Browse Definitions :

Browse Definitions by Alphabet

EVE - EXT

  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
  • evergreen - On the Internet, evergreen is a term used by some ad agencies to describe a Web site that is updated on a daily or other frequent basis.
  • Evernet - The term Evernet has been used to describe the convergence of wireless, broadband, and Internet telephony technologies that will result in the ability to be continuously connected to the Web anywhere using virtually any information device.
  • Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
  • evidence-based medicine - Evidence-based medicine (EBM) is an approach to medicine featuring ongoing examination and modification to care, based on careful analysis of current research, science, patient information, doctors’ expertise and other available data sources.
  • Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
  • evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • EVO:SDDC (EVO:RACK) - EVO:RACK is the development codename for EVO:SDDC, an enterprise-level, expandable rack-mounted hyper-converged infrastructure appliance from VMware.
  • evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
  • evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
  • evolutionary robotics - Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution.
  • Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
  • EWSD - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
  • exabyte - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
  • Exadata - Exadata (also called Oracle Exadata Database Machine) in-memory database appliance that supports OLTP (transactional) and OLAP (analytical) database systems.
  • exbi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • Excel Cheat Sheets - We've gathered resources from around the Web to help you work more effectively in Microsoft Excel.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • Exchange 2000 - E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.
  • Exchange 2013 data loss prevention (Exchange 2013 DLP) - Exchange 2013 data loss prevention is a feature in Exchange Server 2013 that allows administrators to manually enforce message content rules within their Exchange 2013 organization.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Deployment Assistant - The Exchange Deployment Assistant is a Web-based tool that helps administrators plan Exchange Server upgrades and installations.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Rate Mechanism - The Exchange Rate Mechanism (ERM) is part of the European Monetary Union (EMU) that began operating in 1999.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange Server 2013 Service Pack 1 (SP1) - Exchange Server 2013 SP1 is a service pack for Exchange Server 2013 that includes a number of new and updated Exchange Server 2013 features and capabilities.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • exchange to exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • exchange-to-exchange - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executable file (exe file) - An executable file (exe file) is a computer file that contains a sequence of instructions that the operating system can execute directly.
  • execute - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • execution - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
  • executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
  • executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
  • Exim - Exim is an open source mail transfer agent (MTA), which is a program responsible for receiving, routing, and delivering e-mail messages (this type of program is sometimes referred to as an Internet mailer, or a mail server program).
  • exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
  • exit program - In computer programming, an exit program (or exit routine) is a named unit of programming code that is entered when a particular condition occurs, such as one that requires some screening for authorization.
  • exit routine - In computer programming, an exit program (or exit routine) is a named unit of programming code that is entered when a particular condition occurs, such as one that requires some screening for authorization.
  • exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
  • EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
  • expansion card - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • expansion slot - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • expense report software - Expense report software is a computer program or suite that provides enterprise administrators with a clear picture of the organization's spending through automated analytics and reporting.
  • expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
  • explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • explicit parallelism - Explicit parallelism is a concept of processor-compiler efficiency in which a group of instructions is sent from the compiler to the processor for simultaneous rather than sequential execution.
  • Explicitly Parallel Instruction Computing - (EPIC also stand for Electronic Privacy Information Center.
  • exploit kit (crimeware kit) - An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.
  • exploratory model - The exploratory model is a systems development method (SDM) occasionally used to design and develop a computer system or product and basically consists of planning and trying different designs until one of them seems to be the right one to develop.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • exponent - An exponent is a quantity representing the power to which some other quantity is raised.
  • exponential assembly - In nanotechnology, exponential assembly is a form of self-replication in which tiny devices called nanorobots repeatedly construct copies of themselves.
  • exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
  • exponential key exchange - Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
  • export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
  • Express Bay - Express Bay is an externally accessible storage slot that is designed to accept a high-performance PCI Express (PCIe) solid-state drive (SSD),.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
  • Expression - Expression is Microsoft's new set of products for application designers.
  • Expression Graphic Designer - Expression Graphic Designer is Microsoft's new software tool for creating the images that appear in an application's user interface, or UI.
  • Expression Interactive Designer - Expression Interactive Designer is Microsoft's new tool for adding 3D images and multimedia content to an application's user interface, or UI.
  • Expression Web Designer - Expression Web Designer is Microsoft's new tool for building and enhancing Web sites with design elements such as cascading style sheets, personalized task panes and compatibility with non-Microsoft Web browsers like Firefox.
  • extended architecture - CD-ROM XA (Compact Disc - read-only-memory, extended architecture) is a modification of CD-ROM that defines two new types of sectors that enable it to read and display data, graphics, video, and audio at the same time.
  • Extended Binary Coded Decimal Interchange Code� - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended binary-coded decimal interchange code - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • extended data output RAM - EDO (extended data output) RAM is a type of random access memory (RAM) chip that improves the time to read from memory on faster microprocessors such as the Intel Pentium.
  • extended desktop - Extended desktop is a feature in a computer that allows a user to extend viewing capabilities by using two or more monitors at the same time.
  • extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
  • Extended Graphics Array - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • Extended Industry Standard Architecture - EISA is a standard bus (computer interconnection) architecture that extends the ISA standard to a 32-bit interface.
  • extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
  • extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
  • Extended Simple Mail Transfer Protocol - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • Extended System Configuration Data - In personal computers with Windows, ESCD (Extended System Configuration Data) is data that provides a computer's BIOS and the operating system with information for communicating with plug and play (PnP) devices.
  • Extended Turn - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • extensible - In information technology, extensible describes something, such as a program, programming language, or protocol, that is designed so that users or developers can expand or add to its capabilities.
  • Extensible Access Control Markup Language - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • extensible application markup language - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • Extensible Authentication Protocol - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close