Browse Definitions by Alphabet
- e-business (electronic business) - E-business (electronic business) is the conduct of business processes on the internet.
- e-commerce - E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
- e-cycling - E-cycling, also known as 'electronic recycling,' is the reuse or recycling of used electronic materials to limit e-waste.
- e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
- e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
- e-score - The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts.
- E-Sign Act (Electronic Signatures in Global and National Commerce Act) - The E-Sign Act (Electronic Signatures in Global and National Commerce Act) is a U.
- e-signature (electronic signature) - An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.
- e-ticket (electronic ticket) - An e-ticket (electronic ticket) is a paperless electronic document used for ticketing purposes, such as airfare or concert admission.
- E-Verify - E-Verify is a free web service that allows employers to confirm the legal eligibility of an individual who wants to work in the United States.
- e-waste - Electronic waste, also known as end-of-life (EOL) electronics or e-waste, refers to discarded, recycled or refurbished electrical and electronic products.
- E911 (Enhanced 911) - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
- EAI (enterprise application integration) - Enterprise application integration (EAI) is the process of connecting an organization's business applications, services, databases and other systems into an integrating framework that facilitates communications and interoperability.
- early adopter - An early adopter refers to a person who embraces new technology or tries a new product before most others.
- east-west traffic - East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center.
- eavesdropping - Eavesdropping is the act of listening to, recording or intercepting private communications.
- ebXML (Electronic Business XML) - EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
- Echo Show - The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant.
- eClinicalWorks - eClinicalWorks is a Massachusetts-based company that sells electronic medical record (EMR), practice management (PM) and personal health record (PHR) software and services to reportedly more than 115,000 physicians and 70,000 facilities in the United States.
- Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
- economizer - An economizer is a mechanical device that reduces the amount of energy used to cool a data center or other buildings.
- edge AI - Edge artificial intelligence (edge AI) is a paradigm for crafting AI workflows that span centralized data centers (the cloud) and devices outside the cloud that are closer to humans and physical things (the edge).
- edge analytics - Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other device instead of waiting for the data to be sent back to a centralized data store.
- edge data center - An edge data center is a small data center that is located close to the edge of a network.
- edge device - An edge device is any piece of hardware that controls data flow at the boundary between two networks.
- edge node - An edge node is a computer that acts as an end user portal for communication with other nodes in cluster computing.
- edge virtualization - Edge virtualization is the practice of using software versions of physical computing resources at the edge of a network, closest to the devices that produce data.
- EEPROM (electrically erasable programmable read-only memory) - EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
- EG Innovations - EG Innovations is an end-user experience and infrastructure monitoring software vendor best known for its EG Enterprise product.
- Eisenhower Matrix - The Eisenhower Matrix is a time management tool for prioritizing tasks.
- Elastic Stack (ELK Stack) - The Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format, and search, analyze and visualize that data in real time.
- electric field strength - Electric field strength is a quantitative expression of the intensity of an electric field at a particular location.
- electric grid - An electric grid is a network of synchronized power providers and consumers that are connected by transmission and distribution lines and operated by one or more control centers.
- Electric plugs for each country - Discover the electrical plugs, outlets and voltages used in different countries around the world.
- electric vehicle charging station - An electric vehicle charging station is equipment that connects an EV to a source of electricity to recharge electric cars, neighborhood electric vehicles and plug-in hybrids.
- electrical power management system (EPMS) - An electrical power management system (EPMS) is an electronic system that provides fine grained information about the flow of power in an electrical power generation system or power substation.
- electromagnetic field - An electromagnetic field, sometimes referred to as an EM field, is generated when charged particles, such as electrons, are accelerated.
- electromagnetic induction - Electromagnetic induction is the creation of an electro-motive force by way of a moving magnetic field around an electric conductor and, conversely, the creation of current by moving an electric conductor through a static magnetic field.
- electromagnetic interference (EMI) - Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.
- electron - An electron is a negatively charged subatomic particle that can be either bound to an atom or free (not bound).
- Electronic Code Book (ECB) - Electronic Code Book (ECB) is a simple mode of operation with a block cipher that's mostly used with symmetric key encryption.
- Electronic Communications Privacy Act (ECPA) - The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing communications without authorization.
- Electronic Data Interchange (EDI) - Electronic Data Interchange (EDI) is the transfer of data from one computer system to another by standardized message formatting without the need for human intervention.
- electronic discovery (e-discovery or ediscovery) - Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.
- Electronic Discovery Reference Model (EDRM) - The Electronic Discovery Reference Model (EDRM) is a conceptual framework that outlines activities for the recovery and discovery of digital data.
- electronic intelligence (ELINT) - Electronic intelligence (ELINT) is intelligence gathered using electronic sensors, usually used in military applications.
- electronic intensive care unit (eICU) - An Electronic Intensive Care Unit (eICU) is a form or model of telemedicine where state-of-the-art technology is used to provide an additional layer of critical care service to patients.
- electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information that is produced, saved, transferred or received in an electronic form.
- electronically stored information (ESI) - Electronically stored information (ESI) is data that is created, altered, communicated and stored in digital form.
- electrostatic discharge (ESD) - Electrostatic discharge (ESD) is the release of static electricity when two objects come into contact.
- electrostatic field - When two objects in each other's vicinity have different electrical charges, an electrostatic field exists between them.
- element - An element is a fundamental item that can't be easily broken into smaller pieces.
- element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object or number belongs to a certain set.
- Elk Cloner - Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale.
- elliptical curve cryptography (ECC) - Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.
- Eloqua - Eloqua is a marketing automation platform that follows a cloud-based software-as-a-service (SaaS) model.
- email - Email (electronic mail) is the exchange of computer-stored messages from one user to one or more recipients via the internet.
- email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
- email security - Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against unauthorized access and email threats.
- email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
- email signature - An email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender.
- email spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
- email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
- embedded BI (embedded business intelligence) - Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications.
- embedded device - An embedded device is part of a larger computing system and has a specific purpose.
- embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
- embedded hypervisor - An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server.
- embedded operating system - An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
- embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
- embedded system security - Embedded system security is a strategic approach to protecting software running on embedded systems from attack.
- embedded systems programming - Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.
- embedded Tomcat - An embedded Tomcat server consists of a single Java web application along with a full Tomcat server distribution, packaged together and compressed into a single JAR, WAR or ZIP file.
- embodied carbon - Embodied carbon is the measurable greenhouse gas emissions of an infrastructure's entire construction, maintenance and demolition processes.
- emergency communications plan (EC plan) - An emergency communications plan (EC plan) is a document that provides guidelines, contact information and procedures for how information should be shared during all phases of an unexpected occurrence that requires immediate action.
- emergency management plan - An emergency management plan should include measures that provide for the safety of personnel and, if possible, property and facilities.
- emergency notification system - An emergency notification system is an automated method of contacting a group of people within an organization and distributing important information during a crisis.
- emergency power off (EPO) button - The emergency power off button, also called an EPO switch or EPO panel, is a safety measure for quickly disconnecting electrical power to a particular piece of equipment or facility in the event of an emergency.
- emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
- emotional intelligence (EI) - Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.
- emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
- empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
- empiricism - Empiricism is a philosophical theory applicable in many disciplines, including science and software development, that human knowledge comes predominantly from experiences gathered through the five senses.
- employee churn - Employee churn is the overall turnover in an organization's staff as existing employees leave and new ones are hired.
- employee engagement - Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.
- employee engagement software - Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.
- employee experience - Employee experience is a worker's perception of the organization they work for during their tenure.
- employee lifecycle - The employee lifecycle is a human resources model that identifies the different stages a worker advances through in an organization and the role HR plays in optimizing that process.
- employee Net Promoter Score (eNPS) - The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
- employee onboarding and offboarding - Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding involves separating an employee from a firm.
- employee poaching (talent poaching) - Employee poaching (talent poaching) or job poaching is the recruiting of employees who work at competing companies.
- employee privacy policy - An employee privacy policy is documentation specifying an organization's rules and procedures for gathering, using and disclosing the personal information of former, current or prospective employees.
- employee productivity - Employee productivity, sometimes referred to as workforce productivity, is an assessment of the efficiency of a worker or group of workers.
- employee resource group (ERG) - An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or identity.
- employee retention - Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a positive work atmosphere to promote engagement.
- employee sentiment analysis - Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.
- employee training and development - Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of employees.
- employee vetting - Employee vetting is a screening process conducted by employers for checking the background and verifying the information of a new hire or applicant.
- emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
- encapsulation (object-orientated programming) - In object-oriented programming (OOP), encapsulation is the practice of bundling related data into a structured unit, along with the methods used to work with that data.
- encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.