Browse Definitions :

Browse Definitions by Alphabet

BIT - BUL

  • bitcoin mining - Bitcoin mining is the process of verifying new transactions to the Bitcoin digital currency system, as well as the process by which new bitcoin enter into circulation.
  • BitLocker - BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
  • bitwise operator - Because they allow greater precision and require fewer resources, bitwise operators, which manipulate individual bits, can make some code faster and more efficient.
  • BizDevOps (Business, Development and Operations) - BizDevOps, also known as DevOps 2.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black box AI - Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.
  • black hat hacker - A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or disrupting systems -- but increasingly, more specific terms are being used to describe those people.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and usually employs various attack vectors to increase the severity of damage and the speed of contagion.
  • block cipher - A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
  • blockchain dApp - A decentralized application (dApp) is a type of distributed open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • Blowfish - Blowfish is a variable-length, symmetric, 64-bit block cipher.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • Blue Origin - Blue Origin is a private spaceflight company based in Kent, Wash.
  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • blue/green deployment - A blue/green deployment is a change management strategy for releasing software code.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • body cam (bodycam) - A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.
  • bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
  • bogon - A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the Internet Assigned Number Authority (IANA).
  • Bohr radius - The Bohr radius is a physical constant that represents the most probable distance between the electron and nucleus of a hydrogen atom at its ground state (lowest energy level).
  • boil the ocean - To boil the ocean, in a business context, is to increase the scope of a project or task until it is practically impossible to accomplish as envisioned.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • book of business - Book of business is another name for an account or client list.
  • booking engine - A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online.
  • Boolean - In computing, the term Boolean means a result that can only have one of two possible values: true or false.
  • boot - To boot (as a verb; also "to boot up") a computer is to load an operating system into the computer's main memory or random access memory (RAM).
  • BOOT (build, own, operate and transfer) - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • boot loader (boot manager) - A boot loader, also called a boot manager, is a small program that places the operating system (OS) of a computer into memory.
  • boot partition - A boot partition is a disk partition responsible for holding Windows system files when booting up Windows.
  • boot sector virus - A boot sector virus is malware that infects the computer storage sector where startup files are found.
  • Boot2Docker - Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers.
  • BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
  • Bootstrap - Bootstrap is a free, open source front-end development framework for the creation of websites and web apps.
  • BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
  • bot - A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity.
  • botnet - A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.
  • Boto - Boto is a software development kit (SDK) designed to improve the use of the Python programming language in Amazon Web Services.
  • bottleneck - A bottleneck, in a communications context, is a point in the enterprise where the flow of data is impaired or stopped entirely.
  • Bourne shell - The Bourne shell is the original Unix shell -- command execution program, often called a command interpreter -- that was developed in 1979 at what at the time was Bell Labs.
  • box plot - A box plot is a graphical rendition of statistical data based on the minimum, first quartile, median, third quartile, and maximum.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that allows web services, APIs and human processes in a service-oriented architecture (SOA) to interconnect and share data in a business workflow.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • brain hijacking - Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.
  • brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brainstorming - Brainstorming is a group problem-solving method that involves the spontaneous contribution of creative ideas and solutions.
  • branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
  • brand - A brand is a product, service or concept that is publicly distinguished from other products, services or concepts so that it can be easily communicated and usually marketed.
  • brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
  • brand essence (brand mantra) - Brand essence, also known as a brand mantra, is a short statement that expresses the core of what that brand represents or the image it seeks to project.
  • brand experience - Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • broadband - In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • brute-force attack - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
  • buffer underflow - A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space during data transfer -- is fed data at a lower rate than it is being read from.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • build - In a programming context, a build is a version of a program that, as a rule, is a pre-release version and is identified by a build number rather than by a release number.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built-in administrator account - In the Windows operating system, the built-in administrator account -- the first account created when the OS was installed -- has the highest permissions of any profile on the computer system.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
Networking
  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network configuration management (NCM)

    Network configuration management is the process of organizing and maintaining information about all of the components in a ...

  • presentation layer

    The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that ...

Security
  • backdoor (computing)

    A backdoor attack is a means to access a computer system or encrypted data that bypasses the system's customary security ...

  • Heartbleed

    Heartbleed was a vulnerability in some implementations of OpenSSL, an open source cryptographic library.

  • What is risk management and why is it important?

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

CIO
HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • headless commerce (headless e-commerce)

    Headless commerce, also called headless e-commerce, is a platform architecture that decouples the front end of an e-commerce ...

  • chief customer officer (CCO)

    A chief customer officer, or customer experience officer, is responsible for customer research, communicating with company ...

  • relationship marketing

    Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term ...

Close