Browse Definitions :

Browse Definitions by Alphabet

BRU - BUS

  • brushing scam - A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.
  • brute force - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • brute force attack - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • BS 10012:2009 - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 10012:2009 (British Standard 10012:2009) - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 15000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • BS 25999 - BS 25999 is the British Standards Institution (or BSI) standards for business continuity management.
  • BS 7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BS7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BSA - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • BSA - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSB - In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • BSD - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • BSI - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • BSM - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • BSOD - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • BSP - A business service provider (BSP) is a company that rents third-party software application packages to their customers.
  • BSRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • BT - Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.
  • BTM - Business technology management (BTM) is a term for a group of services intended to help businesses that might not have their own information technology (IT) department.
  • BTOP - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • BTP - The Business Transaction Protocol (BTP) is an XML-based protocol being developed by the Business Transactions Technical Committee (BT TC) of the Organization for the Advancement of Structured Information Standards (OASIS) as a standardized Internet-based means of managing complex, ongoing business-to-business (B2B) transactions among multiple organizations.
  • Btu - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • BTW - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • bucket brigade - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • buckypaper - Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes, which are long, cylindrical carbon structures consisting of hexagonal graphite molecules attached at the edges.
  • buckytube - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buckytubes - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buddy avatar - In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.
  • buddy icon - In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer overflow - A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold.
  • Buffer Under Run Error Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • buffer-to-buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • bug convergence - In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program.
  • build lease operate transfer - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build own operate - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • build own operate transfer - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build your own app (BYOA) - Build your own app (BYOA) is an increasing trend towards the creation of applications by people without software development skills.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • built-in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board service - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • Bump - Bump is a free software program (app) that allows two phones to transfer contact information when the phone owners "bump" hands.
  • bunch of redundant independent clouds (BRIC) - A BRIC architecture stores fragments of data across multiple cloud providers to protect against cloud outages or data loss.
  • bunny suit - A bunny suit is an coverall garment worn over street clothes to prevent skin and hair from being shed in a clean room environment.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • BURN Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • BURN-Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • BURN-Proof (Buffer Under Run Error Proof) - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • Burst Extended Data Output DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • burst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burst SRAM (SynchBurst SRAM) - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • bus number - In project management, the bus number is the number of team members whose loss would endanger a project.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • Bush, Vannevar - An electrical engineer by training, Vannevar Bush is credited with having the idea of hypertext or "instant cross-referencing," decades before the term itself was conceived by Ted Nelson and before the concept was widely implemented on the World Wide Web.
  • business activity monitoring - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business analytics (BA) - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • Business Application Programming Interface - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • Business case analysis and a business case guide - A business case is an argument, usually documented, that is intended to convince a decision maker to approve some kind of action.
  • Business Configuration Set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • business continuance - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close