Menu

You are here

Home » Enterprise Technology Dictionary » Enterprise Technology Dictionary -- Letter E

Enterprise Technology Dictionary -- Letter E

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W

Email

Definition:
Defines the set of capabilities to support the transmission of communications over a network. Includes instant messaging
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

End of Support

Definition:

The latest date a manufacturer will provide security patches.  Some manufacturers have an end of mainstream support date and an extended end-of support date.  In these cases, after the end of mainstream support, no additional software feature/function enhancements or fixes are issued but security patches are until the end of extended support.  The recommended best practice is to migrate before end of mainstream support.

Theme(s):
General IT, Enterprise Architecture, Governance
Context:
Policies and Standards

Enterprise Architecture

Definition:
Enterprise Architecture is an established process for describing the current state and defining the target state and transition strategy for an organization's people, processes, and technology.
Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management, General IT
Context:
IT Business Function

Enterprise Licenses and Software

Definition:
Enterprise Licenses and Software includes License Management and Software Distribution; it supports the purchase, upgrade and tracking of legal usage contracts for system software and applications and supports the propagation, installation and upgrade of written computer programs, applications and components.
Theme(s):
Technology Business Management, Enterprise Architecture
Context:
IT Business Function

Enterprise Risk Management

Definition:
Enterprise Risk Management (ERM) is the discipline of managing risk throughout an agency. Processes include conducting a risk assessment, identifying root causes of identified risks, prioritizing the risks on an enterprise level, determining which risk treatments best address the root causes, and then monitoring the success of the risk treatments. Treatments can include: Transferring the risk, minimizing the likelihood and/or impact of a negative outcome, and eliminating the activity associated with the risk
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Enterprise Search

Definition:
Enterprise Search includes Query capabilities, Precision / Recall Ranking, Classification and Pattern Matching
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Environmental Security

Definition:

Physical protection against damage from fire, flood, wind, earthquake, explosion, civil unrest and other forms of natural and man-made risk.

Theme(s):
Information Security, Enterprise Architecture

Equivalent Access

Definition:

Providing users with disabilities with content and interaction that is similar or identical to that provided to users without disabilities, in a form that produces a similar user experience.  Users should be provided direct access to the same content unless providing direct access to that content is not possible due to technical or legal limitations.

Theme(s):
Accessibility
Topic(s):
Context:
Accessibility

Executive Sponsor

Definition:

The senior executive responsible to the agency and the State CIO/OCIO for the project.

Theme(s):
Portfolio Management, General IT, Program and Project Management
Context:
Project Management, Oversight

Extensible Markup Language

Definition:
A simple, very flexible text format derived from SGML. Originally designed to meet the challenges of large-scale electronic publishing, XML is also playing an increasingly important role in the exchange of a wide variety of data on the Web and elsewhere.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Extranet / VPN Connection

Definition:

Network-level access originating from outside the network. Examples include SSL, IPSec, “terminal service” or Citrix-like connections.

Theme(s):
Information Security, Enterprise Architecture