Browse Definitions :

Browse Definitions by Alphabet

BRA - BT

  • brand journalism - Brand journalism is a mix of content marketing, public relations and corporate communications.
  • brand loyalty - Brand loyalty is an emotional tie to a brand that leads to a consumer to continue and expand their purchases for products from the same brand.
  • brand personality - Brand personality is the association of human characteristics with a brand name so that consumers can relate to it.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • brand spoof - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brand spoofing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • brandjacking - Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand.
  • BRE Environmental Assessment Method - BREEAM (BRE Environmental Assessment Method) is an environmental standard that rates the sustainability of buildings in the UK.
  • breach detection system (BDS) - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
  • bread crumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • bread crumbing - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • breadcrumbs - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • Breakthrough Energy Ventures - Breakthrough Energy Ventures is the $1 billion investment fund associated with the Breakthrough Energy Coalition, a group promoting clean tech innovation.
  • breathalyzer cell phone - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
  • breathalyzer cell phone (sobriety cell phone) - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
  • BREEAM - BREEAM (BRE Environmental Assessment Method) is an environmental standard that rates the sustainability of buildings in the UK.
  • BREW - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BRI - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • brick server - A brick server is a compact computer server module without a chassis that can come in various processor, RAM, I/O, and storage configurations and is designed to fit into rack locations similar to those for blade servers.
  • bricks and mortar - Bricks and mortar refers to businesses that have physical (rather than virtual or online) presences - in other words, stores (built of physical material such as bricks and mortar) that you can drive to and enter physically to see, touch, and purchase merchandise.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bridge disc - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
  • bridge disk - A CD-Bridge Disc (sometimes just called a bridge disc) is a compact disc (CD) format that includes extra information on a CD-ROM XA (extended architecture) track, so that the disc can be played on either a CD-i (interactive) player attached to a television, or a CD-ROM XA drive attached to a computer.
  • bridge tap - A bridge tap is an extraneous length of dangling, unterminated cable on a communications line, usually left over from an earlier configuration, that can cause impedance mismatches and other undesired effects in transmissions.
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • brightness - Hue, saturation, and brightness are aspects of color in the red, green, and blue (RGB) scheme.
  • brightness - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • bring your own apps (BYOA) - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace.
  • Bring Your Own Authentication (BYOA) - Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise.
  • bring your own bandwidth (BYOB) - Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • bring your own device workplace (BYOD workplace) - A bring your own work environment (BYOWE) is one that allows -- or even encourages -- employees to use consumer technology for job-related tasks.
  • bring your own everything (BYOx) - Bring your own everything (BYOx) is a term that refers to employees' use of personal technology to perform work tasks.
  • bring your own network (BYON) - When a network administrator talks about BYON, he is describing the ability that employees have to create a wireless hot spot at work.
  • bring your own technology - Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho.
  • bring your own wearables - Bring your own wearables (BYOW) is a trend toward the use of employee-owned wearable computing devices in a business setting.
  • British Naval Connector - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • British Standard 10012:2009 - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • British Standards Institution - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British thermal unit - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • broad agency announcement - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • broad agency announcement (BAA) - A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.
  • broadband - In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
  • broadband dialup - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • Broadband Global Area Network - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Broadband Integrated Services Digital Network - BISDN is both a concept and a set of services and developing standards for integrating digital transmission services in a broadband network of fiber optic and radio media.
  • Broadband Integrated Services Digital Network (BISDN) - BISDN is both a concept and a set of services and developing standards for integrating digital transmission services in a broadband network of fiber optic and radio media.
  • Broadband Metropolitan Area Network - BMAN (Broadband Metropolitan Area Network) is a telecommunications service from Sprint.
  • Broadband over Power Line - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband over Power Line (BPL) - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband Over Powerline - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband Technology Opportunities Program - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • broadcast - In general, to broadcast (verb) is to cast or throw forth something in all directions at the same time.
  • broadcast flag - The broadcast flag is the Advanced Television Systems Committee's proposed copy protection encoding for broadcast digital television (DTV) signals.
  • Broadvision - BroadVision makes sophisticated e-commerce software for companies who want to sell and service products over the Web.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • broker - A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brouter - A brouter (pronounced BRAU-tuhr or sometimes BEE-rau-tuhr) is a network bridge and a router combined in a single product.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • brownfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • brownout reset - A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser extension malware - Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been compromised by an attacker to do so.
  • browser hijacker - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser isolation - Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing activity from their local machine, network and infrastructure.
  • browser virtualization (in desktop virtualization) - Virtualizing a browser helps companies run mission-critical applications in legacy browsers.
  • browser-safe palette - Go directly to the 216-color browser-safe palette table 136 browser colors with names When specifying colors for Web page backgrounds, fonts, and other elements for 256-color displays (the most common display capability), you will probably want to choose from the 216 colors that look the same on both PC and Mac operating systems.
  • browserless Web - The browserless Web describes communication over the World Wide Web between programs rather than between people (with their Web browsers) and the server programs at Web sites.
  • brushing scam - A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.
  • brute force - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • brute force attack - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
  • BS 10012:2009 - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 10012:2009 (British Standard 10012:2009) - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • BS 15000 - ISO 20000 is a global standard that describes the requirements for an information technology service management (ISM) system.
  • BS 25999 - BS 25999 is the British Standards Institution (or BSI) standards for business continuity management.
  • BS 7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BS7799 - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • BSA - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • BSB - In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • BSD - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • BSI - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • BSM - The balanced scorecard is a management system aimed at translating an organization's strategic goals into a set of performance objectives that, in turn, are measured, monitored and changed if necessary to ensure that the organization's strategic goals are met.
  • BSOD - The blue screen of death (BSOD), is the informal name given by users to the Windows general protection fault (GPF) error.
  • BSRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • BT - Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close