Browse Definitions :
Definition

buzzword bingo

Buzzword bingo is a game played during meetings with cards featuring buzzwords (such as "incentivize," "think outside the box," "push the envelope" and "wave a dead chicken") in place of the numbers of traditional bingo cards. A buzzword bingo card typically features 25 squares, five down and five across, including a free "bingo" square somewhere on the card as a bonus. Buzzword bingo apps make it possible to play the game on a mobile device during a meeting.

Buzzword bingo is a simple game with few rules. Participants mark words and phrases on the card as they are spoken during a meeting; the first person to mark five terms in a row is supposed to jump up and shout "Bingo!" In more repressive environments, a participant may notify other players that they've scored through some surreptitious means, such as specific gesture or a text message. A player may not speak a buzzword term in order to mark it off. However, baiting one's colleagues to elicit buzzwords from them is widely considered acceptable -- and even laudable -- behavior.

Tom Davis, one of the founders of SGI, invented buzzword bingo in 1993. According to legend, the idea occurred to Davis after he saw a number of jargon terms on a blackboard in a colleague's office. David wrote a buzzword generator program and printed out cards full of phrases like "step up to it," "intellectual capital" and "paradigm shift." He passed the cards out to employees with a note: "The ball's in your court."

 

This was last updated in June 2016

Continue Reading About buzzword bingo

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close