Browse Definitions :

Browse Definitions by Alphabet

BLA - BOO

  • blackbody - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • blackbody radiation - A blackbody (sometimes spelled "black body") is a theoretically ideal radiator and absorber of energy at all electromagnetic wavelength s.
  • blackhole - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blackhole list - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blackhole list (blacklist) - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade PC - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade PC (or PC blade) - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended agent - A blended agent, in a call center or contact center context, is an agent who manages both incoming and outgoing calls and applications as needed.
  • blended attack - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended exploit - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • blind carbon copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • blind courtesy copy - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BLOB - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • BLOB (binary large object) - In computers, a BLOB (binary large object), pronounced BLAHB and sometimes spelled in all lower case, is a large file, typically an image or sound file, that must be handled (for example, uploaded, downloaded, or stored in a database) in a special way because of its size.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • block cipher - A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data.
  • blockchain dApp - A blockchain dApp is an evolving concept that describes a blockchain-enabled website in which the management of assets and organizations is decentralized.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across the world to store files.
  • blog - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blog terms: Glossary - This is a WhatIs.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogging - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogging Cheat Sheets - We've gathered resources from around the Web to help you create or maintain a blog.
  • blogosphere - Blogosphere is a term some writers have used to describe the grassroots and interactive journalism made possible by participants in blogs (logs or journals maintained on the Internet) and the symbiotic relationship between bloggers and traditional journalists.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • BLOT - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • BLOT (build, lease, operate, transfer) - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • Blowfish - Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • blue bomb - A "blue bomb" (also known as "WinNuke") is a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate.
  • blue bomb (WinNuke) - A "blue bomb" (also known as "WinNuke") is a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate.
  • Blue Book - The Blue Book is the informal name for the standard specification document for stamped multisession (also known as the enhanced CD or E-CD) disk format, developed in 1995 from a supplement to Philips and Sony's 1988 Orange Book.
  • Blue Button - The Blue Button initiative is a national program that allows patients to access and download personal health information into a simple text file or PDF that contains all of the personal medical data or it can be separated by data class or by date range.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • blue laser - A blue laser is a laser (pronounced LAY-zer) with a shorter wavelength than the red laser used in today's compact disc and laser printer technologies and the ability to store and read two to four times the amount of data.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • blue ocean strategy - Blue ocean strategy is a business plan of action developed by W.
  • Blue Origin - Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
  • blue screen of death - The blue screen of death (BSOD), is the informal name given by users to the Windows general protection fault (GPF) error.
  • blue screen of death (BSOD) - The blue screen of death (BSOD), is the informal name given by users to the Windows general protection fault (GPF) error.
  • Blue Tooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • blue/green deployment - A blue/green deployment is a software deployment strategy that relies on two identical production configurations that alternate between active and inactive.
  • Bluebird - OpenNMS (Open Network Management System) is the first enterprise-grade network management platform developed under the open source model.
  • BlueGene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • Bluejacking - Bluejacking is the practice of sending messages between mobile users using a Bluetooth wireless connection.
  • BlueKeep (CVE-2019-0708) - BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 and 2008.
  • bluesnarf - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth 4.0 - Bluetooth 4.
  • Bluetooth brick - A Bluetooth brick is a battery-powered, sealed device that has sensors for monitoring and communicating information such as temperature or vibration levels.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • Bluetooth virus - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • Bluetooth worm - A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another.
  • Bluetoothing - Toothing (sometimes called Bluetoothing) is the practice of contacting strangers via a Bluetooth wireless connection to flirt.
  • BMC - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • BMI - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • BNC - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BNC (Bayonet Neil-Concelman or British Naval Connector) - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • BO2K - Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems.
  • board - A card (or expansion card, board, or adapter) is circuitry designed to provide expanded capability to a computer.
  • board - In computers, a board, depending on usage, can be short for motherboard, the physical arrangement of a computer's basic components and circuitry, or it can refer to an expansion board (or card or adapter), which fits into one of the computer's expansion slots and provides expanded capability.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • BOB - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • BOC - BOC (Bell operating company) is a term for any of the 22 original companies (or their successors) that were created when AT&T was broken up in 1983 and given the right to provide local telephone service in a given geographic area.
  • BOC (Bell operating company) - BOC (Bell operating company) is a term for any of the 22 original companies (or their successors) that were created when AT&T was broken up in 1983 and given the right to provide local telephone service in a given geographic area.
  • Bochs - Bochs (pronounced 'box') is an open source PC emulator that supports a wide variety of operating systems.
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • body cam (bodycam) - A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.
  • bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
  • bogey - The term bogie, also spelled bogey, refers to a false blip on a radar display.
  • bogie - The term bogie, also spelled bogey, refers to a false blip on a radar display.
  • bogie (bogey) - The term bogie, also spelled bogey, refers to a false blip on a radar display.
  • bogomips - Bogomips is a measurement provided in the Linux operating system that indicates in a relative way how fast the computer processor runs.
  • bogon - A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the Internet Assigned Number Authority (IANA).
  • Bohr radius - The Bohr radius, symbolized as 0, is the mean radius of the orbit of an electron around the nucleus of a hydrogen atom at its ground state (lowest-energy level).
  • boil the ocean - To boil the ocean, in a business context, is to increase the scope of a project or task until it is practically impossible to accomplish as envisioned.
  • boilerplate - In information technology, a boilerplate is a unit of writing that can be reused over and over without change.
  • BOINC (Berkeley Open Infrastructure for Network Computing) - BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.
  • bolt-on - On the Internet, bolt-on, perhaps inspired by add-on, is used to describe products and systems that can be quickly but securely attached to an existing Web site.
  • Boltzmann's constant - Boltzmann's constant, also called the Boltzmann constant and symbolized k or k B, defines the relation between absolute temperature and the kinetic energy contained in each molecule of an ideal gas.
  • BoM - A bill of materials (BOM) is a comprehensive inventory of the raw materials, assemblies, subassemblies, parts and components, as well as the quantities of each, needed to manufacture a product.
  • Bombay Stock Exchange - The Bombay Stock Exchange or BSE is Asia's oldest stock exchange.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • BOO - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • BOO project - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close