Browse Definitions :

Browse Definitions by Alphabet

EUR - EXT

  • European Telecommunications Satellite Organization - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • European Union Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUTELSAT - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUTELSAT (European Telecommunications Satellite Organization) - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EV SSL certificate (Extended Validation SSL certificate) - An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
  • Evaluation Assurance Level (EAL) - The Evaluation Assurance Level (EAL) is a grade assigned to an IT product or system after completing a Common Criteria security evaluation.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event log manager - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
  • Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
  • evidence-based medicine - Evidence-based medicine (EBM) is an approach to medicine featuring ongoing examination and modification to care, based on careful analysis of current research, science, patient information, doctors’ expertise and other available data sources.
  • Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
  • evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
  • evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
  • EVO:SDDC (EVO:RACK) - EVO:RACK is the development codename for EVO:SDDC, an enterprise-level, expandable rack-mounted hyper-converged infrastructure appliance from VMware.
  • evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
  • evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
  • Evolved Packet Core - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EWSD - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • exabyte - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • Exadata - Exadata (also called Oracle Exadata Database Machine) in-memory database appliance that supports OLTP (transactional) and OLAP (analytical) database systems.
  • exbi - Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC).
  • exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.
  • execute - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • execution - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
  • executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
  • executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
  • exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
  • exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
  • EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
  • expansion card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • expansion slot - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • expense report software - Expense report software is a computer program or suite that provides enterprise administrators with a clear picture of the organization's spending through automated analytics and reporting.
  • expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
  • explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • Explicitly Parallel Instruction Computing - (EPIC also stand for Electronic Privacy Information Center.
  • exploit kit (crimeware kit) - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
  • exponential key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
  • Extended Binary Coded Decimal Interchange Code� - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended binary-coded decimal interchange code - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
  • Extended Graphics Array - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • Extended Simple Mail Transfer Protocol - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • Extensible Access Control Markup Language - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • extensible application markup language - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • Extensible Authentication Protocol - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Configuration Checklist Description Format - XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists, benchmarks and related types of documents.
  • Extensible Markup Language - Extensible Markup Language (XML) is a text-based format that allows for the structuring of electronic documents and is not limited to a set of labels.
  • Extensible Stylesheet Language - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • extension strategy - An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline.
  • Exterior Gateway Protocol - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • Exterior Gateway Protocol (EGP) - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • external drive enclosure (disk enclosure, disk caddy, drive caddy) - An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close