Browse Definitions :

Browse Definitions by Alphabet

ELE - END

  • electronic medical billing - Electronic medical billing is the process by which a health care provider electronically submits a bill, or claim, to a health insurance company, or payer, for the rendering of medical services.
  • electronic medical record (EMR) - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • electronic newspaper - An electronic newspaper is a self-contained, reusable, and refreshable version of a traditional newspaper that acquires and holds information electronically.
  • electronic nose (e-nose) - An electronic nose (e-nose) is a device that identifies the specific components of an odor and analyzes its chemical makeup to identify it.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
  • electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • Electronic Signatures in Global and National Commerce Act (e-signature bill) - The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.
  • electronically stored information (ESI) - Electronically stored information (ESI) is data created, altered, communicated and stored in digital form.
  • electrostatic discharge (ESD) - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
  • electrostatic field - When two objects in each other's vicinity have different electrical charges, an electrostatic field exists between them.
  • elegant solution - The word elegant, in general, is an adjective meaning of fine quality.
  • element - In chemistry and physics, an element is a substance that cannot be broken down into simpler components by any non-nuclear chemical reaction.
  • element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object, or number belongs to a certain set.
  • elementary charge - An elementary charge is the electrical charge carried by a single electron.
  • ELINT (electronic intelligence) - Electronic intelligence (ELINT) is intelligence gathered by the use of electronic sensors.
  • Elk Cloner - Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale.
  • elliptical curve cryptography (ECC) - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.
  • Eloqua - Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.
  • EM shielding (electromagnetic shielding) - EM shielding (electromagnetic shielding) is the practice of surrounding electronics and cables with conductive or magnetic materials to guard against incoming or outgoing emissions of electromagnetic frequencies (EMF).
  • email - Email (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email address internationalization (EAI) - Email address internationalization (EAI) is a process that enables email addresses with either the domain name or mailbox name in different languages and scripts to work properly when sending and receiving emails.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email security - Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against the risk of email threats.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • embedded BI (embedded business intelligence) - Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications.
  • embedded device - An embedded device is an object that contains a special-purpose computing system.
  • embedded device hacking - Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
  • embedded IT - Embedded IT is the process of inserting information technology staff and expertise into other business units in order to quickly and more effectively identify and pursue new business opportunities and increase the likelihood that IT projects are deployed successfully.
  • embedded operating system - An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function.
  • embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
  • embedded vision - Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.
  • EmbeddedJava - EmbeddedJava is Sun Microsystems' software development platform for dedicated-purpose devices with embedded systems, such as products designed for the automotive, telecommunication, and industrial device markets.
  • EMC cloud architect certification (EMCCA) - EMC Cloud Architect Certification (EMCCA) is a certification and training offering by storage vendor EMC on high-level cloud architecture and design concepts.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • emergency communications plan (EC plan) - An emergency communications plan (EC plan) provides guidelines, contact information and procedures for how information should be shared should a crisis that requires immediate action occur.
  • emergency management plan - An emergency management plan should include measures that provide for the safety of personnel and, if possible, property and facilities.
  • emergency notification system - Emergency notification systems contain names, addresses, phone numbers and email addresses so crucial information can be communicated to employees during a disaster.
  • Emergency Power Off (EPO) button - The Emergency Power Off (EPO) button -- sometimes called an EPO switch -- is a large red device in data centers that kills power to a particular piece of equipment, or to an entire facility, in the event of an emergency.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • EMF (Enhanced MetaFile) - EMF (Enhanced MetaFile) and raw are terms for spool file formats used in printing by the Windows operating system.
  • EMMA (Enabling Mobile Machine Automation) - EMMA (Enabling Mobile Machine Automation) is the autonomy-enabling operating system behind Brain Corp’s autonomy as a service offering for existing floor-cleaning and polishing machines.
  • eMMC (embedded MultiMediaCard) - An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.
  • emoji - An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • employee activism - Employee activism is actions taken by workers to speak out for or against their employers on controversial issues that impact society.
  • employee advocacy - Employee advocacy is the promotion of an organization by its staff members.
  • employee assistance program (EAP) - An employee assistance program (EAP) is an arrangement between a corporation, academic institution or government agency and its employees that provides a variety of support programs for the employees.
  • employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
  • employee engagement - Employee engagement is the emotional connection an employee experiences that results in a willingness to expend discretionary effort at work.
  • employee engagement software - Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.
  • employee experience - Employee experience is a worker's perceptions about his or her journey through all the touchpoints at a particular company, starting with job candidacy through to the exit from the company.
  • employee life cycle - Employee life cycle -- also spelled employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization in, as well as the role HR plays in optimizing that progress.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
  • employee onboarding and offboarding - Employee onboarding and offboarding are two core HR activities that are gaining in importance.
  • employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
  • employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
  • employee productivity - Employee productivity is an assessment of the efficiency of a worker or group of workers.
  • employee pulse survey - An employee pulse survey is a review model used by employers to receive company feedback from employees in an efficient, routine way.
  • employee resource groups (ERGs) - Employee resource groups are workplace clubs or more formally realized affinity group organized around a shared interest or identity.
  • employee retention - Employee retention is the organizational goal of keeping talented employees and reducing turnover by fostering a positive work atmosphere to promote engagement, showing appreciation to employees, and providing competitive pay and benefits and healthy work-life balance.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • employee sentiment analysis - Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.
  • employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • EMV card - An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.
  • encapsulation - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • Encrypting File System (EFS) - Encrypting File System (EFS) provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS.
  • encryption - Encryption is the method by which information is converted into secret code that hides the information's true meaning.
  • encryption as a service (EaaS) - Encryption as a Service (EaaS) is a subscription model that allows cloud service customers to take advantage of the security that encryption offers without having to install and use encryption on their own.
  • encryption key - In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • Encyclopedia of Ethical Failure (EEF) - The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence.
  • end user - In information technology, the term end user is used to distinguish the person for whom a hardware or software product is designed from the developers, installers, and servicers of the product.
  • end user policy - An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets.
  • end-to-end encryption (E2EE) - End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • end-to-end testing - End-to-end testing is a methodology that assesses the working order of a complex product in a start-to-finish process.
  • end-user computing (EUC) - End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.
  • endpoint authentication (device authentication) - Endpoint authentication is a security mechanism designed to ensure that only authorized devices can connect to a given network, site or service.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close