Browse Definitions :

Browse Definitions by Alphabet

END - ENT

  • End System to Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • End System-to-Intermediate System protocol - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • end user - In information technology, the term end user is used to distinguish the person for whom a hardware or software product is designed from the developers, installers, and servicers of the product.
  • end user computer platform - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • End User License Agreement - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • End User License Agreement (EULA) - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • end user policy - An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets.
  • end-of-message - EOM stands for "end of message.
  • end-to-end encryption (E2EE) - End-to-end encryption is a secure method of transferring data from one end device to another without allowing third-party interference.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • end-to-end testing - End-to-end testing is a methodology that assesses the working order of a complex product in a start-to-finish process.
  • end-user computing (EUC) - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • endless loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • endpoint authentication (device authentication) - Endpoint authentication is a security mechanism designed to ensure that only authorized devices can connect to a given network, site or service.
  • endpoint detection and response (EDR) - Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called endpoints—from potential threats.
  • endpoint device - An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.
  • endpoint fingerprinting - Endpoint fingerprinting is a feature of enterprise network access control (NAC) products that enables discovery, classification and monitoring of connected devices, including non-traditional network endpoints such as smartcard readers, HVAC systems, medical equipment and IP-enabled door locks.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • endpoint security (endpoint security management) - Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.
  • endpoint security management - Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
  • endurance testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • energy - Energy is the capacity of a physical system to do work.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • engine - In computer programming, an engine is a program that performs a core or essential function for other programs.
  • Engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • Engine Yard - Engine Yard is a platform as a service (PaaS) provider that automates, configures and deploys applications in the cloud.
  • engine-level encryption - Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.
  • engineering bill of materials (EBOM) - An engineering bill of materials (EBOM) is a product recipe structured from the design standpoint, rather than the manufacturing standpoint.
  • Engineering Data Management (EDM) - Engineering Data Management (EDM) is the administration of documents or data related to engineering applications using computers and electronic storage media.
  • engraving - Engraving, in a printing context, is a method of creating raised areas of print or images on paper, such as a business card or letterhead.
  • enhanced 911 - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • Enhanced Capability Port - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • enhanced CD - Enhanced CD (E-CD) is a compact disc (CD) format that enables discs to be played on either a CD player or a multimedia-capable device, such as a CD-i player, or a DVD-ROM, or CD-ROM drive, where added material can be displayed.
  • enhanced CD (E-CD) - Enhanced CD (E-CD) is a compact disc (CD) format that enables discs to be played on either a CD player or a multimedia-capable device, such as a CD-i player, or a DVD-ROM, or CD-ROM drive, where added material can be displayed.
  • Enhanced Data GSM Environment - EDGE (Enhanced Data GSM Environment) is a faster version of GSM designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users.
  • enhanced driver's license (EDL) - An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's biographical and biometric data.
  • enhanced dynamic RAM - EDRAM (enhanced dynamic random access memory) is dynamic random access memory (dynamic or power-refreshed RAM) that includes a small amount of static RAM (SRAM) inside a larger amount of DRAM so that many memory accesses will be to the faster SRAM.
  • enhanced dynamic random access memory - EDRAM (enhanced dynamic random access memory) is dynamic random access memory (dynamic or power-refreshed RAM) that includes a small amount of static RAM (SRAM) inside a larger amount of DRAM so that many memory accesses will be to the faster SRAM.
  • Enhanced Integrated Drive Electronics - Enhanced (sometimes "Expanded") IDE is a standard electronic interface between your computer and its mass storage drives.
  • Enhanced Interior Gateway Routing Protocol - EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols.
  • Enhanced Messaging Service - Enhanced Messaging Service (EMS) is an adaptation of the Short Message Service (SMS) that allows users to send and receive ring tones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
  • Enhanced Messaging Service (EMS) - Enhanced Messaging Service (EMS) is an adaptation of the Short Message Service (SMS) that allows users to send and receive ring tones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
  • Enhanced MetaFile - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • Enhanced Parallel Port - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • Enhanced Small Device Interface - ESDI (Enhanced Small Device Interface) is a hardware interface for a computer disk drive based on the ST-506 standard, an early industry and later ANSI standard based on the Seagate disk drive.
  • Enhanced Specialized Mobile Radio - Also see Specialized Mobile Radio (SMR).
  • Enhanced Synchronous DRAM - ESDRAM (Enhanced Synchronous DRAM), made by Enhanced Memory Systems, includes a small static RAM in the SDRAM chip.
  • Enhanced TV Binary Interchange Format - EBIF (Enhanced TV Binary Interchange Format) is a collection of signaling and messaging specifications that makes it possible for television program producers and advertisers to create and serve interactive multimedia content through a television's set-top box.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • ENIAC - ENIAC (Electronic Numerical Integrator And Computer) was the world’s first general-purpose computer.
  • ENISA - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • ENISA (European Network and Information Security Agency) - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • Enlightenment - Enlightenment, also called E, is a popular free and open source (FOSS) windows manager that can serve as a standalone desktop environment.
  • ensemble modeling - Ensemble modeling is the process of running two or more related but different analytical models and then synthesizing the results into a single score or spread in order to improve the accuracy of predictive analytics and data mining applications.
  • entangled light emitting diode - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • entangled light-emitting diode - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • entangled light-emitting diode (ELED) - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • entanglement - Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
  • enterprise - In the computer industry, an enterprise is an organization that uses computers.
  • Enterprise 2.0 - Enterprise 2.
  • enterprise accounting software - Enterprise accounting software is technology that keeps track of an organization's financial transactions and data.
  • enterprise app store (enterprise application store) - An enterprise app store is a web portal through which end users can access, download and install corporate-approved software applications.
  • enterprise architecture - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization.
  • enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization.
  • enterprise asset management - Enterprise asset management (EAM) is the process of managing the lifecycle of physical assets to maximize their use; save money; improve quality and efficiency; and safeguard health, safety and the environment.
  • enterprise asset management (EAM) - Enterprise asset management (EAM) is the process of managing the lifecycle of physical assets to maximize their use; save money; improve quality and efficiency; and safeguard health, safety and the environment.
  • Enterprise Cloud Computing FAQ - Enterprise cloud computing is the special case of utilizing cloud computing for competitive advantage through breakout opportunities both for cost savings and, more importantly, for business innovation in terms of unprecedented speed and agility with vastly improved collaboration among business partners and customers.
  • enterprise cloud storage - Enterprise cloud storage is public cloud storage purchased for a large organization.
  • enterprise collaboration (EC) - Enterprise collaboration is a system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public Internet.
  • enterprise content management - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
  • enterprise content management (ECM) - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
  • enterprise content services - Enterprise content services are the evolution of enterprise content management (ECM); their goal is to adapt to the changing needs of enterprises and the emergence of new technologies, such as cloud computing.
  • enterprise data hub - An enterprise data hub, also referred to as a data lake, is a new big data management model for big data that utilizes Hadoop as the central data repository.
  • enterprise data replication (EDR) - Enterprise data replication (EDR) is the process of copying or moving enterprise data from one storage system to another.
  • Enterprise Device Alliance (EDA) - The Enterprise Device Alliance (EDA) seeks to help administrators integrate iOS and Android devices into existing Windows environments.
  • enterprise DNS - Enterprise DNS is an enterprise-class implementation of the domain name system (DNS) that resolves external and internal queries for large organizations in a centrally managed, scalable, automatable and secure way.
  • enterprise document management - Enterprise document management is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
  • enterprise document management (EDM) - Enterprise document management is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
  • Enterprise Identity Mapping - Enterprise Identity Mapping (EIM) is an open architecture from IBM for helping an enterprise manage the multiple user registries and identities that enable a computer user to access multiple applications with a single sign-on.
  • Enterprise Identity Mapping (EIM) - Enterprise Identity Mapping (EIM) is an open architecture from IBM for helping an enterprise manage the multiple user registries and identities that enable a computer user to access multiple applications with a single sign-on.
  • enterprise information management - Enterprise information management (EIM) is the set of business processes, disciplines and practices used to manage the information created from an organization's data as an enterprise asset.
  • enterprise information management (EIM) - Enterprise information management (EIM) is the set of business processes, disciplines and practices used to manage the information created from an organization's data as an enterprise asset.
  • enterprise information portal - The enterprise information portal (EIP), also known as a business portal, is a concept for a Web site that serves as a single gateway to a company's information and knowledge base for employees and possibly for customers, business partners, and the general public as well.
  • enterprise information portal (EIP) - The enterprise information portal (EIP), also known as a business portal, is a concept for a Web site that serves as a single gateway to a company's information and knowledge base for employees and possibly for customers, business partners, and the general public as well.
  • Enterprise Integration Patterns (EIP) - "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration.
  • enterprise IT (enterprise-class IT) - Enterprise IT, also known as enterprise-class IT, is hardware and software designed to meet the demands of a large organization.
  • Enterprise JavaBeans - Enterprise JavaBeans (EJB) is an architecture for setting up program components, written in the Java programming language, that run in the server parts of a computer network that uses the client/server model.
  • Enterprise JavaBeans (EJB) - Enterprise JavaBeans (EJB) is an architecture for setting up program components, written in the Java programming language, that run in the server parts of a computer network that uses the client/server model.
  • enterprise mashup - An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes.
  • enterprise mashup (or data mashup) - An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes.
  • enterprise master patient index (EMPI) - An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization.
  • enterprise MLC - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • enterprise MLC (eMLC) - Enterprise MLC (eMLC) is a type of MLC flash that has been enhanced to accommodate more write cycles than consumer-grade MLC flash offers.
  • enterprise mobile integration - Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks.
  • enterprise mobility - Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.
  • enterprise mobility management (EMM) - Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.
  • enterprise performance management - Corporate performance management (CPM) is the area of business intelligence involved with monitoring and managing an organization's performance.
  • enterprise relationship management - Enterprise relationship management (ERM) is software that analyzes data it has about its customers to develop a better understanding of the customer and how the customer is using its products and services.
  • enterprise relationship management (ERM) - Enterprise relationship management (ERM) is software that analyzes data it has about its customers to develop a better understanding of the customer and how the customer is using its products and services.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close