Browse Definitions :

Browse Definitions by Alphabet

ESP - EXC

  • ESP - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • ESS - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • estimate - A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.
  • ESXi Shell - ESXi Shell is a VMware vSphere management tool that performs VMware commands that perform maintenance tasks like network, system, storage and more.
  • esxtop - Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment.
  • Ethereum - Ethereum is an open source, distributed software platform and cryptocurrency built off of blockchain technology.
  • EtherExpress - EtherExpress is a technology from Intel that is used in network server adapters (devices that attach the server to the network cable) for Ethernet-based local area networks (LANs).
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.
  • Ethernet as a service - Ethernet as a service (EaaS) is the use of high-bandwidth, fiber optic media such as Packet over SONET (PoS) to deliver 10 Mbps, 100 Mbps or even 1000 Mbps Ethernet service to one or more customers across a common bidirectional broadband infrastructure.
  • Ethernet Glossary - After you've finished, you can test your knowledge with Quiz #28: Ethernet.
  • Ethernet hard drive - An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.
  • Ethernet Industrial Protocol - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet IP - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet modem - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • Ethernet point of presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet point-of-presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • ethical hacker - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • ethical hacking - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • ETL - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • ETRN - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • ETSI - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • EU Data Protection Directive - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • EU Data Protection Directive (Directive 95/46/EC) - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • EU Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EU Transparency Directive (European Union Transparency Directive) - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUC - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • EUC platform - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • EULA - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • Euler diagram - An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.
  • Euler Mascheroni - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler Mascheroni constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant (gamma or the Euler-Mascheroni constant) - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Eurekster - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • European Broadcasting Union - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • European Cloud Computing Strategy (ECCS) - The European Cloud Computing Strategy (ECCS) is an initiative established by the European Commission to promote the adoption of cloud computing services.
  • European Computer Driving License - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Driving License (ECDL) - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Manufacturers Association Script - ECMAScript is a standard script language, developed with the cooperation of Netscape and Microsoft and mainly derived from Netscape's JavaScript, the widely-used scripting language that is used in Web pages to affect how they look or behave for the user.
  • European Global Navigation Satellite System - Galileo is the informal name for the European Global Navigation Satellite System (GNSS), a system that will offer users anywhere in the world "near pinpoint" geographic positioning when it becomes fully operational by 2008.
  • European Network and Information Security Agency - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • European Telecommunications Satellite Organization - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • European Telecommunications Standards Institute - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • European Union Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUTELSAT - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUTELSAT (European Telecommunications Satellite Organization) - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUVL - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • EV DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • EV SSL certificate (Extended Validation SSL certificate) - An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
  • EV-DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • EV-DO (1x Evolution-Data Optimized) - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • Evaluation Assurance Level (EAL) - The Evaluation Assurance Level (EAL) is a grade assigned to an IT product or system after completing a Common Criteria security evaluation.
  • EVDO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event log manager - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event sink - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
  • Evernet - The term Evernet has been used to describe the convergence of wireless, broadband, and Internet telephony technologies that will result in the ability to be continuously connected to the Web anywhere using virtually any information device.
  • Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
  • evidence-based medicine - Evidence-based medicine (EBM) is an approach to medicine featuring ongoing examination and modification to care, based on careful analysis of current research, science, patient information, doctors’ expertise and other available data sources.
  • Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
  • evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • EVO:SDDC (EVO:RACK) - EVO:RACK is the development codename for EVO:SDDC, an enterprise-level, expandable rack-mounted hyper-converged infrastructure appliance from VMware.
  • evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
  • evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
  • evolutionary robotics - Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution.
  • Evolved Packet Core - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EWSD - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • exabyte - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • Exadata - Exadata (also called Oracle Exadata Database Machine) in-memory database appliance that supports OLTP (transactional) and OLAP (analytical) database systems.
  • exbi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • Excel Cheat Sheets - We've gathered resources from around the Web to help you work more effectively in Microsoft Excel.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • Exchange 2000 - E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.
  • Exchange 2013 data loss prevention (Exchange 2013 DLP) - Exchange 2013 data loss prevention is a feature in Exchange Server 2013 that allows administrators to manually enforce message content rules within their Exchange 2013 organization.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close