  • employee pulse survey - An employee pulse survey is a review model used by employers to receive company feedback from employees in an efficient, routine way.
  • employee referral software - Employee referral software is technology that enables HR managers to collect candidate recommendations from current employees to fill job openings.
  • employee resource groups (ERGs) - Employee resource groups are workplace clubs or more formally realized affinity group organized around a shared interest or identity.
  • employee retention - Employee retention is the organizational goal of keeping talented employees and reducing turnover by fostering a positive work atmosphere to promote engagement, showing appreciation to employees, and providing competitive pay and benefits and healthy work-life balance.
  • employee self service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
  • empty set - In mathematical sets, the null set, also called the empty set, is the set that does not contain anything.
  • EMR - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • EMR-shielding - Tempest was the name of a classified (secret) U.
  • EMS - Enhanced Messaging Service (EMS) is an adaptation of the Short Message Service (SMS) that allows users to send and receive ring tones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • emulator - In computers, an emulator is a hardware device or a program that pretends to be another particular device or program that other components expect to interact with.
  • EMV card - An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.
  • enantiomorph - An enantiomorph (pronounced en-ANT-i-o-morf) is a mirror image of something, an opposite reflection.
  • encapsulate - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • enclave - In IBM's OS/390 operating system, an enclave is a representation of a business transaction or unit of work.
  • encoder - In digital audio technology, an encoder is a program that converts an audio WAV file into an MP3 file, a highly-compressed sound file that preserves the quality of a CD recording.
  • encoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encoding and decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encoding/decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • encrypt - In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key.
  • Encrypting File System - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • Encrypting File System (EFS) - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • encryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • encryption as a service (EaaS) - Encryption as a Service (EaaS) is a subscription model that allows cloud service customers to take advantage of the security that encryption offers without having to install and use encryption on their own.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • encryption/decryption IC - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • Encyclopedia of Ethical Failure (EEF) - The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence.
  • end of message - EOM stands for "end of message.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close