MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with E
  • EnCE (EnCase Certified Examiner)

    EnCase Certified Examiner (EnCE) by Guidance Software

  • EnCEP (EnCase Certified eDiscovery Practitioner)

    EnCase Certified eDiscovery Practitioner (EnCEP) by Guidance Software

  • Encoder

    An encoder is a software program or an algorithm that converts information from one format or code to another, for the purposes of security or compression.

    IT Courses & Reviews (17)

    Encog is an advanced machine learning framework (available for Java, .Net, and C++) that supports a variety of advanced algorithms (Support Vector Machines, Artificial Neural Networks, Genetic Programming, Bayesian Networks, Hidden Markov Models, Genetic Programming and Genetic Algorithms), as well as support classes to normalize and process data. Most Encog training algoritms are multi-threaded and scale well to multicore hardware. Encog can also make use of a GPU to further speed processing time. A GUI based workbench is also provided to help model and train machine learning algorithms.

    IT Courses & Reviews (3)
  • Encrypting File System (EFS)

    A feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. EFS simply makes encryption an attribute of any file or folder.  

    IT Courses & Reviews (15)
  • Encryption key management

    The administration of tasks involved with protecting, storing, backing up and organizing encryption keys. High-profile data losses and regulatory compliance requirements have spurred a dramatic increase in the use of encryption in the enterprise. 

    IT Blogs (2)
  • End Point Reference (EPR)

    A combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header. In this context, an endpoint is any user device connected to a network.

  • End System-to-Intermediate System (ES-IS)

    In the OSI context, an End System (ES) is a node or user device; an Intermediate System (IS) is a router . ES-IS allows an end system located in a particular subnetwork to determine the availability of other end systems on the same subnetwork. 

  • End User Computing Platform (EUC Platform)

    A marketing buzzword that is often associated with IT consumerization, the concept that consumer use of smartphones, social networks and cloud services are fundamentally changing the way that enterprises do business. 

    IT Blogs (2)
  • Endpoint security management

    A policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets. 

    IT Blogs (3)
  • Energy and Cost Management Intermediate Certificate

    Energy and Cost Management Intermediate Certificate by BCS

  • Engineering Data Management

    The dministration of documents or data related to engineering applications using computers and electronic storage media. 

  • Enhanced CD (E-CD)

    A compact disc (CD) format that enables discs to be played on either a CD player or a multimedia-capable device, such as a CD-i player, or a DVD-ROM, or CD-ROM drive, where added material can be displayed. 

  • Enhanced Data GSM Environment

    A faster version the Global System for Mobile (GSM) wireless service designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users. 

  • Enhanced Dynamic RAM (EDRAM)

    A dynamic Random Access Memory that includes a small amount of static RAM (SRAM) inside a larger amount of DRAM so that many memory accesses will be to the faster SRAM. EDRAM is sometimes used as L1 and L2 memory.

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url