Browse Definitions :

Browse Definitions by Alphabet

BIT - BOG

  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • bitmap - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • BitPim - BitPim is a cross-platform, open source application for managing data on cell phones that use the CDMA mobile telephony protocol.
  • bits per second - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
  • bitwise operator - Because they allow greater precision and require fewer resources, bitwise operators, which manipulate individual bits, can make some code faster and more efficient.
  • Bixby Voice - Bixby Voice is an AI-based voice assistant created by Samsung for their mobile devices and adds voice control for Samsung’s digital assistant, Bixby.
  • BizDevOps (Business, Development and Operations) - BizDevOps, also known as DevOps 2.
  • black body - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black box AI - Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.
  • black hat - Black hat refers to a hacker who breaks into a computer system or network with malicious intent.
  • black hat link building - Black hat link building is techniques used to drive traffic to a website by exploiting website loopholes, enabling a site to rank higher than it should through organic search means.
  • black hat SEO - Black hat SEO is a type of unscrupulous search engine optimization tactic used to raise a website's search engine results page (SERP) ranking illegitimately or lower the ranking of a competitor's site.
  • black level - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • black swan event - A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations.
  • Black Tuesday - Patch Tuesday is the unofficial name of Microsoft's scheduled release of the newest security fixes for its Windows operating system and related software applications, as detailed in the Windows Security Updates Guide.
  • BlackBerry 10 - BlackBerry 10 is a mobile operating system from Research in Motion.
  • BlackBerry Balance - BlackBerry Balance is a feature of BlackBerry Enterprise Server that allows IT administrators to deploy, secure and remove specific applications and data on BlackBerry smartphones.
  • BlackBerry Enterprise Server - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Hub - BlackBerry Hub is a BlackBerry 10 application that lets users access and respond to emails, text messages and social network activity.
  • Blackberry Secure Work Space - BlackBerry Secure Work Space is an option for BlackBerrry Enterprise Service (BES) 10 that allows administrators to secure and manage non-BlackBerry devices through the BES management console.
  • BlackBerry World - BlackBerry World is the official app store for BlackBerry smartphones and tablets.
  • blackbody radiation - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • blackhole - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blackhole list - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade PC - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade PC (or PC blade) - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended attack - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended exploit - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blind carbon copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • blind courtesy copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BLOB - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • BLOB (binary large object) - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • block cipher - A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
  • blockchain dApp - A blockchain dApp is an evolving concept that describes a blockchain-enabled website in which the management of assets and organizations is decentralized.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
  • blog - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blog terms: Glossary - This is a WhatIs.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogging - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogging Cheat Sheets - We've gathered resources from around the Web to help you create or maintain a blog.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • BLOT - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • BLOT (build, lease, operate, transfer) - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • Blowfish - Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • blue bomb - A "blue bomb" (also known as "WinNuke") is a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate.
  • Blue Button - The Blue Button initiative is a national program that allows patients to access and download personal health information into a simple text file or PDF that contains all of the personal medical data or it can be separated by data class or by date range.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • blue ocean strategy - Blue ocean strategy is a business plan of action developed by W.
  • Blue Origin - Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
  • blue screen of death - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • Blue Tooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • blue/green deployment - A blue/green deployment is a change management strategy for releasing software code.
  • Bluebird - OpenNMS (Open Network Management System) is the first enterprise-grade network management platform developed under the open source model.
  • BlueGene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • BlueKeep (CVE-2019-0708) - BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 and 2008.
  • bluesnarf - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth 4.0 - Bluetooth 4.
  • Bluetooth brick - A Bluetooth brick is a battery-powered, sealed device that has sensors for monitoring and communicating information such as temperature or vibration levels.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • Bluetooth virus - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • Bluetooth worm - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • Bluetoothing - Toothing (sometimes called Bluetoothing) is the practice of contacting strangers via a Bluetooth wireless connection to flirt.
  • BMC - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • BMI - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • BNC - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BNC (Bayonet Neil-Concelman or British Naval Connector) - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BO2K - Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems.
  • board - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • BOB - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • BOC - BOC (Bell operating company) is a term for any of the 22 original companies (or their successors) that were created when AT&T was broken up in 1983 and given the right to provide local telephone service in a given geographic area.
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • body cam (bodycam) - A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.
  • bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
  • bogey - The term bogie, also spelled bogey, refers to a false blip on a radar display.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close