Browse Definitions :

Browse Definitions by Alphabet

BPE - BSO

  • BPEL4WS - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in a distributed computing or grid computing environment.
  • BPELWS - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in a distributed computing or grid computing environment.
  • BPM - Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.
  • BPMI - Established in August 2000, the Business Process Management Initiative (BPMI) is a non-profit organization that exists to promote the standardization of common business processes, as a means of furthering e-business and B2B development.
  • BPML - Business Process Modeling Language (BPML) is an Extensible Markup Language (XML)-based metalanguage developed by the Business Process Management Initiative (BPMI) as a means of modeling business processes, much as XML is, itself, a metalanguage with the ability to model enterprise data.
  • BPMN - Business Process Modeling Notation (BPMN) is a method of illustrating business processes in the form of a diagram similar to a flowchart.
  • BPO - Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to perform an essential business task.
  • BPR - Business process reengineering (BPR) is an approach to change management in which the related tasks required to obtain a specific business outcome are radically redesigned.
  • BPS - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bps - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • brain computer interface - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brain dump - A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • brain hijacking - Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.
  • brain machine interface - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brain-computer interface - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brain-dump - A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive.
  • braindump - A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive.
  • brainjacking - Brainjacking is the hacking of neural implants, surgically implanted devices, which interface with the brain and the central nervous system.
  • brainstorming - Brainstorming is a group problem-solving method that involves the spontaneous contribution of creative ideas and solutions.
  • branch in a box - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • branch office box - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • branch-in-a-box - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
  • brand - A brand is a product, service, or concept that is publicly distinguished from other products, services, or concepts so that it can be easily communicated and usually marketed.
  • brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
  • brand equity - Brand equity is the perceived value a company gains by having a known name, logo or other identifier.
  • brand essence (brand mantra) - Brand essence, also known as a brand mantra, is a short statement that expresses the core of what that brand represents or the image it seeks to project.
  • brand experience - Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.
  • brand journalism - Brand journalism is a mix of content marketing, public relations and corporate communications.
  • brand loyalty - Brand loyalty is an emotional tie to a brand that leads to a consumer to continue and expand their purchases for products from the same brand.
  • brand personality - Brand personality is the association of human characteristics with a brand name so that consumers can relate to it.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • brand spoof - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brand spoofing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brandjacking - Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand.
  • BRB - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • BRE - A business rules engine (BRE) is a software component that allows non-programmers to add or change business logic in a business process management (BPM) system.
  • breach detection system (BDS) - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
  • bread crumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • bread crumbing - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumbs - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • Breakthrough Energy Ventures - Breakthrough Energy Ventures is the $1 billion investment fund associated with the Breakthrough Energy Coalition, a group promoting clean tech innovation.
  • BREW - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bridge tap - A bridge tap is an extraneous length of dangling, unterminated cable on a communications line, usually left over from an earlier configuration, that can cause impedance mismatches and other undesired effects in transmissions.
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • brightness - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • bring your own apps (BYOA) - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace.
  • bring your own bandwidth (BYOB) - Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • bring your own everything (BYOx) - Bring your own everything (BYOx) is a term that refers to employees' use of personal technology to perform work tasks.
  • bring your own network (BYON) - When a network administrator talks about BYON, he is describing the ability that employees have to create a wireless hot spot at work.
  • bring your own technology - Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho.
  • bring your own wearables - Bring your own wearables (BYOW) is a trend toward the use of employee-owned wearable computing devices in a business setting.
  • British Naval Connector - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • British Standards Institution - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British thermal unit - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • broad agency announcement - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • broad agency announcement (BAA) - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • Broadband Global Area Network - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Broadband Technology Opportunities Program - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • broadcast - In general, to broadcast (verb) is to cast or throw forth something in all directions at the same time.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • broker - A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • brownfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • brownout reset - A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser extension malware - Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been compromised by an attacker to do so.
  • browser hijacker - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser isolation - Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing activity from their local machine, network and infrastructure.
  • browser virtualization (in desktop virtualization) - Virtualizing a browser helps companies run mission-critical applications in legacy browsers.
  • brushing scam - A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.
  • brute force - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • brute-force attack - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • BS 7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BS7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BSA - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSA - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
  • BSD - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • BSI - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • BSM - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • BSOD - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close