Browse Definitions :

Browse Definitions by Alphabet

B - BAR

  • B - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • B channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-tree - A B-tree is a method of placing and locating files (called records or keys) in a database.
  • B2B - On the internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services or information (aka e-commerce) between businesses, rather than between businesses and consumers.
  • B2B (business-to-business) - B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or information between businesses, rather than between businesses and consumers (B2C).
  • B2B2C (business-to-business-to-consumer) - B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling online.
  • B2C - B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has purchased the goods or service for personal use.
  • B2C (Business2Consumer or Business-to-Consumer) - B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has purchased the goods or service for personal use.
  • B2E - B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, or B2C) or other businesses (as it is in business-to-business, or B2B).
  • B2G - On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
  • B8ZS - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • BA - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • BAA - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • Babbage - If John von Neumann is the father of modern computing, then the English mathematician and inventor Charles Babbage can be considered its grandfather.
  • BABOK Guide (Guide to the Business Analysis Body of Knowledge) - The guide to the Business Analysis Body of Knowledge, or the BABOK Guide, is a book from the International Institute of Business Analysis (IIBA) that provides essential support and direction to business analysts (BAs) by presenting a collection of the activities that comprise business analysis.
  • Baby Bluetooth - Wibree, also called Baby Bluetooth, is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment.
  • baby botnet - A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company.
  • back-end - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • Backblaze - Backblaze backs up data that cannot be retrieved if a computer breaks or is lost.
  • backbone - A backbone is a larger transmission line that carries data gathered from smaller lines that interconnect with it.
  • backdoor - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • backdoor (computing) - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • backdoor selling - Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.
  • backfire effect - The backfire effect is the tendency of some people to resist accepting evidence that conflicts with their beliefs.
  • backhaul - Backhaul, a term probably derived from the trucking industry, has several usages in information technology.
  • Backoff - Backoff is point-of-sale malware that uses memory scraping  to steal credit card data from Windows-based retail machines on which it is installed.
  • backplane - A backplane is an electronic circuit board containing circuitry and sockets into which additional electronic devices on other circuit boards or cards can be plugged; in a computer, generally synonymous with or part of the motherboard.
  • backpropagation algorithm - Backpropagation (backward propagation) is an important mathematical tool for improving the accuracy of predictions in data mining and machine learning.
  • backronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • backscatter - Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • backscatting - Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects.
  • backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
  • backtracking - Directory traversal is a form of HTTP exploit in which a hacker uses the software on a Web server to access data in a directory other than the server's root directory.
  • backup - Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • backup as a service (BaaS) - Backup as a service uses external providers to deliver cloud-based backup services to an enterprise.
  • backup domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • backup domain controller (Windows NT) - A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources.
  • backup log - Backup log is a feature of backup applications that records the events that occur during a backup process.
  • backup on the Web - Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.
  • backup storage device - A backup storage device is used to make copies of data that is actively in use.
  • backup with DAT USB - A DAT USB drive is a tape drive with digital audio tape (DAT) that can be plugged into a Universal Serial Bus (USB) connection as a simple and relatively low-cost way to back up data routinely, especially on servers.
  • backward chaining - Backward chaining is the logical process of inferring unknown truths from known conclusions by moving backward from a solution to determine the initial conditions and rules.
  • backward combatible - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatibility - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatible - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatible (backward compatibility) - Backward compatible (also known as downward compatible or backward compatibility) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems.
  • backward explicit congestion notification - In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down its requests for data.
  • backward mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • backward mapping (inverse mapping or screen order) - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • bacon - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • bad block - A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted.
  • bad neighborhood - A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.
  • BadBIOS - BadBIOS is a BIOS-level Trojan that can affect Windows, Macintosh, Linux and BSD systems.
  • baffle (data center hot aisle containment) - Baffle paneling covers unwanted space between racks, under the raised floor and above dropped ceilings in the data center, reducing energy consumption and power use.
  • bag of words model (BoW model) - The bag of words model (BoW model) is a reduced and simplified representation of a text document with selected parts of the text.
  • BAI2 file format - BAI2 file format is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI).
  • Baidu - Baidu is a Chinese technology, internet search and internet services company.
  • bait and switch - Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase.
  • baklava code - Baklava code is programming that is unnecessarily complicated by the inclusion of too many layers.
  • BAL - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • BAL - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems.
  • balanced scorecard - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • balanced scorecard - The balance scorecard (BSC) is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed if necessary to ensure that an organizations strategic goals are met.
  • Ballerina language - Ballerina language is an open-source, cloud-native programming language designed to ease the burden of integration development associated with enterprise applications.
  • balloon for wireless - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • balun - A balun is a device that joins a balanced line (one that has two conductors, with equal currents in opposite directions, such as a twisted pair cable) to an unbalanced line (one that has just one conductor and a ground, such as a coaxial cable).
  • BAM - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • band - In telecommunication, a band - sometimes called a frequency band - is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (vlf) to extremely high frequencies (ehf).
  • bandpass filter - A bandpass filter is an electronic device or circuit that allows signals between two specific frequencies to pass, but that discriminates against signals at other frequencies.
  • bandwagon effect - The bandwagon effect is a psychological phenomenon whereby people do something mostly because others are doing it, often ignoring their personal principles or underlying evidence.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • bandwidth test - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • bang-bang (bang-bang control) - Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached.
  • bank identifier code - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
  • Bank Secrecy Act - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • Bank Secrecy Act (BSA) - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • banner grabbing - Banner grabbing is the act of capturing the information provided by banners, configurable text-based welcome screens from network hosts that generally display system information.
  • banner screen - A banner screen is a configurable text “welcome” display from a network host system.
  • BANT - BANT is an acronym that stands for “Budget, Authority, Need, Timing.
  • BAPI - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • bar code - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • bar code (or barcode) - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • bar code reader - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • Bar Coded Medication Administration - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • Bar Coded Medication Administration (BCMA) - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • bar graph - A bar graph is a pictorial rendition of statistical data in which the independent variable can attain only certain discrete values.
  • barcode - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • barcode data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • barcode data (point-of-sale data, POS data) - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • barcode printer - A barcode printer is a printer designed to produce barcode labels which can be attached to other objects.
  • barcode reader - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • barcode reader (POS scanner, bar code reader, price scanner) - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • bare-metal cloud - Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or virtualization infrastructure.
  • bare-metal hypervisor - A bare-metal hypervisor, also known as a Type 1 hypervisor, is virtualization software that has been installed directly onto the computing hardware.
  • bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hardware.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile data storage device.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close