Browse Definitions :

Browse Definitions by Alphabet

BTU - BUS

  • Btu - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • bubble help - In a computer user interface, bubble help is text information that is displayed in a small balloon or box when a computer user moves the mouse cursor over a selected user interface element, such as the iconic items in a task bar.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • bucket brigade - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.
  • buckypaper - Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes, which are long, cylindrical carbon structures consisting of hexagonal graphite molecules attached at the edges.
  • buckytube - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buckytubes - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • buddy icon (buddy avatar) - In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.
  • buddy list - In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer credits or buffer-to-buffer credits (BBCs) - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer flush - A buffer flush is the transfer of computer data from a temporary storage area to the computer's permanent memory.
  • buffer overflow - A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold.
  • Buffer Under Run Error Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • buffer-to-buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • bug convergence - In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program.
  • build lease operate transfer - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build own operate - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • build own operate transfer - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • built-in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board service - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullfighter - Bullfighter is a software application that searches documents for jargon, overworked terms, and unnecessarily complicated sentences.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • Bump - Bump is a free software program (app) that allows two phones to transfer contact information when the phone owners "bump" hands.
  • bump mapping - Bump mapping is a technique used in graphics programs to produce the appearance of textured surfaces.
  • bunch of redundant independent clouds (BRIC) - A BRIC architecture stores fragments of data across multiple cloud providers to protect against cloud outages or data loss.
  • bundling - In purchasing, bundling is the practice of marketing two or more products or services in a single package with one price.
  • bunny suit - A bunny suit is an coverall garment worn over street clothes to prevent skin and hair from being shed in a clean room environment.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • BURN Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • BURN-Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • BURN-Proof (Buffer Under Run Error Proof) - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • burst - Burst is a term used in a number of information technology contexts to mean a specific amount of data sent or received in one intermittent operation.
  • Burst Extended Data Output DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • burst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burst SRAM (SynchBurst SRAM) - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is an arrangement in a local area network (LAN) in which each node (workstation or other device) is connected to a main cable or link called the bus.
  • bus number - In project management, the bus number is the number of team members whose loss would endanger a project.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • Bush, Vannevar - An electrical engineer by training, Vannevar Bush is credited with having the idea of hypertext or "instant cross-referencing," decades before the term itself was conceived by Ted Nelson and before the concept was widely implemented on the World Wide Web.
  • business activity monitoring - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business activity monitoring (BAM) - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business analytics (BA) - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • Business Application Programming Interface - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • Business case analysis and a business case guide - A business case is an argument, usually documented, that is intended to convince a decision maker to approve some kind of action.
  • Business Configuration Set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • Business Configuration Set (BC Set) - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • business continuance - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • business continuity - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • Business Continuity and Disaster Recovery - Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.
  • Business Continuity Institute (BCI) - The Business Continuity Institute, which was started in 1994 and is headquartered out of the United Kingdom, is an international organization that offers accreditation and certification, networking, published resources, training and guidance for business continuity professionals.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan - A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business continuity policy - Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.
  • business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
  • business counterintelligence (business CI) - Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized access.
  • business cycle - The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy.
  • business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • Business Explorer - In the SAP Business Information Warehouse (BW), BEx (Business Explorer) is the reporting tool used to work with data in the BW database.
  • business impact analysis - A business impact analysis (BIA) identifies and examines the effects of natural or human-caused disasters on critical business functions.
  • business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business information center - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • business information center (BIC) - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close