Browse Definitions by Alphabet
EVE - WHA
- event log manager (ELM) - An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.
- event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
- event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
- event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
- event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
- event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
- event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
- eventual consistency - Eventual consistency is a characteristic of distributed computing systems such that the value for a specific data item will, given enough time without further updates, be consistent each time it is accessed.
- Evernote - Evernote is a cloud-based note-taking and file-storage application that synchronizes data across multiple devices.
- Evil Corp - Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.
- evil maid attack - An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.
- evil twin attack - An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.
- evolutionary algorithm - An evolutionary algorithm (EA) is an algorithm that uses mechanisms inspired by nature and solves problems through processes that emulate the behaviors of living organisms.
- evolutionary computation - Evolutionary computation is a subfield of artificial intelligence (AI) and is used extensively in complex optimization problems where there are many combinations and for continuous optimization.
- Evolved Packet Core (EPC) - Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.
- EWSD (Electronic Worldwide Switch Digital) - EWSD (Electronic Worldwide Switch Digital, or, in German, Elektronisches WaehlSystem [Digital]) is a widely-installed telephonic switch system developed by Siemens.
- exabyte (EB) - An exabyte (EB) is a large unit of computer data storage, two to the sixtieth power bytes.
- exbibyte (EiB) - An exbibyte (EiB) is a unit used to measure data capacity.
- ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
- Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
- exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
- exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
- exception handling - Exception handling is the process of responding to unwanted or unexpected events when a computer program runs.
- Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
- Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
- Exchange Management Console (EMC) - The Exchange Management Console (EMC), introduced by Microsoft in 2007, is an administrative tool with a graphical user interface (GUI) that's used to manage the components and resources of Microsoft Exchange Server.
- Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
- Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
- Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
- Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
- Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
- executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
- executable file (EXE file) - An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
- executive dashboard - An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.
- executive leadership - Executive leadership is the ability of an organization's management to guide and motivate employees while meeting organizational goals.
- executive sponsor - An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.
- exit interview - An exit interview is a meeting between management representatives and someone who is leaving an organization.
- exit strategy - An exit strategy is a planned approach to terminating a situation in a way that will maximize benefit or minimize damage.
- EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ: EXLS), provides business process outsourcing services to global corporations.
- exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
- expanded memory - Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.
- expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
- explainable AI (XAI) - Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.
- explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
- exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
- exponential function - An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.
- export - In a personal computer application, to export is to convert a file into another format than the one it is currently in.
- express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
- Express Wi-Fi - Express Wi-Fi by Facebook is the social media company's effort to bring wireless internet via public Wi-Fi hot spots to areas of the world without available or reliable connections to the internet.
- extended enterprise - Extended enterprise is the concept that a company does not operate in isolation because its success is dependent upon a network of partner relationships.
- extended intelligence (EI) - Extended intelligence (EI) is the use of artificial intelligence (AI) to enhance human intelligence.
- extended memory - Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.
- Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
- extension - In computer operating systems, a file name extension is an optional addition to the file name in a suffix of the form ".
- extension strategy - An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline.
- Exterior Gateway Protocol (EGP) - Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
- external drive enclosure (disk enclosure, disk caddy, drive caddy) - An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.
- external hard drive - An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
- external storage device - An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the addressable data storage that is not inside a computer's main storage or memory.
- Extract, Load, Transform (ELT) - Extract, Load, Transform (ELT) is a data integration process for transferring raw data from a source server to a data system (such as a data warehouse or data lake) on a target server and then preparing the information for downstream uses.
- extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
- extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
- extrapolation and interpolation - Extrapolation refers to estimating an unknown value based on extending a known sequence of values or facts.
- Extreme Programming (XP) - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
- ezine (electronic magazine) - The term ezine is short for "electronic magazine.
- Oracle extents - Oracle extents are a set of contiguous blocks allocated in an Oracle database.
- What is edge computing? Everything you need to know - Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
- What is enterprise content management? Guide to ECM - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allows a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.