BIF - BIS
-
- bifurcation - In the biometric process of fingerscanning, a bifurcati...
- Big 4 - The Big 4, also known as the Final 4, are the four largest internat...
- Big 4 (Final 4) - The Big 4, also known as the Final 4, are the f...
- Big Blue - Big Blue refers to IBM, which has used blue as a branding col...
- Big Blue (IBM) - Big Blue refers to IBM, which has used blue as a ...
- Big Chief tablet - The Big Chief tablet was for many years the m...
- Big Chief tablet (writing tablet) - The Big Chi...
- big data - Big data (also spelled Big Data) is a general term used to de...
- big data (Big Data) - Big data (also spelled Big Data) is a g...
- big data analytics - Big data analytics is the process of exam...
- big data as a service (BDaaS) - Big data as a servi...
- big data management - Big data management is the organization...
- big iron - A mainframe (also known as 'big iron') is a high-performance ...
- Big Mother - Big Mother is the concept of pervasive parenting, in whic...
- Big Switch Big Network Controller - Big Network...
- Big Switch Networks - Big Switch Networks is a network virtua...
- Big Switch Networks Big Tap - Big Tap is a network mo...
- Big Switch Networks Big Virtual Switch
- big-endian - Big-endian and little-endian are terms that describe the ...
- big-endian and little-endian - Big-endian and little...
- bill of materials - The bill of materials (BoM) is a list of th...
- bill of materials (BoM) - The bill of materials (BoM) is ...
- billions of bits per second - Gbps stands for billion...
- binary - Binary describes a numbering scheme in which there are only two p...
- binary 8-zero substitution - B8ZS (bipolar 8-zero subs...
- binary coded decimal - Binary coded decimal (BCD) is a syste...
- binary digit - A bit (short for binary digit) is the smallest unit o...
- binary file - A binary file is a file whose content must be interpret...
- binary large object - In computers, a BLOB (binary large obje...
- binary prefix multipliers - Kibi, mebi, gibi, tebi, peb...
- Binary Runtime Environment for Wireless
- binary search - A binary search, also called a dichotomizing search...
- binary search (dichotomizing search) - A bin...
- binary tree - A binary tree is a method of placing and locating files...
- binary-safe function - A binary-safe function is a function ...
- bind - In computer programming, to bind is to make an association between tw...
- binder - In file management, a binder is a software utility that combines ...
- BinHex - BinHex is a utility for converting (encoding) Macintosh files int...
- BioAPI - The BioAPI Consortium is a group of over 90 organizations whose g...
- BioAPI Consortium - The BioAPI Consortium is a group of over 90...
- biochip - A biochip is a collection of miniaturized test sites (microarra...
- biochip transponder - An injectable ID chip, also called a bi...
- biodiesel - Biodiesel is non-petroleum-based diesel fuel derived from v...
- biogas - Cow power is a term for the conversion of manure to usable energy...
- bioinformatics - Bioinformatics is the science of developing compu...
- biomechatronics - Biomechatronics is the interdisciplinary study ...
- biometric - Biometrics is the science and technology of measuring and s...
- Biometric Application Programming Interface
- Biometric Application Programming Interface (BA...
- biometric authentication - Biometric verification is any...
- biometric identification - Biometric verification is any...
- biometric payment - Biometric payment is a point of sale techno...
- Biometric Terms: Glossary - This is a WhatIs.com glossa...
- biometric verification - Biometric verification is any mea...
- biometrics - Biometrics is the science and technology of measuring and...
- biomimetics - Biomimetic refers to human-made processes, substances, ...
- biorobotics - Biorobotics is the use of biological characteristics in...
- BIOS - BIOS (basic input/output system) is the program a personal computer's...
- BIOS (basic input/output system) - BIOS (basic i...
- BIOS attack - A BIOS attack is an exploit that infects the BIOS with ...
- BIOS password - A BIOS password is a security precaution that requi...
- BIOS rootkit - A BIOS-level rootkit is programming that exists in a ...
- BIOS rootkit attack - A BIOS-level rootkit attack, also known...
- Biosense - Biosense is the first foray into the field of bioinformatics ...
- bioteam - A bioteam is an organizational structure in which peers share p...
- biotechnology - Biotechnology is the use of biological processes, o...
- bipolar 8-zero substitution - B8ZS (bipolar 8-zero su...
- bipolar signaling - Bipolar signaling, also called bipolar tran...
- bipolar signaling (bipolar transmission)
- bipolar transistor - A bipolar transistor is a semiconductor d...
- bipolar transmission - Bipolar signaling, also called bipola...
- birdie - A birdie is a false, or phantom, signal that appears in a superhe...
- bis - The word (also used as a prefix or suffix) bis, applied to some modem p...
- BISDN - BISDN is both a concept and a set of services and developing standa...
- Bison - Bison is a program that converts the formal description of a comput...
- bistable gates - Flip-flops, also called bistable gates, are digit...

