Browse Definitions :

Browse Definitions by Alphabet

BIT - BLU

  • bit depth - In digital audio, bit depth describes the potential accuracy of a particular piece of hardware or software that processes audio data.
  • bit error rate - In telecommunication transmission, the bit error rate (BER) is the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  • bit error rate (BER) - In telecommunication transmission, the bit error rate (BER) is the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  • bit map - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • bit per second - In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bit rot - Bit rot is the slow deterioration in the performance and integrity of data stored on storage media.
  • bit slicing - Bit slicing is a method of combining processor modules to multiply the word length.
  • bit stuffing - Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver.
  • Bit Torrent - BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points.
  • bit/sec - In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • Bitcoin - Bitcoin is a digital currency (also called crypto-currency) that is not backed by any country's central bank or government.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitcoin ATM - A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies.
  • Bitcoin Cash (BCH) - Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.
  • Bitcoin mining - Bitcoin mining is the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the block chain.
  • BitLocker - BitLocker is an operating system-level extension to Vista that combines on-disk encryption and special key management techniques.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • bitmap - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • BitPim - BitPim is a cross-platform, open source application for managing data on cell phones that use the CDMA mobile telephony protocol.
  • bits per second - In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
  • bitwise operator - Because they allow greater precision and require fewer resources, bitwise operators, which manipulate individual bits, can make some code faster and more efficient.
  • Bixby Voice - Bixby Voice is an AI-based voice assistant created by Samsung for their mobile devices and adds voice control for Samsung’s digital assistant, Bixby.
  • BizDevOps (Business, Development and Operations) - BizDevOps, also known as DevOps 2.
  • black body - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black box AI - Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.
  • black hat - Black hat refers to a hacker who breaks into a computer system or network with malicious intent.
  • black hat link building - Black hat link building is techniques used to drive traffic to a website by exploiting website loopholes, enabling a site to rank higher than it should through organic search means.
  • black hat SEO - Black hat SEO is a type of unscrupulous search engine optimization tactic used to raise a website's search engine results page (SERP) ranking illegitimately or lower the ranking of a competitor's site.
  • black level - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • black swan event - A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations.
  • Black Tuesday - Patch Tuesday is the unofficial name of Microsoft's scheduled release of the newest security fixes for its Windows operating system and related software applications, as detailed in the Windows Security Updates Guide.
  • BlackBerry - The BlackBerry is a handheld device made by RIM (Research In Motion) that is widely used in the enterprise for its wireless email handling capability.
  • BlackBerry 10 - BlackBerry 10 is a mobile operating system from Research in Motion.
  • BlackBerry Balance - BlackBerry Balance is a feature of BlackBerry Enterprise Server that allows IT administrators to deploy, secure and remove specific applications and data on BlackBerry smartphones.
  • BlackBerry Enterprise Server - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Hub - BlackBerry Hub is a BlackBerry 10 application that lets users access and respond to emails, text messages and social network activity.
  • Blackberry Secure Work Space - BlackBerry Secure Work Space is an option for BlackBerrry Enterprise Service (BES) 10 that allows administrators to secure and manage non-BlackBerry devices through the BES management console.
  • BlackBerry World - BlackBerry World is the official app store for BlackBerry smartphones and tablets.
  • blackbody radiation - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • blackhole - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blackhole list - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade PC - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade PC (or PC blade) - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended attack - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended exploit - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blind carbon copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • blind courtesy copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BLOB - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • BLOB (binary large object) - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • block cipher - A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
  • blockchain dApp - A blockchain dApp is an evolving concept that describes a blockchain-enabled website in which the management of assets and organizations is decentralized.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
  • blog - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blog terms: Glossary - This is a WhatIs.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogging - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogging Cheat Sheets - We've gathered resources from around the Web to help you create or maintain a blog.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • BLOT - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • BLOT (build, lease, operate, transfer) - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • Blowfish - Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • blue bomb - A "blue bomb" (also known as "WinNuke") is a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate.
  • Blue Button - The Blue Button initiative is a national program that allows patients to access and download personal health information into a simple text file or PDF that contains all of the personal medical data or it can be separated by data class or by date range.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • blue ocean strategy - Blue ocean strategy is a business plan of action developed by W.
  • Blue Origin - Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
  • blue screen of death - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • Blue Tooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • blue/green deployment - A blue/green deployment is a software deployment strategy that relies on two identical production configurations that alternate between active and inactive.
  • Bluebird - OpenNMS (Open Network Management System) is the first enterprise-grade network management platform developed under the open source model.
  • BlueGene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • Bluejacking - Bluejacking is the practice of sending messages between mobile users using a Bluetooth wireless connection.
  • BlueKeep (CVE-2019-0708) - BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 and 2008.
  • bluesnarf - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth 4.0 - Bluetooth 4.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close