Browse Definitions by Alphabet

  • e-business (electronic business) - E-business (electronic business) is the conduct of business processes on the internet.
  • e-commerce - E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
  • e-cycling - E-cycling, also known as 'electronic recycling,' is the reuse or recycling of used electronic materials to limit e-waste.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
  • e-score - The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts.
  • E-Sign Act (Electronic Signatures in Global and National Commerce Act) - The E-Sign Act (Electronic Signatures in Global and National Commerce Act) is a U.
  • e-signature (electronic signature) - An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.
  • e-ticket (electronic ticket) - An e-ticket (electronic ticket) is a paperless electronic document used for ticketing purposes, such as airfare or concert admission.
  • E-Verify - E-Verify is a free web service that allows employers to confirm the legal eligibility of an individual who wants to work in the United States.
  • e-waste - Electronic waste, also known as end-of-life (EOL) electronics or e-waste, refers to discarded, recycled or refurbished electrical and electronic products.
  • EAI (enterprise application integration) - Enterprise application integration (EAI) is the process of connecting an organization's business applications, services, databases and other systems into an integrating framework that facilitates communications and interoperability.
  • early adopter - An early adopter refers to a person who embraces new technology or tries a new product before most others.
  • east-west traffic - East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center.
  • eavesdropping - Eavesdropping is the act of listening to, recording or intercepting private communications.
  • ebXML (Electronic Business XML) - EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • eClinicalWorks - eClinicalWorks is a Massachusetts-based company that sells electronic medical record (EMR), practice management (PM) and personal health record (PHR) software and services to reportedly more than 115,000 physicians and 70,000 facilities in the United States.
  • Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
  • economizer - An economizer is a mechanical device that reduces the amount of energy used to cool a data center or other buildings.
  • edge AI - Edge artificial intelligence (edge AI) is a paradigm for crafting AI workflows that span centralized data centers (the cloud) and devices outside the cloud that are closer to humans and physical things (the edge).
  • edge data center - An edge data center is a small data center that is located close to the edge of a network.
  • edge node - An edge node is a computer that acts as an end user portal for communication with other nodes in cluster computing.
  • edge virtualization - Edge virtualization is the practice of using software versions of physical computing resources at the edge of a network, closest to the devices that produce data.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • EG Innovations - EG Innovations is an end-user experience and infrastructure monitoring software vendor best known for its EG Enterprise product.
  • Eisenhower Matrix - The Eisenhower Matrix is a time management tool for prioritizing tasks.
  • electric field strength - Electric field strength is a quantitative expression of the intensity of an electric field at a particular location.
  • electric grid - An electric grid is a network of synchronized power providers and consumers that are connected by transmission and distribution lines and operated by one or more control centers.
  • Electric plugs for each country - Discover the electrical plugs, outlets and voltages used in different countries around the world.
  • electric vehicle charging station - An electric vehicle charging station is equipment that connects an EV to a source of electricity to recharge electric cars, neighborhood electric vehicles and plug-in hybrids.
  • electrical power management system (EPMS) - An electrical power management system (EPMS) is an electronic system that provides fine grained information about the flow of power in an electrical power generation system or power substation.
  • electromagnetic field - An electromagnetic field, sometimes referred to as an EM field, is generated when charged particles, such as electrons, are accelerated.
  • electromagnetic induction - Electromagnetic induction is the creation of an electro-motive force by way of a moving magnetic field around an electric conductor and, conversely, the creation of current by moving an electric conductor through a static magnetic field.
  • electromagnetic interference (EMI) - Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.
  • Electronic Code Book (ECB) - Electronic Code Book (ECB) is a simple mode of operation with a block cipher that's mostly used with symmetric key encryption.
  • Electronic Communications Privacy Act (ECPA) - The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing communications without authorization.
  • Electronic Data Interchange (EDI) - Electronic Data Interchange (EDI) is the transfer of data from one computer system to another by standardized message formatting without the need for human intervention.
  • electronic discovery (e-discovery or ediscovery) - Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.
  • Electronic Discovery Reference Model (EDRM) - The Electronic Discovery Reference Model (EDRM) is a conceptual framework that outlines activities for the recovery and discovery of digital data.
  • electronic intelligence (ELINT) - Electronic intelligence (ELINT) is intelligence gathered using electronic sensors, usually used in military applications.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information that is produced, saved, transferred or received in an electronic form.
  • electronically stored information (ESI) - Electronically stored information (ESI) is data that is created, altered, communicated and stored in digital form.
  • electrostatic discharge (ESD) - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • element - An element is a fundamental item that can't be easily broken into smaller pieces.
  • element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object or number belongs to a certain set.
  • Elk Cloner - Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale.
  • elliptical curve cryptography (ECC) - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.
  • Eloqua - Eloqua is a marketing automation platform that follows a cloud-based software-as-a-service (SaaS) model.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email security - Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against unauthorized access and email threats.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email signature - An email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender.
  • email spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
  • embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
  • embodied carbon - Embodied carbon is the measurable greenhouse gas emissions of an infrastructure's entire construction, maintenance and demolition processes.
  • emergency communications plan (EC plan) - An emergency communications plan (EC plan) is a document that provides guidelines, contact information and procedures for how information should be shared during all phases of an unexpected occurrence that requires immediate action.
  • emergency notification system - An emergency notification system is an automated method of contacting a group of people within an organization and distributing important information during a crisis.
  • emergency power off (EPO) button - The emergency power off button, also called an EPO switch or EPO panel, is a safety measure for quickly disconnecting electrical power to a particular piece of equipment or facility in the event of an emergency.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • empiricism - Empiricism is a philosophical theory applicable in many disciplines, including science and software development, that human knowledge comes predominantly from experiences gathered through the five senses.
  • employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
  • employee engagement - Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.
  • employee experience - Employee experience is a worker's perception of the organization they work for during their tenure.
  • employee lifecycle - The employee lifecycle is a human resources model that identifies the different stages a worker advances through in an organization and the role HR plays in optimizing that process.
  • employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
  • employee onboarding and offboarding - Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding involves separating an employee from a firm.
  • employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
  • employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
  • employee productivity - Employee productivity, sometimes referred to as workforce productivity, is an assessment of the efficiency of a worker or group of workers.
  • employee resource group (ERG) - An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or identity.
  • employee retention - Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a positive work atmosphere to promote engagement.
  • employee sentiment analysis - Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.
  • employee training and development - Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of employees.
  • employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • encapsulation (object-orientated programming) - In object-oriented programming (OOP), encapsulation is the practice of bundling related data into a structured unit, along with the methods used to work with that data.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • Encrypting File System (EFS) - Encrypting File System (EFS) provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS.
  • encryption key - In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
  • encryption key management - Encryption key management is the practice of generating, organizing, protecting, storing, backing up and distributing encryption keys.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product's existence.
  • end-to-end encryption (E2EE) - End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • end-to-end testing - End-to-end (E2E) testing is a software testing methodology that verifies the working order of a software product in a start-to-finish process.
  • end-user computing (EUC) - End-user computing (EUC) is a term that refers to the technologies that IT professionals use to deploy, manage and secure the devices, applications and data that workers require to perform their jobs.
  • end-user experience monitoring (EUEM) - End-user experience monitoring (EUEM) is the process of monitoring the performance of IT resources from the perspective of an end user.
  • endpoint device - An endpoint device is an internet-capable computer hardware device on a TCP/IP network.
  • engineering bill of materials (EBOM) - An engineering bill of materials (EBOM) is a product recipe structured from the design standpoint, rather than the manufacturing standpoint.
  • enhanced driver's license (EDL) - An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's biographical and biometric data.
  • Enhanced Interior Gateway Routing Protocol (EIGRP) - Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).
  • ENIAC (Electronic Numerical Integrator And Computer) - ENIAC (Electronic Numerical Integrator And Computer) was the world's first general-purpose electronic computer.
  • Enterprise 2.0 - Enterprise 2.
  • enterprise agility - Enterprise agility is a paradigm for scaling agile methodologies beyond development teams.
  • enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of organizations.