Browse Definitions :

Browse Definitions by Alphabet

BT - BUS

  • BT - Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.
  • BTOP - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • Btu - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • BTW - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • bucket brigade - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • buckytube - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buckytubes - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
  • Buffer Under Run Error Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program.
  • build lease operate transfer - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build own operate - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • build own operate transfer - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • built-in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board service - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • BURN Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • BURN-Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • BURN-Proof (Buffer Under Run Error Proof) - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • bus number - In project management, the bus number is the number of team members whose loss would endanger a project.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • Business Application Programming Interface - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • business continuance - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • business continuity - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • Business Continuity and Disaster Recovery - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business continuity policy - Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.
  • business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
  • business counterintelligence (business CI) - Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized access.
  • business cycle - The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy.
  • business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • business impact analysis - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business information center - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • business information center (BIC) - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • Business Information Warehouse - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • business innovation - Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.
  • business integration - Business integration is a strategy wherein the goal is not only to sync IT and business cultures and objectives, but also to assimilate technology into business strategy and goals.
  • business intelligence - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • business intelligence architecture - A business intelligence architecture is the framework for the various technologies an organization deploys to run business intelligence and analytics applications.
  • business intelligence competency center - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
  • business intelligence competency center (BICC) - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
  • business intelligence dashboard - A business intelligence dashboard, or BI dashboard, is a data visualization and analysis tool that displays on one screen the status of key performance indicators (KPIs) and other important business metrics and data points for an organization, department, team or process.
  • Business Intelligence Trends and Technologies (Quiz) - This business intelligence quiz tests your knowledge of the new approaches to dealing with business data and new technologies that enable them.
  • business logic - Business logic is the programming that manages communication between an end user application and a database.
  • business logic attack - A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.
  • business metric - All organizations use business metrics in order to monitor, track and quantify the state of their internal and external processes.
  • business model - A business model is the conceptual structure supporting the viability of a business, including its purpose, its goals and its plans for achieving them.
  • business model innovation - Business model innovation is the implementation of unique concepts to support a company's viability, including the development of new processes for delivering products and services to customers.
  • business performance management - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
  • business plan - A business plan is a document demonstrating the feasibility of a prospective new business and providing a roadmap for its first several years of operation.
  • Business Planning and Control System - Business Planning and Control System (BPCS) is a popular system of application programs for manufacturing and other industries that is developed and sold by Systems Software Associates (SSA).
  • Business Planning and Control System (BPCS) - Business Planning and Control System (BPCS) is a popular system of application programs for manufacturing and other industries that is developed and sold by Systems Software Associates (SSA).
  • business process - A business process is an activity or set of activities that can accomplish a specific organizational goal.
  • business process automation - Business process automation (BPA) is the use of technology to complete business processes with minimal human intervention.
  • business process automation (BPA) - Business process automation (BPA) is the use of technology to complete business processes with minimal human intervention.
  • business process contingency plan - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • business process discovery - Business process discovery, also called process discovery, is a collection of tools and techniques used to define, map and analyze an organization�s existing business processes.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close