Browse Definitions :

Browse Definitions by Alphabet

EXC - WHA

  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Deployment Assistant - The Exchange Deployment Assistant is a Web-based tool that helps administrators plan Exchange Server upgrades and installations.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange Server 2013 Service Pack 1 (SP1) - Exchange Server 2013 SP1 is a service pack for Exchange Server 2013 that includes a number of new and updated Exchange Server 2013 features and capabilities.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • exchange to exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • exchange-to-exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.
  • execute - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • execution - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
  • executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
  • executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
  • exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
  • exit routine - In computer programming, an exit program (or exit routine) is a named unit of programming code that is entered when a particular condition occurs, such as one that requires some screening for authorization.
  • exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
  • EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
  • expansion card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • expansion slot - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • expense report software - Expense report software is a computer program or suite that provides enterprise administrators with a clear picture of the organization's spending through automated analytics and reporting.
  • expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
  • explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • explicit parallelism - Explicit parallelism is a concept of processor-compiler efficiency in which a group of instructions is sent from the compiler to the processor for simultaneous rather than sequential execution.
  • Explicitly Parallel Instruction Computing - (EPIC also stand for Electronic Privacy Information Center.
  • exploit kit (crimeware kit) - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
  • exponential key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • Express Bay - Express Bay is an externally accessible storage slot that is designed to accept a high-performance PCI Express (PCIe) solid-state drive (SSD),.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
  • extended architecture - CD-ROM XA (Compact Disc - read-only-memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video, and audio at the same time.
  • Extended Binary Coded Decimal Interchange Code� - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended binary-coded decimal interchange code - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended data output RAM - EDO (extended data output) RAM is a type of random access memory (RAM) chip that improves the time to read from memory on faster microprocessors such as the Intel Pentium.
  • extended desktop - Extended desktop is a feature in a computer that allows a user to extend viewing capabilities by using two or more monitors at the same time.
  • extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
  • Extended Graphics Array - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • Extended Industry Standard Architecture - EISA is a standard bus (computer interconnection) architecture that extends the ISA standard to a 32-bit interface.
  • extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • Extended Simple Mail Transfer Protocol - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • Extended System Configuration Data - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • Extended Turn - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • extensible - In information technology, extensible describes something, such as a program, programming language, or protocol, that is designed so that users or developers can expand or add to its capabilities.
  • Extensible Access Control Markup Language - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • extensible application markup language - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • Extensible Authentication Protocol - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • Extensible Business Reporting Language - XBRL (Extensible Business Reporting Language) is an XML-based computer language for the electronic transmission of business and financial data.
  • Extensible Configuration Checklist Description Format - XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists, benchmarks and related types of documents.
  • Extensible Hypertext Markup Language - As the World Wide Web Consortium (W3C) describes it, XHTML (Extensible Hypertext Markup Language) is "a reformulation of HTML 4.
  • Extensible Markup Language - Extensible Markup Language (XML) is a text-based format that allows for the structuring of electronic documents and is not limited to a set of labels.
  • Extensible Messaging and Presence Protocol - XMPP (Extensible Messaging and Presence Protocol) is a protocol based on Extensible Markup Language (XML) and intended for instant messaging (IM) and online presence detection.
  • Extensible Name Service - Extensible Name Service (XNS) is an open Extensible Markup Language (XML)-based protocol that specifies a way to establish and manage a universal addressing system.
  • Extensible Public Relations Language - XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.
  • Extensible Rights Markup Language - XrML (Extensible Rights Markup Language) is a proposed standard digital rights management (DRM) markup language.
  • Extensible Stylesheet Language - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • Extensible User interface Language - XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
  • Extensible User-interface Language - XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
  • extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
  • extension strategy - An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline.
  • Exterior Gateway Protocol - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • Exterior Gateway Protocol (EGP) - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
  • external drive enclosure (disk enclosure, disk caddy, drive caddy) - An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.
  • external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
  • external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
  • extract transform load - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
  • extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • extranet - An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
  • extrapolation and interpolation - Extrapolation is an estimation of a value based on extending a known sequence of values or facts beyond the area that is certainly known.
  • Extreme Programming - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • Extreme Programming (XP) - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • extreme ultraviolet lithography - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • extreme ultraviolet lithography (EUVL) - Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today.
  • extremely low frequency - ELF (extremely low frequency) refers to an electromagnetic field having a frequency much lower than the frequencies of signals typically used in communications.
  • extrusion prevention - Extrusion prevention, also called exfiltration prevention, is the practice of stopping data leaks by filtering outbound network traffic and preventing unauthorized packets from moving outside the network.
  • eye tracking (gaze tracking) - Eye tracking is the process of electronically locating the point of a person's gaze, or following and recording the movement of the point of gaze.
  • ezine - The term ezine is short for "electronic magazine.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • EZPass - E-ZPass is a toll collection system in the northeastern U.
  • Oracle extents - Oracle extents are a set of contiguous blocks allocated in an Oracle database.
  • What is edge computing? Everything you need to know - Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
  • What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close