Browse Definitions :

Browse Definitions by Alphabet

ERR - EVE

  • Error messages for Windows 2000 - Windows 2000 error messages.
  • Error messages for Windows XP Pro - MS Windows XP Professional Error Messages.
  • error-checking - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • errors - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • eRx incentive program - The Electronic Prescribing (eRx) Incentive Program is a US government program that provides financial incentives to physicians, practitioners and therapists who meet certain criteria for the use of qualified e-prescribing systems.
  • ES IS - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ES-IS - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ES-IS (End System-to-Intermediate System) - ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization (ISO) as part of their Open Systems Interconnection (OSI) model.
  • ESA - Enterprise Services Architecture (ESA) is SAP's enhanced version of service-oriented architecture (SOA).
  • escalation plan - An escalation plan is a set of procedures set in place to deal with potential problems in a variety of contexts.
  • ESCD - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • ESCD (Extended System Configuration Data) - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • ESCON - ESCON (Enterprise Systems Connection) is a marketing name for a set of IBM and vendor products that interconnect S/390 computers with each other and with attached storage, locally attached workstations, and other devices using optical fiber technology and dynamically modifiable switches called ESCON Directors.
  • ESCON (Enterprise Systems Connection) - ESCON (Enterprise Systems Connection) is a marketing name for a set of IBM and vendor products that interconnect S/390 computers with each other and with attached storage, locally attached workstations, and other devices using optical fiber technology and dynamically modifiable switches called ESCON Directors.
  • Escrowed Encryption Standard - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
  • Escrowed Encryption Standard (EES) - The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.
  • ESD - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • ESDI - ESDI (Enhanced Small Device Interface) is a hardware interface for a computer disk drive based on the ST-506 standard, an early industry and later ANSI standard based on the Seagate disk drive.
  • ESDI (Enhanced Small Device Interface) - ESDI (Enhanced Small Device Interface) is a hardware interface for a computer disk drive based on the ST-506 standard, an early industry and later ANSI standard based on the Seagate disk drive.
  • ESDRAM - ESDRAM (Enhanced Synchronous DRAM), made by Enhanced Memory Systems, includes a small static RAM in the SDRAM chip.
  • ESDRAM (Enhanced Synchronous DRAM) - ESDRAM (Enhanced Synchronous DRAM), made by Enhanced Memory Systems, includes a small static RAM in the SDRAM chip.
  • eServer - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • eServer iSeries 400 - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • ESMR - Also see Specialized Mobile Radio (SMR).
  • ESMR (Enhanced Specialized Mobile Radio) - Also see Specialized Mobile Radio (SMR).
  • ESMTP - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ESP - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • ESS - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • estimate - A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.
  • ESXi Shell - ESXi Shell is a VMware vSphere management tool that performs VMware commands that perform maintenance tasks like network, system, storage and more.
  • esxtop - Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment.
  • Ethereum - Ethereum is an open source, distributed software platform and cryptocurrency built off of blockchain technology.
  • EtherExpress - EtherExpress is a technology from Intel that is used in network server adapters (devices that attach the server to the network cable) for Ethernet-based local area networks (LANs).
  • EtherLoop - EtherLoop, sometimes called next generation DSL or second generation DSL, combines features of Digital Subscriber Line (DSL) with features of Ethernet to provide both voice and data transmission (including Internet connection) over any ordinary phone line at data rates faster than DSL.
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.
  • Ethernet as a service (EaaS) - Ethernet as a service (EaaS) is the use of high-bandwidth, fiber optic media such as Packet over SONET (PoS) to deliver 10 Mbps, 100 Mbps or even 1000 Mbps Ethernet service to one or more customers across a common bidirectional broadband infrastructure.
  • Ethernet Glossary - After you've finished, you can test your knowledge with Quiz #28: Ethernet.
  • Ethernet hard drive - An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.
  • Ethernet Industrial Protocol - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet IP - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • Ethernet modem - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • Ethernet point of presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet point-of-presence - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet point-of-presence (EPOP) - Ethernet point-of-presence (EPOP) is a technology developed by Level 3 Communications that provides widespread access to broadband networks.
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • ethical hacker - An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners -- and with their permission -- to find security vulnerabilities that a malicious hacker could potentially exploit.
  • ethical hacking - An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners -- and with their permission -- to find security vulnerabilities that a malicious hacker could potentially exploit.
  • ethical worm - An ethical worm is a program that automates network-based distribution of security patches for known vulnerabilities.
  • ETL - In managing databases, extract, transform, load (ETL) refers to three separate functions combined into a single programming tool.
  • ETRN - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • ETRN (Extended Turn) - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • ETSI - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • ETSI (European Telecommunications Standards Institute) - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • EU Data Protection Directive - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • EU Data Protection Directive (Directive 95/46/EC) - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • EU Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EU Transparency Directive (European Union Transparency Directive) - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUC - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • EUC platform - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • EULA - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • Euler diagram - An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.
  • Euler Mascheroni - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler Mascheroni constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Euler's constant (gamma or the Euler-Mascheroni constant) - Euler's constant, sometimes called gamma or the Euler-Mascheroni constant, has the mathematical value of.
  • Eurekster - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • euro - The euro (pronounced YUR-oh) is now the official monetary unit of 12 member nations of the European Union.
  • European Broadcasting Union - AES/EBU (Audio Engineering Society/European Broadcasting Union) is the name of a digital audio transfer standard.
  • European Cloud Computing Strategy (ECCS) - The European Cloud Computing Strategy (ECCS) is an initiative established by the European Commission to promote the adoption of cloud computing services.
  • European Computer Driving License - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Driving License (ECDL) - The European Computer Driving License (ECDL) is a certification for qualified computer operators in the same way that a regular driving license is a certification for qualified vehicle operators - although it differs in that one may lawfully operate a computer without a computer driving license.
  • European Computer Manufacturers Association Script - ECMAScript is a standard script language, developed with the cooperation of Netscape and Microsoft and mainly derived from Netscape's JavaScript, the widely-used scripting language that is used in Web pages to affect how they look or behave for the user.
  • European Global Navigation Satellite System - Galileo is the informal name for the European Global Navigation Satellite System (GNSS), a system that will offer users anywhere in the world "near pinpoint" geographic positioning when it becomes fully operational by 2008.
  • European Network and Information Security Agency - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • European Telecommunications Satellite Organization - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • European Telecommunications Standards Institute - The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications standards for Europe.
  • European Union Transparency Directive - The European Union (EU) Transparency Directive requires companies that trade securities on regulated markets in EU member states to publish financial information on a pan-European basis.
  • EUTELSAT - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUTELSAT (European Telecommunications Satellite Organization) - EUTELSAT (European Telecommunications Satellite Organization) refers to both the organization and its set of satellites that were placed in geostationary orbits over Europe beginning in 1983.
  • EUVL - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • EV DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • EV SSL certificate (Extended Validation SSL certificate) - An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
  • EV-DO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • EV-DO (1x Evolution-Data Optimized) - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • Evaluation Assurance Level (EAL) - The Evaluation Assurance Level (EAL) is a grade assigned to an IT product or system after completing a Common Criteria security evaluation.
  • EVDO - 1x Evolution-Data Optimized, (EV-DO) is a 3G wireless radio broadband data standard.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event log manager - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
  • event sink - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • event sink (listener) - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close