Browse Definitions :

Browse Definitions by Alphabet

EOM - EU

  • EOM (end of message) - EOM stands for "end of message.
  • epaper - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • EPC - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EPD - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • EPEAT - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • EPG - An electronic program guide (EPG) is an application used with digital set-top boxes and newer television sets to list current and scheduled programs that are or will be available on each channel and a short summary or commentary for each program.
  • ephemeral messaging - Ephemeral messaging is the mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient's screen after the message has been viewed.
  • ePHI - Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
  • EPIC - (EPIC also stand for Electronic Privacy Information Center.
  • EPIC (Explicitly Parallel Instruction Computing) - (EPIC also stand for Electronic Privacy Information Center.
  • Epic Systems - Epic Systems is one of the largest providers of health information technology, used primarily by large U.
  • Epicor Software Corp. - Epicor Software Corp.
  • EPM - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
  • epoch - In a computing context, an epoch is the date and time relative to which a computer's clock and timestamp values are determined.
  • EPOD - Electronic publishing on demand (EPOD) is the use of a digital printer to create a book.
  • EPOP - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • EPP - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • EPP/ECP - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) - EPP/ECP (Enhanced Parallel Port/Enhanced Capability Port) is a standard signaling method for bi-directional parallel communication between a computer and peripheral devices that offers the potential for much higher rates of data transfer than the original parallel signaling methods.
  • EPR - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • EPROM - EPROM (erasable programmable read-only memory) is programmable read-only memory (programmable ROM) that can be erased and re-used.
  • Equal Employment Opportunity Commission (EEOC) - The Equal Employment Opportunity Commission (EEOC) is a federal agency of the United States government that is responsible for enforcing civil rights laws against workplace discrimination.
  • equilibrium price - An equilibrium price, also known as a market-clearing price, is the consumer cost assigned to some product or service such that supply and demand are equal, or close to equal.
  • equipment destruction attack - An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment.
  • equity crowdfunding - Equity crowdfunding is a variation on the crowdsource model that offers contributors the ability to purchase stock in a business.
  • ER diagram - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • ER model - The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.
  • eraser pointer - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • erasure coding - Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations or storage media.
  • erbium amplifier - An erbium amplifier, also called optical amplifier or an erbium-doped fiber amplifier or EDFA, is an optical or IR repeater that amplifies a modulated laser beam directly, without opto-electronic and electro-optical conversion.
  • erbium-doped fiber amplifier - An erbium amplifier, also called optical amplifier or an erbium-doped fiber amplifier or EDFA, is an optical or IR repeater that amplifies a modulated laser beam directly, without opto-electronic and electro-optical conversion.
  • ERD - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • ergonomic - Ergonomics (from the Greek word "ergon" meaning work, and "nomoi" meaning natural laws), is the science of refining the design of products to optimize them for human use.
  • ergonomics - Ergonomics (from the Greek word "ergon" meaning work, and "nomoi" meaning natural laws), is the science of refining the design of products to optimize them for human use.
  • ergonomics - In industry, human factors (also known as ergonomics) is the study of how humans behave physically and psychologically in relation to particular environments, products, or services.
  • erlang - The Erlang programming language is not the same thing as the erlang, a unit of traffic density.
  • Erlang B - Erlang B is a modeling formula that is widely used in call center scheduling.
  • Erlang C - Erlang C is a traffic modeling formula used in call center scheduling to calculate delays or predict waiting times for callers.
  • Erlang programming language - Erlang is a programming language designed for developing robust systems of programs that can be distributed among different computers in a network.
  • ERM - Enterprise relationship management (ERM) is software that analyzes data it has about its customers to develop a better understanding of the customer and how the customer is using its products and services.
  • ERM - Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.
  • ERM - The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.
  • ERM - ERM (Environmental Resource Management) is a global organization of environmental, health, and safety experts, known as the ERM Group, with more than 110 worldwide locations.
  • ERM - ERM also stands for enterprise relationship management.
  • ERM Group - ERM (Environmental Resource Management) is a global organization of environmental, health, and safety experts, known as the ERM Group, with more than 110 worldwide locations.
  • ERM Group (Environmental Resource Management) - ERM (Environmental Resource Management) is a global organization of environmental, health, and safety experts, known as the ERM Group, with more than 110 worldwide locations.
  • ERMS - An email response management service (ERMS) is a set of programs that automatically handles email messages and attachments according to user-defined rules.
  • ERP - ERP, or enterprise resource planning, is modular software designed to integrate the main functional areas of an organization's business processes into a unified system.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is modular software designed to integrate the main functional areas of an organization's business processes into a unified system.
  • ERP finance module - The ERP finance module is the software component that handles the main accounting and financial management functions of an enterprise resource planning system.
  • error checking and correcting - ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be checked for errors and, when necessary, corrected on the fly.
  • error correction code - ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be checked for errors and, when necessary, corrected on the fly.
  • error handling - Error handling refers to the anticipation, detection, and resolution of programming, application, and communications errors.
  • error-checking - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • errors - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • eRx incentive program - The Electronic Prescribing (eRx) Incentive Program is a US government program that provides financial incentives to physicians, practitioners and therapists who meet certain criteria for the use of qualified e-prescribing systems.
  • ES IS - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ES-IS - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ES-IS (End System-to-Intermediate System) - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ESA - Enterprise Services Architecture (ESA) is SAP's enhanced version of service-oriented architecture (SOA).
  • ESB - An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.
  • ESCD - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • ESCD (Extended System Configuration Data) - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • ESCON - ESCON (Enterprise Systems Connection) is a marketing name for a set of IBM and vendor products that interconnect S/390 computers with each other and with attached storage, locally attached workstations, and other devices using optical fiber technology and dynamically modifiable switches called ESCON Directors.
  • Escrowed Encryption Standard - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
  • ESD - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • ESDI - ESDI (Enhanced Small Device Interface) is a hardware interface for a computer disk drive based on the ST-506 standard, an early industry and later ANSI standard based on the Seagate disk drive.
  • ESDI (Enhanced Small Device Interface) - ESDI (Enhanced Small Device Interface) is a hardware interface for a computer disk drive based on the ST-506 standard, an early industry and later ANSI standard based on the Seagate disk drive.
  • ESDRAM - ESDRAM (Enhanced Synchronous DRAM), made by Enhanced Memory Systems, includes a small static RAM in the SDRAM chip.
  • ESDRAM (Enhanced Synchronous DRAM) - ESDRAM (Enhanced Synchronous DRAM), made by Enhanced Memory Systems, includes a small static RAM in the SDRAM chip.
  • eServer - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • eServer iSeries 400 - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • ESMR - Also see Specialized Mobile Radio (SMR).
  • ESMTP - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ESP - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • ESS - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • estimate - A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.
  • ESXi Shell - ESXi Shell is a VMware vSphere management tool that performs VMware commands that perform maintenance tasks like network, system, storage and more.
  • esxtop - Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment.
  • Ethereum - Ethereum is an open source, distributed software platform and cryptocurrency built off of blockchain technology.
  • EtherExpress - EtherExpress is a technology from Intel that is used in network server adapters (devices that attach the server to the network cable) for Ethernet-based local area networks (LANs).
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.
  • Ethernet as a service - Ethernet as a service (EaaS) is the use of high-bandwidth, fiber optic media such as Packet over SONET (PoS) to deliver 10 Mbps, 100 Mbps or even 1000 Mbps Ethernet service to one or more customers across a common bidirectional broadband infrastructure.
  • Ethernet Glossary - After you've finished, you can test your knowledge with Quiz #28: Ethernet.
  • Ethernet hard drive - An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.
  • Ethernet Industrial Protocol - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet IP - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet modem - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • Ethernet point of presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet point-of-presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • ethical hacker - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • ethical hacking - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • ETL - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • ETRN - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • ETSI - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • EU Data Protection Directive - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • EU Data Protection Directive (Directive 95/46/EC) - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close