Browse Definitions :

Browse Definitions by Alphabet

BUC - BUS

  • bucket brigade - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • buckytube - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buckytubes - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buddy avatar - In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.
  • buddy icon - In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
  • Buffer Under Run Error Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • buffer-to-buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program.
  • build lease operate transfer - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build own operate - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • build own operate transfer - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • built-in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board service - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • bunch of redundant independent clouds (BRIC) - A BRIC architecture stores fragments of data across multiple cloud providers to protect against cloud outages or data loss.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • BURN Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • BURN-Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • BURN-Proof (Buffer Under Run Error Proof) - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • Burst Extended Data Output DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • burst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • bus number - In project management, the bus number is the number of team members whose loss would endanger a project.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • Bush, Vannevar - An electrical engineer by training, Vannevar Bush is credited with having the idea of hypertext or "instant cross-referencing," decades before the term itself was conceived by Ted Nelson and before the concept was widely implemented on the World Wide Web.
  • business activity monitoring - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • Business Application Programming Interface - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • Business Configuration Set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • business continuance - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • business continuity - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • Business Continuity and Disaster Recovery - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • Business Continuity Institute (BCI) - The Business Continuity Institute, which was started in 1994 and is headquartered out of the United Kingdom, is an international organization that offers accreditation and certification, networking, published resources, training and guidance for business continuity professionals.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business continuity policy - Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.
  • business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
  • business counterintelligence (business CI) - Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized access.
  • business cycle - The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy.
  • business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • Business Explorer - In the SAP Business Information Warehouse (BW), BEx (Business Explorer) is the reporting tool used to work with data in the BW database.
  • business impact analysis - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business information center - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • business information center (BIC) - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • Business Information Warehouse - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • business innovation - Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.
  • business integration - Business integration is a strategy wherein the goal is not only to sync IT and business cultures and objectives, but also to assimilate technology into business strategy and goals.
  • business intelligence - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • business intelligence architecture - A business intelligence architecture is the framework for the various technologies an organization deploys to run business intelligence and analytics applications.
  • business intelligence competency center - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
  • business intelligence competency center (BICC) - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
  • business intelligence dashboard - A business intelligence dashboard, or BI dashboard, is a data visualization and analysis tool that displays on one screen the status of key performance indicators (KPIs) and other important business metrics and data points for an organization, department, team or process.
  • Business Intelligence Trends and Technologies (Quiz) - This business intelligence quiz tests your knowledge of the new approaches to dealing with business data and new technologies that enable them.
  • Business lingo: Make it snappy! (Quiz) - We all know time is money.
  • business logic - Business logic is the programming that manages communication between an end user application and a database.
  • business logic attack - A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.
  • business metric - All organizations use business metrics in order to monitor, track and quantify the state of their internal and external processes.
  • business model - A business model is the conceptual structure supporting the viability of a business, including its purpose, its goals and its plans for achieving them.
  • business model innovation - Business model innovation is the implementation of unique concepts to support a company's viability, including the development of new processes for delivering products and services to customers.
  • business performance management - Corporate performance management (CPM) is a term used to describe the various processes and methodologies involved in aligning an organization's strategies and goals to its plans and executions in order to control the success of the company.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close