Browse Definitions :

Browse Definitions by Alphabet

BIG - BLU

  • big bang adoption - Big bang adoption is a hardware or software migration method that involves getting rid of the existing system and transferring all users to the new system simultaneously.
  • big box store - A big box store is a very large brick and mortar retail location which sells a variety of merchandise, usually at a low price.
  • big data - Big data is a combination of structured, semistructured and unstructured data collected by organizations that can be mined for information and used in machine learning projects, predictive modeling and other advanced analytics applications.
  • big data analytics - Big data analytics is the often complex process of examining big data to uncover information -- such as hidden patterns, correlations, market trends and customer preferences -- that can help organizations make informed business decisions.
  • big data as a service (BDaaS) - Big data as a service (BDaaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, manage and analyze large data sets so they can generate insights in order to improve business operations and gain a competitive advantage.
  • big data CRM (big data customer relationship management) - Big data CRM (big data customer relationship management) refers to the practice of integrating big data into a company's CRM processes with the goals of improving customer service, calculating return on investment on various initiatives and predicting clientele behavior.
  • big data engineer - A big data engineer is an information technology (IT) professional who is responsible for designing, building, testing and maintaining complex data processing systems that work with large data sets.
  • big data management - Big data management is the organization, administration and governance of large volumes of both structured and unstructured data.
  • big data storage - Big data storage is a compute-and-storage architecture that collects and manages large data sets and enables real-time data analytics.
  • Big Mother - Big Mother is the concept of pervasive parenting, in which parents use modern geolocation, wireless and video technologies to constantly track the activities of a child.
  • Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
  • big-endian and little-endian - Endianness is a term that describes the order in which a sequence of bytes is stored in computer memory.
  • bill of lading (BoL, B/L) - A bill of lading (also seen as B/L and BoL) is a document given to a shipper by the carrier that details the shipment and serves as a means of transferring the title of goods.
  • bill of materials (BOM) - A bill of materials (BOM) is a comprehensive inventory of the raw materials, assemblies, subassemblies, parts and components, as well as the quantities of each, needed to manufacture a product.
  • billable hours - Billable hours are the amounts of an employee’s work time that can be charged to a client.
  • bimodal IT (bimodal information technology) - Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.
  • binary - Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems.
  • binary coded decimal - Binary coded decimal (BCD) is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base-10) numeral.
  • binary file - A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
  • binaural sound (binaural beats) - Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.
  • bind - In computer programming, to bind is to make an association between two or more programming objects or value items for some scope of time and place.
  • binning and grouping - Binning and grouping is form of data visualization in which individual data values are sorted into classes or categories and depicted graphically to help explain the significance of the data.
  • binomial distribution - Binomial distribution is a type of formula in mathematics and statistics for predicting probabilities where there are two possible outcomes over a set of instances.
  • bio-inspired computing - Bio-inspired computing is a research method aimed at solving problems using computer models based on the principles of biology and the natural world.
  • biochip - A biochip is a collection of miniaturized test sites (microarrays) arranged on a solid substrate that permits many tests to be performed at the same time in order to achieve higher throughput and speed.
  • biofeedback - Biofeedback is a system that monitors biological data from users and trains them to improve their physiological responses, with the goal of improving physical and mental health and performance.
  • bioinformatics - Bioinformatics is the science of developing computer databases and algorithms for the purpose of speeding up and enhancing biological research.
  • biomedical informatics - Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve human health and provide healthcare.
  • biometric payment - Biometric payment is a point-of-sale (POS) technology that uses biometric authentication physical characteristics to identify the user and authorize the deduction of funds from a bank account.
  • biometric verification - Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • biometrics - Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.
  • biomimetics (biomimicry) - Biomimetic refers to human-made processes, substances, devices, or systems that imitate nature.
  • bionics - Bionics is the replication of biological systems by mechanical and electronic systems.
  • bioplastic - A bioplastic is a substance made from organic biomass sources, unlike conventional plastics which are made from petroleum.
  • bioprinting - Although bioprinting is still in the experimental stage and is currently used primarily in scientific study rather than applied science, the possibility of creating functional replacement tissues or organs could one day transform medical treatment.
  • biorobotics - Biorobotics is the use of biological characteristics in living organisms as the knowledge base for developing new robot designs.
  • BIOS (basic input/output system) - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • BIOS attack - A BIOS attack is an exploit that infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware.
  • BIOS password - A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • BIOS rootkit attack - A BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code.
  • biotechnology (biotech) - Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.
  • bipolar signaling (bipolar transmission) - Bipolar signaling, also called bipolar transmission, is a baseband method of sending binary data over wire or cable.
  • bipolar transistor - A bipolar transistor is a semiconductor device commonly used for amplification.
  • BIRT (Business Intelligence and Reporting Tools) - BIRT (Business Intelligence and Reporting Tools) is an open source technology platform sponsored by the Eclipse Foundation that consists of a visual report designer and a runtime component for Java and Java EE environments.
  • bit (binary digit) - A bit (binary digit) is the smallest unit of data that a computer can process and store.
  • bit depth - In digital audio, bit depth describes the potential accuracy of a particular piece of hardware or software that processes audio data.
  • bit error rate (BER) - In telecommunication transmission, the bit error rate (BER) is the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  • bit map - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • bit padding - Bit padding is the addition of one or more extra bits to a transmission or storage unit to make it conform to a standard size.
  • bit rot - Bit rot is the slow deterioration in the performance and integrity of data stored on storage media.
  • bit slicing - Bit slicing is a method of combining processor modules to multiply the word length.
  • bit stuffing - Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.
  • Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitcoin ATM - A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies.
  • Bitcoin Cash (BCH) - Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.
  • bitcoin mining - Bitcoin mining is the process of verifying new transactions to the Bitcoin digital currency system, as well as the process by which new bitcoin enter into circulation.
  • BitLocker - BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • BitPim - BitPim is a cross-platform, open source application for managing data on cell phones that use the CDMA mobile telephony protocol.
  • bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
  • bitwise operator - Because they allow greater precision and require fewer resources, bitwise operators, which manipulate individual bits, can make some code faster and more efficient.
  • BizDevOps (Business, Development and Operations) - BizDevOps, also known as DevOps 2.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black box AI - Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.
  • black hat hacker - A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or disrupting systems -- but increasingly, more specific terms are being used to describe those people.
  • black hat link building - Black hat link building is techniques used to drive traffic to a website by exploiting website loopholes, enabling a site to rank higher than it should through organic search means.
  • black hat SEO - Black hat SEO is a type of unscrupulous search engine optimization tactic used to raise a website's search engine results page (SERP) ranking illegitimately or lower the ranking of a competitor's site.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • black swan event - A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Hub - BlackBerry Hub is a BlackBerry 10 application that lets users access and respond to emails, text messages and social network activity.
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade PC (or PC blade) - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • block cipher - A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
  • blockchain dApp - A decentralized application (dApp) is a type of distributed open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • BLOT (build, lease, operate, transfer) - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • bloviate - To bloviate (pronounced BLOW-vee-ayt) is to speak or write overexpansively or with undue grandiosity.
  • Blowfish - Blowfish is a variable-length, symmetric, 64-bit block cipher.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • blue ocean strategy - Blue ocean strategy is a business plan of action developed by W.
  • Blue Origin - Blue Origin is a private spaceflight company based in Kent, Wash.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close