Browse Definitions :

Browse Definitions by Alphabet

E-B - EMO

  • e-bomb (electromagnetic bomb) - An e-bomb (electromagnetic bomb) is a weapon that uses an intense electromagnetic field to create a brief pulse of energy that affects electronic circuitry without harming humans or buildings.
  • e-business (electronic business) - E-business (electronic business) is the conduct of business processes on the internet.
  • e-commerce - E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
  • e-cycling - E-cycling is the practice of reusing, or distributing for reuse, electronic equipment and components rather than discarding them at the end of their life cycle.
  • e-learning (online learning) - E-learning (sometimes called web-based training) is anywhere, any-time instruction delivered over the internet or a corporate intranet to browser-equipped learners.
  • e-prescribing (electronic prescribing) - E-prescribing, or electronic prescribing is a technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
  • e-score - The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts.
  • e-signature - An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.
  • E-stop - E-stop (emergency stop) is a simple, highly visible button designed to shut down operations on heavy and/or dangerous equipment.
  • e-ticket (electronic ticket) - An e-ticket (electronic ticket) is a paperless electronic document used for ticketing passengers, particularly in the commercial airline industry.
  • E-Verify - E-Verify is a free web service that allows employers to confirm the legal eligibility of an individual who wants to work in the United States.
  • e-waste - E-waste is any refuse created by discarded electronic devices and components as well as substances involved in their manufacture or use.
  • E911 (Enhanced 911) - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • EAI (enterprise application integration) - Enterprise application integration (EAI) is the task of uniting the databases and workflows associated with business applications to ensure that the business uses the information consistently and that changes to core business data made by one application are correctly reflected in others.
  • early adopter - An early adopter is a person who embraces new technology before most other people do.
  • Earth's mean orbital speed - Earth's mean orbital speed is the average speed at which the Earth revolves around the sun.
  • Earth's mean radius - The Earth's mean radius is determined as the average distance from the physical center to the surface, based on a large number of samples.
  • east-west traffic - East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • EBCDIC (Extended Binary Coded Decimal Interchange Code)  - EBCDIC (Extended Binary Coded Decimal Interchange Code ) (pronounced either "ehb-suh-dik" or "ehb-kuh-dik") is a binary code for alphabetic and numeric characters that IBM developed for its larger operating systems.
  • ebXML (Electronic Business XML) - EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
  • Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
  • eClinicalWorks - eClinicalWorks is a Massachusetts-based company that sells electronic medical record (EMR), practice management (PM) and personal health record (PHR) software and services to reportedly more than 115,000 physicians and 70,000 facilities in the United States.
  • Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
  • economizer - An economizer is a mechanical device that reduces the amount of energy used to cool a data center or other buildings.
  • edge AI - Edge artificial intelligence (edge AI) is a paradigm for crafting AI workflows that span centralized data centers (the cloud) and devices outside the cloud that are closer to humans and physical things (the edge).
  • edge analytics - Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other device instead of waiting for the data to be sent back to a centralized data store.
  • edge data center - Edge data centers are small data centers that are located close to the edge of a network.
  • edge device - An edge device is any piece of hardware that controls data flow at the boundary between two networks.
  • edge node - An edge node is a computer that acts as an end user portal for communication with other nodes in cluster computing.
  • edge router - An edge router is a specialized router located at a network boundary that enables an internal network to connect to external networks.
  • edge virtualization - Edge virtualization is the practice of using software versions of physical computing resources at the edge of a network, closest to the devices that produce data.
  • EDRM (electronic discovery reference model) - The Electronic Discovery Reference Model (EDRM) is a framework that outlines standards for the recovery and discovery and of digital data.
  • edu - edu is one of the top-level domain names that can be used when choosing a domain name.
  • EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
  • eG Innovations - eG Innovations is an end-user experience and infrastructure monitoring software vendor best known for its eG Enterprise product.
  • EHR implementation plan - An electronic health record (EHR) implementation plan is a comprehensive set of strategies and steps used by a health care organization when preparing for and executing the adoption of an electronic-based health care system.
  • Eisenhower Matrix - The Eisenhower Matrix is a time management tool for prioritizing tasks.
  • Elastic Load Balancing (ELB) - Elastic Load Balancing (ELB) is a load-balancing service for Amazon Web Services (AWS) deployments.
  • Elastic Stack (ELK Stack) - The Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format, and search, analyze and visualize that data in real time.
  • electric field strength - Electric field strength is a quantitative expression of the intensity of an electric field at a particular location.
  • electric grid - An electric grid is a network of synchronized power providers and consumers that are connected by transmission and distribution lines and operated by one or more control centers.
  • Electric plugs for each country - Discover the electrical plugs, outlets and voltages used in different countries around the world.
  • electric vehicle charging station - An electric vehicle charging station is equipment that connects an EV to a source of electricity to recharge electric cars, neighborhood electric vehicles and plug-in hybrids.
  • electrical power management system (EPMS) - An electrical power management system (EPMS) is an electronic system that provides fine grained information about the flow of power in an electrical power generation system or power substation.
  • electromagnetic field - An electromagnetic field, sometimes referred to as an EM field, is generated when charged particles, such as electrons, are accelerated.
  • electromagnetic induction - Electromagnetic induction is the creation of an electro-motive force by way of a moving magnetic field around an electric conductor and, conversely, the creation of current by moving an electric conductor through a static magnetic field.
  • electromagnetic interference (EMI) - Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.
  • electromagnetic pulse (EMP) - An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electron s.
  • electron - An electron is a negatively charged subatomic particle that can be either bound to an atom or free (not bound).
  • Electronic Code Book (ECB) - Electronic Code Book (ECB) is a simple mode of operation with a block cipher that's mostly used with symmetric key encryption.
  • Electronic Communications Privacy Act (ECPA) - The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing communications without authorization.
  • Electronic Data Interchange (EDI) - Following specific standards, EDI is a way for businesses to securely transfer important data, such as invoices and purchase orders, via the Internet.
  • electronic data processing (EDP) - Electronic data processing (EDP) refers to the gathering of data using electronic devices, such as computers, servers or calculators.
  • electronic discovery (e-discovery or ediscovery) - Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.
  • electronic health record (EHR) - An electronic health record (EHR) is an individual's official health document that is shared among multiple facilities and agencies.
  • electronic intensive care unit (eICU) - An Electronic Intensive Care Unit (eICU) is a form or model of telemedicine where state-of-the-art technology is used to provide an additional layer of critical care service to patients.
  • electronic medical record (EMR) - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
  • Electronic Signatures in Global and National Commerce Act (e-signature bill) - The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.
  • electronically stored information (ESI) - Electronically stored information (ESI) is data created, altered, communicated and stored in digital form.
  • electrostatic discharge (ESD) - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • electrostatic field - When two objects in each other's vicinity have different electrical charges, an electrostatic field exists between them.
  • element - An element is a fundamental item that can't be easily broken into smaller pieces.
  • element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object, or number belongs to a certain set.
  • ELINT (electronic intelligence) - Electronic intelligence (ELINT) is intelligence gathered by the use of electronic sensors.
  • Elk Cloner - Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale.
  • elliptical curve cryptography (ECC) - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.
  • Eloqua - Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.
  • EM shielding (electromagnetic shielding) - EM shielding (electromagnetic shielding) is the practice of surrounding electronics and cables with conductive or magnetic materials to guard against incoming or outgoing emissions of electromagnetic frequencies (EMF).
  • email - Email (electronic mail) is the exchange of computer-stored messages from one user to one or more recipients via the internet.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email security - Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against the risk of email threats.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • embedded BI (embedded business intelligence) - Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications.
  • embedded device - An embedded device is part of a larger computing system and has a specific purpose.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
  • embedded operating system - An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function.
  • embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • emergency communications plan (EC plan) - An emergency communications plan (EC plan) provides guidelines, contact information and procedures for how information should be shared should a crisis that requires immediate action occur.
  • emergency management plan - An emergency management plan should include measures that provide for the safety of personnel and, if possible, property and facilities.
  • emergency notification system - Emergency notification systems contain names, addresses, phone numbers and email addresses so crucial information can be communicated to employees during a disaster.
  • Emergency Power Off (EPO) button - The Emergency Power Off (EPO) button -- sometimes called an EPO switch -- is a large red device in data centers that kills power to a particular piece of equipment, or to an entire facility, in the event of an emergency.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • eMMC (embedded MultiMediaCard) - An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close