Browse Definitions :

Browse Definitions by Alphabet

B-C - BIG

  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • B2B (business-to-business) - B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or information between businesses, rather than between businesses and consumers (B2C).
  • B2B2C (business-to-business-to-consumer) - B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling online.
  • B2C (Business2Consumer or Business-to-Consumer) - B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has purchased the goods or service for personal use.
  • BABOK Guide (Guide to the Business Analysis Body of Knowledge) - The guide to the Business Analysis Body of Knowledge, or the BABOK Guide, is a book from the International Institute of Business Analysis (IIBA) that provides essential support and direction to business analysts (BAs) by presenting a collection of the activities that comprise business analysis.
  • Backblaze - Backblaze backs up data that cannot be retrieved if a computer breaks or is lost.
  • backbone - A backbone is a larger transmission line that carries data gathered from smaller lines that interconnect with it.
  • backdoor (computing) - A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  • backdoor selling - Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.
  • backfire effect - The backfire effect is the tendency of some people to resist accepting evidence that conflicts with their beliefs.
  • backhaul - Backhaul, a term probably derived from the trucking industry, has several usages in information technology.
  • Backoff - Backoff is point-of-sale malware that uses memory scraping  to steal credit card data from Windows-based retail machines on which it is installed.
  • backplane - A backplane is an electronic circuit board containing circuitry and sockets into which additional electronic devices on other circuit boards or cards can be plugged; in a computer, generally synonymous with or part of the motherboard.
  • backpropagation algorithm - Backpropagation (backward propagation) is an important mathematical tool for improving the accuracy of predictions in data mining and machine learning.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
  • backup - Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • backup as a service (BaaS) - Backup as a service uses external providers to deliver cloud-based backup services to an enterprise.
  • backup domain controller (Windows NT) - A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources.
  • backup log - Backup log is a feature of backup applications that records the events that occur during a backup process.
  • backup storage device - A backup storage device is used to make copies of data that is actively in use.
  • backward chaining - Backward chaining is the logical process of inferring unknown truths from known conclusions by moving backward from a solution to determine the initial conditions and rules.
  • backward compatible (backward compatibility) - Backward compatible (also known as downward compatible or backward compatibility) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems.
  • backward mapping (inverse mapping or screen order) - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • bad block - A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted.
  • bad neighborhood - A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.
  • baffle (data center hot aisle containment) - Baffle paneling covers unwanted space between racks, under the raised floor and above dropped ceilings in the data center, reducing energy consumption and power use.
  • bag of words model (BoW model) - The bag of words model (BoW model) is a reduced and simplified representation of a text document with selected parts of the text.
  • BAI2 file format - BAI2 file format is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI).
  • Baidu - Baidu is a Chinese technology, internet search and internet services company.
  • balanced scorecard - The balance scorecard (BSC) is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed if necessary to ensure that an organizations strategic goals are met.
  • Ballerina language - Ballerina language is an open-source, cloud-native programming language designed to ease the burden of integration development associated with enterprise applications.
  • band - In telecommunication, a band - sometimes called a frequency band - is a specific range of frequencies in the radio frequency (RF) spectrum, which is divided among ranges from very low frequencies (vlf) to extremely high frequencies (ehf).
  • bandpass filter - A bandpass filter is an electronic device or circuit that allows signals between two specific frequencies to pass, but that discriminates against signals at other frequencies.
  • bandwagon effect - The bandwagon effect is a psychological phenomenon whereby people do something mostly because others are doing it, often ignoring their personal principles or underlying evidence.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • bang-bang (bang-bang control) - Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached.
  • Bank Secrecy Act (BSA) - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • banner grabbing - Banner grabbing is the act of capturing the information provided by banners, configurable text-based welcome screens from network hosts that generally display system information.
  • BANT - BANT is an acronym that stands for “Budget, Authority, Need, Timing.
  • bar code (or barcode) - A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards, and postal mail to identify a particular product number, person, or location.
  • Bar Coded Medication Administration (BCMA) - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
  • bar graph - A bar graph is a pictorial rendition of statistical data in which the independent variable can attain only certain discrete values.
  • barcode printer - A barcode printer is a printer designed to produce barcode labels which can be attached to other objects.
  • barcode reader (POS scanner, bar code reader, price scanner) - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • bare-metal cloud - Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or virtualization infrastructure.
  • bare-metal hypervisor - A bare-metal hypervisor, also known as a Type 1 hypervisor, is virtualization software that has been installed directly onto the computing hardware.
  • bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hardware.
  • bare-metal restore - A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.
  • Barnum effect (Forer effect) - The Barnum effect is the tendency for an individual to personalize a generalization that could apply to anyone.
  • barter economy - A barter economy is a cashless economic system in which services and goods are traded at negotiated rates.
  • base address - A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.
  • base station - In telecommunications, a base station is a fixed transceiver that is the main communication point for one or more wireless mobile client devices.
  • baseband - Describes a telecommunication system in which information is carried in digital form on a single unmultiplexed signal channel on the transmission medium.
  • baseband unit (BBU) - A baseband unit (BBU) is a device that interprets baseband frequencies in telecom systems including computer networks, the internet, phone networks and radio broadcasting systems.
  • baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • Basel Committee on Banking Supervision (BCBS) - The Basel Committee on Banking Supervision (BCBS) is a group of international banking authorities who work to strengthen the regulation, supervision and practices of banks and improve financial stability worldwide.
  • Basel II - Basel II is an international business standard that requires financial institutions to have enough cash reserves to cover risks incurred by operations.
  • bash (Bourne again shell) - Bash (Bourne Again Shell) is the free and enhanced version of the Bourne shell distributed with Linux and GNU operating systems.
  • BASIC (Beginner's All-purpose Symbolic Instruction Code) - BASIC was an early programming language that is still among the simplest and most popular of programming languages.
  • Basic Assembler Language (BAL) - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
  • Basware - Learn about Basware, a Finland-based vendor of networked purchase-to-pay, e-invoicing, procurement, and financing software and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a script file that stores commands to be executed in a serial order.
  • battery life - Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful life.
  • battery management system (BMS) - A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries.
  • battery memory effect - The battery memory effect is a reduction in the longevity of a rechargeable battery's charge, due to incomplete discharge in previous uses.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bayesian logic - Named for Thomas Bayes, an English clergyman and mathematician, Bayesian logic is a branch of logic applied to decision making and inferential statistics that deals with probability inference: using the knowledge of prior events to predict future events.
  • beacon (proximity beacon) - A beacon, in the context of location-based services, is a small hardware device that enables data transmission to mobile devices when the users are within a specific range of the device.
  • beamforming - Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.
  • Bean - In its JavaBeans application program interface for writing a component, Sun Microsystems calls a component a "Bean" (thus continuing their coffee analogy).
  • BeeMe (MIT Media Lab) - BeeMe is a web-based social experiment that will be hosted by the MIT Media Lab at 11pm on October 31, 2018.
  • beep code - A beep code is the audio signal given out by a computer to announce the result of a short diagnostic testing sequence the computer performs when first powering up (called the Power-On-Self-Test or POST).
  • beginning of life (BOL) - Beginning of life (BOL), in the context of manufacturing and product lifecycles, is the first stages of a product’s existence.
  • behavior-based security - Behavior-based security software scans for deviations from the norm and decides whether an anomaly poses a threat or can simply be ignored.
  • behavior-driven development (BDD) - Behavior-driven development (BDD) is an Agile software development methodology in which an application is documented and designed around the behavior a user expects to experience when interacting with it.
  • behavioral biometrics - Behavioral biometrics are based on human activity such as typing patterns.
  • behavioral economics - Behavioral economics is the study of economic decision-making by individuals and institutions.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • benchmark - A benchmark is a point of reference by which something can be measured.
  • benefit corporation - Benefit corporation is a type of corporate structure recognized by some state governments in the United States.
  • benefits administration - Benefits administration is the process of assembling and managing the benefits an organization provides to employees.
  • BERT language model - BERT is an open source machine learning framework for natural language processing (NLP).
  • bespoke - Bespoke (pronounced bee-SPOHK) is a term used in the United Kingdom and elsewhere for an individually- or custom-made product or service.
  • best practice - A best practice is a standard or set of guidelines that is known to produce good outcomes if followed.
  • beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • Betteridge's law (of headlines) - Betteridge's law (of headlines) is an adage that states "Any headline that ends in a question mark can be answered by the word no.
  • Betterworks - Betterworks is cloud-based human capital management software that allows employees to create Objectives and Key Results (OKRs) and link them to organizational goals.
  • bezel - A bezel is the border between the screen and frame of a computer monitor, smartphone or any other computing device.
  • Bezier curve - A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.
  • BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is the protocol underlying the global routing system of the internet.
  • bias - Bias is direct current (DC) deliberately made to flow, or DC voltage deliberately applied, between two points for the purpose of controlling a circuit.
  • BIC (bank identifier code) - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
  • Bidirectional Health Information Exchange (BHIE) - Bidirectional Health Information Exchange (BHIE) is a health information sharing project that builds on the previously established Federal Health Information Exchange (FHIE) program.
  • bidirectional replication - Bidirectional replication is a method of replication between storage media such as hard disks or virtual disks in different locations, in which data can be transmitted in either direction.
  • Big 4 (Final 4) - The Big 4, also known as the Final 4, are the four largest international accounting and professional services firms.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • OODA loop

    The OODA loop (Observe, Orient, Decide, Act) is a four-step approach to decision-making that focuses on filtering available ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close