Browse Definitions :

Browse Definitions by Alphabet

BAR - BEL

  • bar - In programming, bar is a metasyntactic variable that is used to temporarily represent a function.
  • bar code - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • bar code (or barcode) - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • bar code reader - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • Bar Coded Medication Administration - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • Bar Coded Medication Administration (BCMA) - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • bar graph - A bar graph is a pictorial rendition of statistical data in which the independent variable can attain only certain discrete values.
  • barcode - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • barcode data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • barcode data (point-of-sale data, POS data) - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • barcode printer - A barcode printer is a printer designed to produce barcode labels which can be attached to other objects.
  • barcode reader - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • barcode reader (POS scanner, bar code reader, price scanner) - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • bare metal environment - A bare metal environment is a computer system or network in which a virtual machine is installed directly on hardware rather than within the host operating system (OS).
  • bare metal restore - In disaster recovery, a bare metal restore is the process of reformatting a computer from scratch after a catastrophic failure.
  • bare-metal cloud - Bare-metal cloud is a public cloud service installed directly on hardware with no virtualized infrastructure.
  • bare-metal hypervisor - A bare-metal hypervisor, also known as a Type 1 hypervisor, is virtualization software that has been installed directly onto the computing hardware.
  • bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hardware.
  • barnacle - In a computer, a barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program.
  • Barnum effect (Forer effect) - The Barnum effect is the tendency for an individual to personalize a generalization that could apply to anyone.
  • barter economy - A barter economy is a cashless economic system in which services and goods are traded at negotiated rates.
  • base address - A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.
  • base station - A base station is a fixed point of communication for customer cellular phones on a carrier network.
  • baseband - Describes a telecommunication system in which information is carried in digital form on a single unmultiplexed signal channel on the transmission medium.
  • baseband unit (BBU) - A baseband unit (BBU) is a device that interprets baseband frequencies in telecom systems including computer networks, the internet, phone networks and radio broadcasting systems.
  • baseband video - Composite video, also called baseband video or RCA video, is the analog waveform that conveys the image data in a conventional National Television Standards Committee (NTSC) television signal.
  • baseboard management controller - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • Basel Committee on Banking Supervision (BCBS) - The Basel Committee on Banking Supervision (BCBS) is a group of international banking authorities who work to strengthen the regulation, supervision and practices of banks and improve financial stability worldwide.
  • Basel II - Basel II is an international business standard that requires financial institutions to have enough cash reserves to cover risks incurred by operations.
  • Basel III - Basel III is a set of standards and practices created to ensure that international banks maintain adequate capital to sustain themselves during periods of economic strain.
  • baseline - What is a baseline?In project management, a baseline is a known state by which something is measured or compared.
  • bash - Bash (Bourne Again Shell ) is the free version of the Bourne shell distributed with Linux and GNU operating systems.
  • bash (Bourne Again Shell) - Bash (Bourne Again Shell ) is the free version of the Bourne shell distributed with Linux and GNU operating systems.
  • Bash Cheat Sheets - We've gathered cheat sheets for fast reference to Bash-related information.
  • BASIC - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • BASIC (Beginner's All-purpose Symbolic Instruction Code) - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • Basic Assembler Language - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • Basic Assembler Language - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating systems.
  • Basic Assembler Language (BAL) - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • basic I/O system - BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
  • basic input/output system - BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
  • basic IO system - BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
  • Basic Rate Interface - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • Basic Rate Interface (BRI) - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • bastion host - On the Internet, a bastion host is the only host computer that a company allows to be addressed directly from the public network and that is designed to screen the rest of its network from security exposure.
  • Basware - Learn about Basware, a Finland-based vendor of networked purchase-to-pay, e-invoicing, procurement, and financing software and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a text file that contains a sequence of commands for a computer operating system.
  • batch job - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch processing - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • battery - A battery is an electrochemical cell (or enclosed and protected material) that can be charged electrically to provide a static potential for power or released electrical charge when needed.
  • battery life - Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful life.
  • battery management system (BMS) - A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries.
  • battery memory effect - The battery memory effect is a reduction in the longevity of a rechargeable battery's charge, due to incomplete discharge in previous uses.
  • baud - Baud was the prevalent measure for data transmission speed until replaced by a more accurate term, bps (bits per second).
  • Baxter industrial robot - Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bayesian logic - Named for Thomas Bayes, an English clergyman and mathematician, Bayesian logic is a branch of logic applied to decision making and inferential statistics that deals with probability inference: using the knowledge of prior events to predict future events.
  • Bayesian statistics - Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected.
  • Bayonet Neil-Concelman - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BBCs - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • BBM 2.0 - BBM 2.0 is an overhauled version of the BlackBerry Messenger application for iOS, Android and BlackBerry devices, released in February 2014.
  • BBS - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bc set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • Bcc - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • Bcc (blind carbon copy or blind courtesy copy) - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BCDR - Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.
  • BCI - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • BCMA - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • BCP - A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.
  • BDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • beacon (proximity beacon) - A beacon, in the context of location-based services, is a small hardware device that enables data transmission to mobile devices when the users are within a specific range of the device.
  • beacon probing - Beacon probing is a networking troubleshooting feature in VMware vSphere that pinpoints failures with physical Ethernet adapters and physical switches.
  • beamforming - Beamforming is a type of RF (radio frequency) management in which an access point uses multiple antennas to send out the same signal.
  • beaming - In infrared transmission, beaming is the communication of data between wireless devices using a beam of infrared light.
  • Bean - In its JavaBeans application program interface for writing a component, Sun Microsystems calls a component a "Bean" (thus continuing their coffee analogy).
  • bearer channel - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • Bearer Independent Call Control - Bearer Independent Call Control (BICC) is a signaling protocol based on N-ISUP that is used to support narrowband ISDN service over a broadband backbone network without interfering with interfaces to the existing network and end-to-end services.
  • Bearer Independent Call Control (BICC) - Bearer Independent Call Control (BICC) is a signaling protocol based on N-ISUP that is used to support narrowband ISDN service over a broadband backbone network without interfering with interfaces to the existing network and end-to-end services.
  • BECN - In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down its requests for data.
  • becquerel - The becquerel is the derived unit of radioactivity in the International System of Units (SI), symbolized Bq and equal to one disintegration or nuclear transformation per second.
  • BEDO DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • BEDO DRAM (Burst Extended Data Output DRAM) - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • BeeMe (MIT Media Lab) - BeeMe is a web-based social experiment that will be hosted by the MIT Media Lab at 11pm on October 31, 2018.
  • beep code - A beep code is the audio signal given out by a computer to announce the result of a short diagnostic testing sequence the computer performs when first powering up (called the Power-On-Self-Test or POST).
  • beeper - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.
  • bees algorithm - The bees algorithm is a method of problem solving that mimics the behavior of honeybees to find the optimum solution.
  • Beginner's All purpose Symbolic Instruction Code - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • Beginner's All-purpose Symbolic Instruction Code - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • beginning of life (BOL) - Beginning of life (BOL), in the context of manufacturing and product lifecycles, is the first stages of a product’s existence.
  • behavior blacklisting - Behavior blacklisting is a security method based on detecting specified suspicious actions on the part of software or human agents and blocking access accordingly.
  • behavior whitelisting - Behavior whitelisting is a security method in which permissable actions within a given system are specified and all others are blocked.
  • behavior-based security - Behavior-based security software scans for deviations from the norm and decides whether an anomaly poses a threat or can simply be ignored.
  • behavior-driven development (BDD) - Behavior-driven development (BDD) is an Agile software development methodology in which an application is documented and designed around the behavior a user expects to experience when interacting with it.
  • behavioral biometrics - Behavioral biometrics are based on human activity such as typing patterns.
  • behavioral economics - Behavioral economics is the study of economic decision-making by individuals and institutions.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • Bel - In electronics and communications, the Bel expresses the logarithmic ratio between two levels of signal power, voltage, or current.
  • Believe it or Not (Answers) - This one is false -- in fact, the Difference Engine was powered by steam.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close