Browse Definitions :

Browse Definitions by Alphabet

BIL - BOO

  • billable hours - Billable hours are the amounts of an employee’s work time that can be charged to a client.
  • bimodal IT (bimodal information technology) - Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.
  • binary - Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems.
  • binary file - A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
  • binary search (dichotomizing search) - A binary search, also called a dichotomizing search, is a digital scheme for locating a specific object in a large set.
  • binary tree - A binary tree is a method of placing and locating files (called records or keys) in a database, especially when all the data is known to be in random access memory (RAM).
  • binary-coded decimal - Binary-coded decimal is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base 10) number.
  • binary-safe function - A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file.
  • binaural sound (binaural beats) - Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.
  • bind - In computer programming, to bind is to make an association between two or more programming objects or value items for some scope of time and place.
  • biochip - A biochip is a collection of miniaturized test sites (microarrays) arranged on a solid substrate that permits many tests to be performed at the same time in order to achieve higher throughput and speed.
  • bioinformatics - Bioinformatics is the science of developing computer databases and algorithms for the purpose of speeding up and enhancing biological research.
  • biomedical informatics - Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve human health and provide healthcare.
  • biometric payment - Biometric payment is a point-of-sale (POS) technology that uses biometric authentication physical characteristics to identify the user and authorize the deduction of funds from a bank account.
  • biometric verification - Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
  • biometrics - Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.
  • BIOS (basic input/output system) - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
  • BIOS attack - A BIOS attack is an exploit that infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware.
  • BIOS password - A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • BIOS rootkit attack - A BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code.
  • biotechnology (biotech) - Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.
  • bipolar signaling (bipolar transmission) - Bipolar signaling, also called bipolar transmission, is a baseband method of sending binary data over wire or cable.
  • bipolar transistor - A bipolar transistor is a semiconductor device commonly used for amplification.
  • BIRT (Business Intelligence and Reporting Tools) - BIRT (Business Intelligence and Reporting Tools) is an open source technology platform sponsored by the Eclipse Foundation that consists of a visual report designer and a runtime component for Java and Java EE environments.
  • bit (binary digit) - A bit (binary digit) is the smallest unit of data that a computer can process and store.
  • bit depth - In digital audio, bit depth describes the potential accuracy of a particular piece of hardware or software that processes audio data.
  • bit error rate (BER) - In telecommunication transmission, the bit error rate (BER) is the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
  • bit map - A bit map (often spelled "bitmap") defines a display space and the color for each pixelor "bit" in the display space.
  • bit padding - Bit padding is the addition of one or more extra bits to a transmission or storage unit to make it conform to a standard size.
  • bit rot - Bit rot is the slow deterioration in the performance and integrity of data stored on storage media.
  • bit slicing - Bit slicing is a method of combining processor modules to multiply the word length.
  • bit stuffing - Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.
  • Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitcoin Cash (BCH) - Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.
  • bitcoin mining - Bitcoin mining is the process of verifying new transactions to the Bitcoin digital currency system, as well as the process by which new bitcoin enter into circulation.
  • BitLocker - BitLocker Drive Encryption, or BitLocker, is a Microsoft Windows security and encryption feature.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
  • bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
  • bitwise operator - Because they allow greater precision and require fewer resources, bitwise operators, which manipulate individual bits, can make some code faster and more efficient.
  • BizDevOps (Business, Development and Operations) - BizDevOps, also known as DevOps 2.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black box AI - Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.
  • black hat hacker - A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or disrupting systems -- but increasingly, more specific terms are being used to describe those people.
  • black hat link building - Black hat link building is techniques used to drive traffic to a website by exploiting website loopholes, enabling a site to rank higher than it should through organic search means.
  • black hat SEO - Black hat SEO is a type of unscrupulous search engine optimization tactic used to raise a website's search engine results page (SERP) ranking illegitimately or lower the ranking of a competitor's site.
  • black hole - The term "black hole" is sometimes used to refer to an imaginary place where objects, files, or funds go when they get lost for no apparent reason.
  • black level (brightness) - On a display or television monitor, black level is the technical term for what is usually called brightness.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • BlackBerry Hub - BlackBerry Hub is a BlackBerry 10 application that lets users access and respond to emails, text messages and social network activity.
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • blade PC (or PC blade) - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • blended threat - A blended threat is an exploit that combines elements of multiple types of malware and usually employs various attack vectors to increase the severity of damage and the speed of contagion.
  • block cipher - A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.
  • block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
  • block storage - Block storage is an approach to data storage in which each storage volume acts as an individual hard drive that is configured by the storage administrator.
  • blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
  • blockchain dApp - A decentralized application (dApp) is a type of distributed open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
  • blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
  • blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bloom Energy Server (Bloom box) - A Bloom Box, officially known as an Bloom Energy Server, is a modular stack of solid oxide fuel cells that can produce electricity.
  • BLOT (build, lease, operate, transfer) - BLOT (build, lease, operate, transfer) is a public-private partnership (PPP) project model in which a private organization designs, finances and builds a facility on leased public land.
  • bloviate - To bloviate (pronounced BLOW-vee-ayt) is to speak or write overexpansively or with undue grandiosity.
  • Blowfish - Blowfish is a variable-length, symmetric, 64-bit block cipher.
  • Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Moon Lander - Blue Moon Lander is a spacecraft being designed to land on the lunar surface by 2024.
  • blue ocean strategy - Blue ocean strategy is a business plan of action developed by W.
  • Blue Origin - Blue Origin is a private spaceflight company based in Kent, Wash.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • blue/green deployment - A blue/green deployment is a change management strategy for releasing software code.
  • BlueKeep (CVE-2019-0708) - BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 and 2008.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth 4.0 - Bluetooth 4.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • BNC (Bayonet Neil-Concelman or British Naval Connector) - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • body cam (bodycam) - A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.
  • bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
  • bogomips - Bogomips is a measurement provided in the Linux operating system that indicates in a relative way how fast the computer processor runs.
  • bogon - A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the Internet Assigned Number Authority (IANA).
  • Bohr radius - The Bohr radius, symbolized as 0, is the mean radius of the orbit of an electron around the nucleus of a hydrogen atom at its ground state (lowest-energy level).
  • boil the ocean - To boil the ocean, in a business context, is to increase the scope of a project or task until it is practically impossible to accomplish as envisioned.
  • boilerplate - In information technology, a boilerplate is a unit of writing that can be reused over and over without change.
  • BOINC (Berkeley Open Infrastructure for Network Computing) - BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.
  • Boltzmann's constant - Boltzmann's constant, also called the Boltzmann constant and symbolized k or k B, defines the relation between absolute temperature and the kinetic energy contained in each molecule of an ideal gas.
  • Bombay Stock Exchange - The Bombay Stock Exchange or BSE is Asia's oldest stock exchange.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • BOO project (build, own, operate project) - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close