Browse Definitions :

Browse Definitions by Alphabet

BAR - BIC

  • bare-metal restore - A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.
  • Barnum effect (Forer effect) - The Barnum effect is the tendency for an individual to personalize a generalization that could apply to anyone.
  • barter economy - A barter economy is a cashless economic system in which services and goods are traded at negotiated rates.
  • base address - A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.
  • base station - In telecommunications, a base station is a fixed transceiver that is the main communication point for one or more wireless mobile client devices.
  • baseband unit (BBU) - A baseband unit (BBU) is a device that interprets baseband frequencies in telecom systems including computer networks, the internet, phone networks and radio broadcasting systems.
  • baseband video - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
  • baseboard management controller - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • Basel Committee on Banking Supervision (BCBS) - The Basel Committee on Banking Supervision (BCBS) is a group of international banking authorities who work to strengthen the regulation, supervision and practices of banks and improve financial stability worldwide.
  • Basel II - Basel II is an international business standard that requires financial institutions to have enough cash reserves to cover risks incurred by operations.
  • Basel III - Basel III is a set of standards and practices created to ensure that international banks maintain adequate capital to sustain themselves during periods of economic strain.
  • bash - Bash (Bourne Again Shell ) is the free version of the Bourne shell distributed with Linux and GNU operating systems.
  • bash (Bourne Again Shell) - Bash (Bourne Again Shell ) is the free version of the Bourne shell distributed with Linux and GNU operating systems.
  • BASIC - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • BASIC (Beginner's All-purpose Symbolic Instruction Code) - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • Basic Assembler Language - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems.
  • Basic Assembler Language - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • Basic Assembler Language (BAL) - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • basic I/O system - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • basic input/output system - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • basic IO system - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • Basic Rate Interface - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • Basware - Learn about Basware, a Finland-based vendor of networked purchase-to-pay, e-invoicing, procurement, and financing software and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a text file that contains a sequence of commands for a computer operating system.
  • batch job - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch processing - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • battery life - Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful life.
  • battery management system (BMS) - A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries.
  • battery memory effect - The battery memory effect is a reduction in the longevity of a rechargeable battery's charge, due to incomplete discharge in previous uses.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bayesian logic - Named for Thomas Bayes, an English clergyman and mathematician, Bayesian logic is a branch of logic applied to decision making and inferential statistics that deals with probability inference: using the knowledge of prior events to predict future events.
  • Bayesian statistics - Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected.
  • Bayonet Neil-Concelman - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BBCs - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • BBS - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bc set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • Bcc - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BCDR - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • BCI - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • BCMA - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • BCP - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • BDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • beacon (proximity beacon) - A beacon, in the context of location-based services, is a small hardware device that enables data transmission to mobile devices when the users are within a specific range of the device.
  • beacon probing - Beacon probing is a networking troubleshooting feature in VMware vSphere that pinpoints failures with physical Ethernet adapters and physical switches.
  • beamforming - Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.
  • Bean - In its JavaBeans application program interface for writing a component, Sun Microsystems calls a component a "Bean" (thus continuing their coffee analogy).
  • bearer channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • Bearer Independent Call Control - Bearer Independent Call Control (BICC) is a signaling protocol based on N-ISUP that is used to support narrowband ISDN service over a broadband backbone network without interfering with interfaces to the existing network and end-to-end services.
  • BECN - In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down its requests for data.
  • BEDO DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • BeeMe (MIT Media Lab) - BeeMe is a web-based social experiment that will be hosted by the MIT Media Lab at 11pm on October 31, 2018.
  • beep code - A beep code is the audio signal given out by a computer to announce the result of a short diagnostic testing sequence the computer performs when first powering up (called the Power-On-Self-Test or POST).
  • beeper - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.
  • Beginner's All purpose Symbolic Instruction Code - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • Beginner's All-purpose Symbolic Instruction Code - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • beginning of life (BOL) - Beginning of life (BOL), in the context of manufacturing and product lifecycles, is the first stages of a product’s existence.
  • behavior blacklisting - Behavior blacklisting is a security method based on detecting specified suspicious actions on the part of software or human agents and blocking access accordingly.
  • behavior whitelisting - Behavior whitelisting is a security method in which permissable actions within a given system are specified and all others are blocked.
  • behavior-based security - Behavior-based security software scans for deviations from the norm and decides whether an anomaly poses a threat or can simply be ignored.
  • behavior-driven development (BDD) - Behavior-driven development (BDD) is an Agile software development methodology in which an application is documented and designed around the behavior a user expects to experience when interacting with it.
  • behavioral biometrics - Behavioral biometrics are based on human activity such as typing patterns.
  • behavioral economics - Behavioral economics is the study of economic decision-making by individuals and institutions.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • Bell Communications Research - Bellcore (Bell Communications Research) provides certain centralized research and standards coordination for the regional Bell operating companies (RBOC)s.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Bell operating company - BOC (Bell operating company) is a term for any of the 22 original companies (or their successors) that were created when AT&T was broken up in 1983 and given the right to provide local telephone service in a given geographic area.
  • Bellcore - Bellcore (Bell Communications Research) provides certain centralized research and standards coordination for the regional Bell operating companies (RBOC)s.
  • benefit corporation - Benefit corporation is a type of corporate structure recognized by some state governments in the United States.
  • benefits administration - Benefits administration is the process of assembling and managing the benefits an organization provides to employees.
  • BER - In telecommunication transmission, the bit error rate (BER) is the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  • Berkeley Software Distribution - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BERT language model - BERT is an open source machine learning framework for natural language processing (NLP).
  • BES - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • bespoke - Bespoke (pronounced bee-SPOHK) is a term used in the United Kingdom and elsewhere for an individually- or custom-made product or service.
  • best practice - A best practice is a technique or methodology that, through experience and research, has been proven to reliably lead to a desired result.
  • best practices - A best practice is a technique or methodology that, through experience and research, has been proven to reliably lead to a desired result.
  • beta - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • betamaxed - To be betamaxed is to have your superior product lose out in the market to an inferior one as a result of marketing, influence or some other factor unrelated to product quality.
  • Better Business Bureau (BBB) - The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses.
  • Betteridge's law (of headlines) - Betteridge's law (of headlines) is an adage that states "Any headline that ends in a question mark can be answered by the word no.
  • BetterWorks - BetterWorks is cloud-based software that helps employees continuously manage their performance and align their goals to the objectives of the organization.
  • BEx - In the SAP Business Information Warehouse (BW), BEx (Business Explorer) is the reporting tool used to work with data in the BW database.
  • bezel - A bezel is the border between the screen and frame of a computer monitor, smartphone or any other computing device.
  • Bezier curve - A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.
  • BGAN - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • BGAN (Broadband Global Area Network) - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • BGP - BGP (Border Gateway Protocol) is the protocol underlying the global routing system of the internet.
  • BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is the protocol underlying the global routing system of the internet.
  • BHIE - Bidirectional Health Information Exchange (BHIE) is a health information sharing project that builds on the previously established Federal Health Information Exchange (FHIE) program.
  • BI - Real-time business intelligence is an approach to data analytics that enables business users to get up-to-the-minute data by directly accessing operational systems.
  • BI - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • BI - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • BIA - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • bias - Bias is direct current (DC) deliberately made to flow, or DC voltage deliberately applied, between two points for the purpose of controlling a circuit.
  • BIC - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
  • BIC - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • BIC (bank identifier code) - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close