Browse Definitions :

Browse Definitions by Alphabet

AMA - BAN

  • Amazon S3 bucket - An Amazon S3 bucket is a public cloud storage resource available in Amazon Web Services' (AWS) Simple Storage Service (S3), an object storage offering.
  • B - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • B channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B-tree - A B-tree is a method of placing and locating files (called records or keys) in a database.
  • B2B - On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services, or information between businesses rather than between businesses and consumers.
  • B2B (business-to-business) - On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services, or information between businesses rather than between businesses and consumers.
  • B2B2C (business-to-business-to-consumer) - B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling online.
  • B2C - B2C is short for business-to-consumer, or the retailing part of e-commerce on the Internet.
  • B2C (Business2Consumer or Business-to-Consumer) - B2C is short for business-to-consumer, or the retailing part of e-commerce on the Internet.
  • B2E - B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, or B2C) or other businesses (as it is in business-to-business, or B2B).
  • B2E (Business2Employee or Business-to-Employee) - B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, or B2C) or other businesses (as it is in business-to-business, or B2B).
  • B2G - On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
  • B2G (Business2Government or Business-to-Government) - On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
  • B8ZS - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • B8ZS (bipolar 8-zero substitution, binary 8-zero substitution, clear channel, clear 64) - B8ZS (bipolar 8-zero substitution, also called binary 8-zero substitution, clear channel, and clear 64) is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.
  • BA - Business analytics (BA) is the practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • BAA - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • Babbage - If John von Neumann is the father of modern computing, then the English mathematician and inventor Charles Babbage can be considered its grandfather.
  • BABOK Guide (Guide to the Business Analysis Body of Knowledge) - The guide to the Business Analysis Body of Knowledge, or the BABOK Guide, is a book from the International Institute of Business Analysis (IIBA) that provides essential support and direction to business analysts (BAs) by presenting a collection of the activities that comprise business analysis.
  • Baby Bluetooth - Wibree, also called Baby Bluetooth, is a low-power wireless local area network (WLAN) technology that facilitates interoperability among mobile and portable consumer devices such as pagers, personal digital assistants (PDAs), wireless computer peripherals, entertainment devices and medical equipment.
  • baby botnet - A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company.
  • Back Orifice - Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems.
  • back-end - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • back-pressure sensor - A back-pressure sensor is a transducer that detects and measures the instantaneous torque that a robot motor applies.
  • Backblaze - Backblaze backs up data that cannot be retrieved if a computer breaks or is lost.
  • backbone - A backbone is a larger transmission line that carries data gathered from smaller lines that interconnect with it.
  • backdoor - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • backdoor (computing) - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • backdoor selling - Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.
  • backfire effect - The backfire effect is the tendency of some people to resist accepting evidence that conflicts with their beliefs.
  • backhaul - Backhaul, a term probably derived from the trucking industry, has several usages in information technology.
  • backlink - In Hyper-G and possibly other hypertext systems, a backlink is a link back to the page or one of the pages that currently link to the page you're using.
  • Backoff - Backoff is point-of-sale malware that uses memory scraping  to steal credit card data from Windows-based retail machines on which it is installed.
  • backplane - A backplane is an electronic circuit board containing circuitry and sockets into which additional electronic devices on other circuit boards or cards can be plugged; in a computer, generally synonymous with or part of the motherboard.
  • backpropagation algorithm - Backpropagation (backward propagation) is an important mathematical tool for improving the accuracy of predictions in data mining and machine learning.
  • backronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • backscatter - Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects.
  • backscatter body scanning - Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • backscatting - Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects.
  • backside bus - In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
  • backtracking - Directory traversal is a form of HTTP exploit in which a hacker uses the software on a Web server to access data in a directory other than the server's root directory.
  • backup - Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.
  • Backup and recovery glossary - This glossary provides definitions for the most commonly encountered terms or concepts in backup and recovery.
  • Backup and Recovery Guides and Tutorials - We've gathered a collection of our learning guides and tutorials about backup and recovery.
  • Backup and Recovery Quizzes - We've gathered a collection of quizzes to test your knowledge of backup and recovery.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • Backup and recovery: Do you speak geek? - A quiz about backup and recovery.
  • backup as a service (BaaS) - Backup as a service uses external providers to deliver cloud-based backup services to an enterprise.
  • backup domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • backup domain controller (Windows NT) - A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources.
  • backup log - Backup log is a feature of backup applications that records the events that occur during a backup process.
  • backup on the Web - Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.
  • backup robot - A backup robot is an automated external USB storage device that supports multiple removable SATA hard drives.
  • backup storage device - A data storage device for backup makes copies of data actively in use.
  • backup utility (BU) - A backup utility is a program that is designed to create a copy of data in a secondary location for safekeeping.
  • backup with DAT USB - A DAT USB drive is a tape drive with digital audio tape (DAT) that can be plugged into a Universal Serial Bus (USB) connection as a simple and relatively low-cost way to back up data routinely, especially on servers.
  • backward chaining - Backward chaining is the logical process of inferring unknown truths from known conclusions by moving backward from a solution to determine the initial conditions and rules.
  • backward combatible - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatibility - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatible - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward compatible (backward compatibility) - Backward compatible (sometimes 'backward-compatible' or 'backwards compatible') refers to a hardware or software system that can successfully use data from earlier versions of the system or with other systems.
  • backward explicit congestion notification - In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down its requests for data.
  • backward mapping - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • backward mapping (inverse mapping or screen order) - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • bacn - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • bacon - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • bad block - A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted.
  • bad neighborhood - A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.
  • BadBIOS - BadBIOS is a BIOS-level Trojan that can affect Windows, Macintosh, Linux and BSD systems.
  • baffle (data center hot aisle containment) - Baffle paneling covers unwanted space between racks, under the raised floor and above dropped ceilings in the data center, reducing energy consumption and power use.
  • bag of words model (BoW model) - The bag of words model (BoW model) is a reduced and simplified representation of a text document with selected parts of the text.
  • BAI2 file format - BAI2 file format is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI).
  • Baidu - Baidu is a Chinese technology, internet search and internet services company.
  • bait and switch - Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase.
  • baklava code - Baklava code is programming that is unnecessarily complicated by the inclusion of too many layers.
  • BAL - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems.
  • BAL - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • BAL (Basic Assembler Language or branch-and-link) - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems.
  • balanced scorecard - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • balanced scorecard - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • Ballerina language - Ballerina language is an open-source, cloud-native programming language designed to ease the burden of integration development associated with enterprise applications.
  • balloon for wireless - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • balun - A balun is a device that joins a balanced line (one that has two conductors, with equal currents in opposite directions, such as a twisted pair cable) to an unbalanced line (one that has just one conductor and a ground, such as a coaxial cable).
  • BAM - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • band - In telecommunication, a band - sometimes called a frequency band - is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (vlf) to extremely high frequencies (ehf).
  • bandpass filter - A bandpass filter is an electronic device or circuit that allows signals between two specific frequencies to pass, but that discriminates against signals at other frequencies.
  • bandwagon effect - The bandwagon effect is a psychological phenomenon whereby people do something mostly because others are doing it, often ignoring their personal principles or underlying evidence.
  • bandwidth - Bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually one second.
  • bandwidth test - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • bandwidth test (testing your bandwidth) - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • bang-bang (bang-bang control) - Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached.
  • bank identifier code - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
  • Bank Secrecy Act - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • Bank Secrecy Act (BSA) - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • banner blindness - Banner blindness is the tendency of people to ignore banner ads on Web sites.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close