MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with E
  • EsProc

    esProc is a developer tool for business computing as well as a desktop analysis software. It is specialized in computation on structured data and complicated multistep computation to meet the fast-changing demands.

    IT Blogs (3)
  • Essbase

    Essbase is a multidimensional database management system (MDBMS) that provides a multidimensional database platform upon which to build analytic applications. The name Essbase is derived from "Extended Spread Sheet dataBASE", began as a product of Arbor Software, which later got merged with Hyperion Software in 1998. Currenlty it is supported by Oracle Corporation after Oracle acquired Hyperion in 2007.

    IT Courses & Reviews (2)
  • ESSE-IPS/SIEM (Enterasys Security Systems Engineer-Dragon)

    Skill Level: Intermediate Status: ActiveFor individuals who have the skills required to run enterprise security architectures to meet the ever changing security, medicine business needs and requirements. The ESSE-IPS/SIEM course curriculum focuses on core security technologies including intrusion detection/prevention, behavioural analysis, and offense management capabilities technologies.

  • ESSE-N (Enterasys Security Systems Engineer for Network Access Control)

    Skill Level: Intermediate Status: ActiveFor individuals who have the skills required to run enterprise security architectures to meet the ever changing security, discount business needs and requirements.

  • ESSE-NAC (Enterasys Security Systems Engineer-NAC)

    Enterasys Systems Enterasys Security Systems Engineer-NAC (ESSE-NAC)

  • Ethereum

    A public blockchain-based distributed computing platform, featuring smart contract functionality. It provides a decentralized virtual machine, the Ethereum Virtual Machine (EVM), that can execute peer-to-peer contracts using a token called ether.

    IT Blogs (1)
  • EtherExpress

    A technology from Intel used in network server adapters LANs. The EtherExpress adapter has a built-in i960 processor, allowing it to offload work from the server's processor, improving network efficiency by reducing demands on server resources. 

  • EtherLoop (Next Generation DSL)

    EtherLoop combines features of Digital Subscriber Line (DSL) with features of Ethernet to provide both voice and data transmission (including Internet connection) over any ordinary phone line at data rates faster than DSL. 

  • Ethernet as a service (EaaS)

    The use of high-bandwidth, fiber optic media such as Packet over SONET (PoS) to deliver 10 Mbps, 100 Mbps or even 1000 Mbps Ethernet service to one or more customers across a common bidirectional broadband infrastructure. 

  • Ethernet point-of-presence (EPOP)

    A technology developed by Level 3 Communications that provides widespread access to broadband networks. Level 3 EPOP provides high-speed Internet access to non-Level 3 facilies spread over vast geographical distances. 

  • Ethernet/IP (Ethernet Industrial Protocol)

    A network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet. The specification uses an open protocol at the application layer. 

  • Ethical Hacking

    Ethical Hacking is a form of intrusion testing (or penetration testing) performed to identify potential system security threats which could make the system vulnerable when exploited by malicious hackers. Organization hire Ethical Hackers to identify such areas and protect the system from potential attacks.

    IT Blogs (5) IT Courses & Reviews (137)
  • ETL Testing

    ETL (Extract Transformation and Load) Testing is different from Database testing or backend testing both in terms of complexity and scope and hence requires a different approach as against conventional testing. The methodology primarily aims at identifying and mitigating existing data defects and general errors occurring prior to processing of data for analytics and reporting.

    IT Courses & Reviews (3)
  • ETRM

    ETRM solutions provide a transparent view of complex portfolios consisting of physical, financial, and natural positions across all commodities, including crude oil, fuels, natural gas, coal, refined products, and power.  Complete ETRM systems also optimize business processes around the physical movement and delivery of commodities and the risks associated with those activities. They also enhance the effectiveness of settlement, accounting, and reconciliation processes.

  • EU CoC On Data Centre Efficiency

    EU CoC On Data Centre Efficiency by CNet Training

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url