Browse Definitions :

Browse Definitions by Alphabet

BRA - BTU

  • branch-in-a-box - A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required locally but are difficult to provide over a WAN.
  • branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
  • brand - A brand is a product, service, or concept that is publicly distinguished from other products, services, or concepts so that it can be easily communicated and usually marketed.
  • brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
  • brand equity - Brand equity is the perceived value a company gains by having a known name, logo or other identifier.
  • brand essence (brand mantra) - Brand essence, also known as a brand mantra, is a short statement that expresses the core of what that brand represents or the image it seeks to project.
  • brand experience - Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.
  • brand journalism - Brand journalism is a mix of content marketing, public relations and corporate communications.
  • brand loyalty - Brand loyalty is an emotional tie to a brand that leads to a consumer to continue and expand their purchases for products from the same brand.
  • brand personality - Brand personality is the association of human characteristics with a brand name so that consumers can relate to it.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • brand spoof - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brand spoofing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brandjacking - Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand.
  • BRB - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • BRE - A business rules engine (BRE) is a software component that allows non-programmers to add or change business logic in a business process management (BPM) system.
  • breach detection system (BDS) - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
  • bread crumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • bread crumbing - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumbs - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • Breakthrough Energy Ventures - Breakthrough Energy Ventures is the $1 billion investment fund associated with the Breakthrough Energy Coalition, a group promoting clean tech innovation.
  • breathalyzer cell phone - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
  • BREW - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BRI - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bridge disc - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
  • bridge disk - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
  • bridge tap - A bridge tap is an extraneous length of dangling, unterminated cable on a communications line, usually left over from an earlier configuration, that can cause impedance mismatches and other undesired effects in transmissions.
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • brightness - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • bring your own apps (BYOA) - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace.
  • Bring Your Own Authentication (BYOA) - Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise.
  • bring your own bandwidth (BYOB) - Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • bring your own everything (BYOx) - Bring your own everything (BYOx) is a term that refers to employees' use of personal technology to perform work tasks.
  • bring your own network (BYON) - When a network administrator talks about BYON, he is describing the ability that employees have to create a wireless hot spot at work.
  • bring your own technology - Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho.
  • bring your own wearables - Bring your own wearables (BYOW) is a trend toward the use of employee-owned wearable computing devices in a business setting.
  • British Naval Connector - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • British Standard 10012:2009 - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • British Standards Institution - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British thermal unit - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • broad agency announcement - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • broad agency announcement (BAA) - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • broadband dialup - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Broadband Global Area Network - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Broadband Integrated Services Digital Network - BISDN is both a concept and a set of services and developing standards for integrating digital transmission services in a broadband network of fiber optic and radio media.
  • Broadband over Power Line - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband Over Powerline - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband Technology Opportunities Program - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • broadcast - In general, to broadcast (verb) is to cast or throw forth something in all directions at the same time.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • broker - A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brouter - A brouter (pronounced BRAU-tuhr or sometimes BEE-rau-tuhr) is a network bridge and a router combined in a single product.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • brownfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • brownout reset - A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser extension malware - Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been compromised by an attacker to do so.
  • browser hijacker - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser isolation - Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing activity from their local machine, network and infrastructure.
  • browser virtualization (in desktop virtualization) - Virtualizing a browser helps companies run mission-critical applications in legacy browsers.
  • browser-safe palette - Go directly to the 216-color browser-safe palette table 136 browser colors with names When specifying colors for Web page backgrounds, fonts, and other elements for 256-color displays (the most common display capability), you will probably want to choose from the 216 colors that look the same on both PC and Mac operating systems.
  • brushing scam - A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.
  • brute force - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • brute force attack - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • BS 10012:2009 - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 10012:2009 (British Standard 10012:2009) - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 15000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • BS 7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BS7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BSA - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSA - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSB - In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • BSD - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • BSI - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • BSM - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • BSOD - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • BSP - A business service provider (BSP) is a company that rents third-party software application packages to their customers.
  • BSRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • BT - Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.
  • BTM - Business technology management (BTM) is a term for a group of services intended to help businesses that might not have their own information technology (IT) department.
  • BTOP - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • BTP - The Business Transaction Protocol (BTP) is an XML-based protocol being developed by the Business Transactions Technical Committee (BT TC) of the Organization for the Advancement of Structured Information Standards (OASIS) as a standardized Internet-based means of managing complex, ongoing business-to-business (B2B) transactions among multiple organizations.
  • Btu - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close