Browse Definitions :
3,031 results for:

Business ByDesign

SAP Business ByDesign

Definition | SearchSAP

SAP Business ByDesign is a cloud-based ERP system designed for the middle and upper range of the SME market, as well as for subsidiaries of large ...

e-business (electronic business)

Definition | SearchCIO

E-business (electronic business) is the conduct of business processes on the internet.

B2B (business-to-business)

Definition | SearchCIO

On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services, or information between businesses rather ...

business counterintelligence (business CI)

Definition | WhatIs.com

Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized ...

business rule

Definition | WhatIs.com

A business rule is a statement that describes a business policy or procedure.

business integration

Definition | SearchCIO

Business integration is a strategy wherein the goal is not only to sync IT and business cultures and objectives, but also to assimilate technology ...

business logic

Definition | WhatIs.com

Business logic is the programming that manages communication between an end user application and a database. The main components of business logic ...

business model

Definition | WhatIs.com

A business model is the conceptual structure supporting the viability of a business, including its purpose, its goals and its plans for achieving ...

business services

Definition | SearchCIO

Business services is a general term that describes work that supports a business but does not produce a tangible commodity. 

B2E (Business2Employee or Business-to-Employee)

Definition | SearchCIO

B2E is business-to-employee, an approach in which the focus of business is the employee, rather than the consumer (as it is in business-to-consumer, ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close