Browse Definitions :

Browse Definitions by Alphabet

EU - EXP

  • EU Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EU Transparency Directive (European Union Transparency Directive) - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUC - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • EUC platform - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • EULA - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • Euler diagram - An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.
  • Euler Mascheroni - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler Mascheroni constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant (gamma or the Euler-Mascheroni constant) - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Eurekster - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • European Broadcasting Union - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • European Cloud Computing Strategy (ECCS) - The European Cloud Computing Strategy (ECCS) is an initiative established by the European Commission to promote the adoption of cloud computing services.
  • European Computer Driving License - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Driving License (ECDL) - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Manufacturers Association Script - ECMAScript is a standard script language, developed with the cooperation of Netscape and Microsoft and mainly derived from Netscape's JavaScript, the widely-used scripting language that is used in Web pages to affect how they look or behave for the user.
  • European Global Navigation Satellite System - Galileo is the informal name for the European Global Navigation Satellite System (GNSS), a system that will offer users anywhere in the world "near pinpoint" geographic positioning when it becomes fully operational by 2008.
  • European Network and Information Security Agency - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • European Telecommunications Satellite Organization - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • European Telecommunications Standards Institute - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • European Union Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUTELSAT - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUTELSAT (European Telecommunications Satellite Organization) - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUVL - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • EV DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • EV SSL certificate (Extended Validation SSL certificate) - An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
  • EV-DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • Evaluation Assurance Level (EAL) - The Evaluation Assurance Level (EAL) is a grade assigned to an IT product or system after completing a Common Criteria security evaluation.
  • EVDO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event log manager - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event sink - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
  • Evernet - The term Evernet has been used to describe the convergence of wireless, broadband, and Internet telephony technologies that will result in the ability to be continuously connected to the Web anywhere using virtually any information device.
  • Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
  • evidence-based medicine - Evidence-based medicine (EBM) is an approach to medicine featuring ongoing examination and modification to care, based on careful analysis of current research, science, patient information, doctors’ expertise and other available data sources.
  • Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
  • evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • EVO:SDDC (EVO:RACK) - EVO:RACK is the development codename for EVO:SDDC, an enterprise-level, expandable rack-mounted hyper-converged infrastructure appliance from VMware.
  • evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
  • evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
  • evolutionary robotics - Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution.
  • Evolved Packet Core - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EWSD - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • exabyte - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • Exadata - Exadata (also called Oracle Exadata Database Machine) in-memory database appliance that supports OLTP (transactional) and OLAP (analytical) database systems.
  • exbi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • Excel Cheat Sheets - We've gathered resources from around the Web to help you work more effectively in Microsoft Excel.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • Exchange 2000 - E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.
  • Exchange 2013 data loss prevention (Exchange 2013 DLP) - Exchange 2013 data loss prevention is a feature in Exchange Server 2013 that allows administrators to manually enforce message content rules within their Exchange 2013 organization.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Deployment Assistant - The Exchange Deployment Assistant is a Web-based tool that helps administrators plan Exchange Server upgrades and installations.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange Server 2013 Service Pack 1 (SP1) - Exchange Server 2013 SP1 is a service pack for Exchange Server 2013 that includes a number of new and updated Exchange Server 2013 features and capabilities.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • exchange to exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • exchange-to-exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.
  • execute - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • execution - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
  • executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
  • executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
  • exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
  • exit routine - In computer programming, an exit program (or exit routine) is a named unit of programming code that is entered when a particular condition occurs, such as one that requires some screening for authorization.
  • exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
  • EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close