Browse Definitions :

Browse Definitions by Alphabet

BUD - BUS

  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer credits or buffer-to-buffer credits (BBCs) - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • buffer flush - A buffer flush is the transfer of computer data from a temporary storage area to the computer's permanent memory.
  • buffer overflow - A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold.
  • Buffer Under Run Error Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • buffer-to-buffer credits - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • bug convergence - In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program.
  • build lease operate transfer - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build own operate - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • build own operate transfer - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build your own app (BYOA) - Build your own app (BYOA) is an increasing trend towards the creation of applications by people without software development skills.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • built-in obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board service - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullfighter - Bullfighter is a software application that searches documents for jargon, overworked terms, and unnecessarily complicated sentences.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • Bump - Bump is a free software program (app) that allows two phones to transfer contact information when the phone owners "bump" hands.
  • bump mapping - Bump mapping is a technique used in graphics programs to produce the appearance of textured surfaces.
  • bunch of redundant independent clouds (BRIC) - A BRIC architecture stores fragments of data across multiple cloud providers to protect against cloud outages or data loss.
  • bundling - In purchasing, bundling is the practice of marketing two or more products or services in a single package with one price.
  • bunny suit - A bunny suit is an coverall garment worn over street clothes to prevent skin and hair from being shed in a clean room environment.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • BURN Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • BURN-Proof - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • BURN-Proof (Buffer Under Run Error Proof) - BURN-Proof (Buffer Under Run Error Proof) is a technology developed by Sanyo that allows compact disc (CD) recording to automatically stop in the event of an unplanned interruption and then to resume recording.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • burst - Burst is a term used in a number of information technology contexts to mean a specific amount of data sent or received in one intermittent operation.
  • Burst Extended Data Output DRAM - BEDO DRAM (Burst Extended Data Output DRAM) is a type of dynamic random access memory (DRAM) that can send data back to the computer from one read operation at the same time it is reading in the address of the next data to be sent.
  • burst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burst SRAM (SynchBurst SRAM) - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is an arrangement in a local area network (LAN) in which each node (workstation or other device) is connected to a main cable or link called the bus.
  • bus number - In project management, the bus number is the number of team members whose loss would endanger a project.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • Bush, Vannevar - An electrical engineer by training, Vannevar Bush is credited with having the idea of hypertext or "instant cross-referencing," decades before the term itself was conceived by Ted Nelson and before the concept was widely implemented on the World Wide Web.
  • business activity monitoring - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business activity monitoring (BAM) - Business activity monitoring (BAM), also called business activity management, is the use of technology to proactively define and analyze critical opportunities and risks in an enterprise to maximize profitability and optimize efficiency.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business analytics (BA) - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • Business Application Programming Interface - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • Business case analysis and a business case guide - A business case is an argument, usually documented, that is intended to convince a decision maker to approve some kind of action.
  • Business Configuration Set - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • Business Configuration Set (BC Set) - In the R/3 system from SAP, a Business Configuration Set (BC Set) is a management tool that allows the user to record, save, and share customized settings.
  • business continuance - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • business continuity - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • Business Continuity and Disaster Recovery - Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.
  • Business Continuity Institute (BCI) - The Business Continuity Institute, which was started in 1994 and is headquartered out of the United Kingdom, is an international organization that offers accreditation and certification, networking, published resources, training and guidance for business continuity professionals.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan - A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business continuity policy - Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.
  • business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
  • business counterintelligence (business CI) - Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized access.
  • business cycle - The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy.
  • business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • Business Explorer - In the SAP Business Information Warehouse (BW), BEx (Business Explorer) is the reporting tool used to work with data in the BW database.
  • business impact analysis - A business impact analysis (BIA) identifies and examines the effects of natural or human-caused disasters on critical business functions.
  • business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business information center - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • business information center (BIC) - A business information center (BIC) is an incubator for entrepeneurs designed to offer information, education, training and access to other services at one location.
  • Business Information Warehouse - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • business innovation - Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.
  • business integration - Business integration is a strategy wherein the goal is not only to sync IT and business cultures and objectives, but also to assimilate technology into business strategy and goals.
  • business intelligence - Business intelligence (BI) is a technology-driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • Business Intelligence (BI) Guides - We've gathered a collection of our learning guides and tutorials about business intelligence.
  • Business Intelligence (BI) Quizzes - We've gathered quizzes to test your knowledge of business intelligence (BI).
  • business intelligence architecture - A business intelligence architecture is the framework for the various technologies an organization deploys to run business intelligence and analytics applications.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close