Browse Definitions :

Browse Definitions by Alphabet

EMI - ENH

  • EMI - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • EMI - EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • eMLC - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • EMMA (Enabling Mobile Machine Automation) - EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.
  • eMMC (embedded MultiMediaCard) - An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emoticons (Japanese) - In Japan, users have worked out emoticons (text-based "smiley faces") adapted to their culture.
  • emotional intelligence - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • EMP - An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electron s.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • employee activism - Employee activism is actions taken by workers to speak out for or against their employers on controversial issues that impact society.
  • employee advocacy - Employee advocacy is the promotion of an organization by its staff members.
  • employee assessment software - Employee assessment software is technology that helps an organization determine to what degree a job candidate is a match for an open position.
  • employee assistance program - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee assistance program (EAP) - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
  • employee engagement - Employee engagement is the emotional connection an employee experiences that results in a willingness to expend discretionary effort at work.
  • employee engagement software - Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.
  • employee experience - Employee experience is a worker's perceptions about his or her journey through all the touchpoints at a particular company, starting with job candidacy through to the exit from the company.
  • employee life cycle - Employee life cycle -- also spelled employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization in, as well as the role HR plays in optimizing that progress.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
  • employee onboarding and offboarding - Employee onboarding and offboarding are two core HR activities that are gaining in importance.
  • employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
  • employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
  • employee productivity - Employee productivity is an assessment of the efficiency of a worker or group of workers.
  • employee pulse survey - An employee pulse survey is a review model used by employers to receive company feedback from employees in an efficient, routine way.
  • employee resource groups (ERGs) - Employee resource groups are workplace clubs or more formally realized affinity group organized around a shared interest or identity.
  • employee retention - Employee retention is the organizational goal of keeping talented employees and reducing turnover by fostering a positive work atmosphere to promote engagement, showing appreciation to employees, and providing competitive pay and benefits and healthy work-life balance.
  • employee self service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee sentiment analysis - Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.
  • employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
  • empty set - In mathematical sets, the null set, also called the empty set, is the set that does not contain anything.
  • EMR - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • EMR-shielding - Tempest was the name of a classified (secret) U.
  • EMS - Enhanced Messaging Service (EMS) is an adaptation of the Short Message Service (SMS) that allows users to send and receive ring tones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • EMV card - An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.
  • encapsulate - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • encoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encoding/decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • encrypt - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • Encrypting File System - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • Encrypting File System (EFS) - The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.
  • encryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • encryption as a service (EaaS) - Encryption as a Service (EaaS) is a subscription model that allows cloud service customers to take advantage of the security that encryption offers without having to install and use encryption on their own.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • encryption/decryption IC - A data encryption/decryption IC is a specialized integrated circuit (IC) that can encrypt outgoing data and decrypt incoming data.
  • Encyclopedia of Ethical Failure (EEF) - The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence.
  • end of message - EOM stands for "end of message.
  • End System to Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System protocol - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • end user - In information technology, the term end user is used to distinguish the person for whom a hardware or software product is designed from the developers, installers, and servicers of the product.
  • end user computer platform - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • End User License Agreement - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • end user policy - An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets.
  • end-of-message - EOM stands for "end of message.
  • end-to-end encryption (E2EE) - End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • end-to-end testing - End-to-end testing is a methodology that assesses the working order of a complex product in a start-to-finish process.
  • end-user computing (EUC) - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • endless loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • endpoint authentication (device authentication) - Endpoint authentication is a security mechanism designed to ensure that only authorized devices can connect to a given network, site or service.
  • endpoint detection and response (EDR) - Endpoint detection and response (EDR) is a system to gather and analyze security threat-related information from computer workstations and other endpoints, with the goal of finding security breaches as they happen and facilitating a quick response to discovered or potential threats.
  • endpoint device - An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.
  • endpoint fingerprinting - Endpoint fingerprinting is a feature of enterprise network access control (NAC) products that enables discovery, classification and monitoring of connected devices, including non-traditional network endpoints such as smartcard readers, HVAC systems, medical equipment and IP-enabled door locks.
  • endpoint reference - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • endpoint security (endpoint security management) - Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.
  • endpoint security management - Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
  • endurance testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • energy - Energy is the capacity of a physical system to do work.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • engine - In computer programming, an engine is a program that performs a core or essential function for other programs.
  • Engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Engine Yard - Engine Yard is a platform as a service (PaaS) provider that automates, configures and deploys applications in the cloud.
  • engine-level encryption - Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.
  • engineering bill of materials (EBOM) - An engineering bill of materials (EBOM) is a product recipe structured from the design standpoint, rather than the manufacturing standpoint.
  • Engineering Data Management (EDM) - Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic storage media.
  • enhanced 911 - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • Enhanced Capability Port - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • enhanced CD - Enhanced CD (E-CD) is a compact disc (CD) format that enables discs to be played on either a CD player or a multimedia-capable device, such as a CD-i player, or a DVD-ROM, or CD-ROM drive, where added material can be displayed.
  • Enhanced Data GSM Environment - EDGE (Enhanced Data GSM Environment) is a faster version of GSM designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users.
  • enhanced driver's license (EDL) - An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's biographical and biometric data.
  • enhanced dynamic RAM - EDRAM (enhanced dynamic random access memory) is dynamic random access memory (dynamic or power-refreshed RAM) that includes a small amount of static RAM (SRAM) inside a larger amount of DRAM so that many memory accesses will be to the faster SRAM.
  • enhanced dynamic random access memory - EDRAM (enhanced dynamic random access memory) is dynamic random access memory (dynamic or power-refreshed RAM) that includes a small amount of static RAM (SRAM) inside a larger amount of DRAM so that many memory accesses will be to the faster SRAM.
  • Enhanced Integrated Drive Electronics - Enhanced (sometimes "Expanded") IDE is a standard electronic interface between your computer and its mass storage drives.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close