Browse Definitions :

Browse Definitions by Alphabet

BRO - BUY

  • browser isolation - Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing activity from their local machine, network and infrastructure.
  • browser virtualization (in desktop virtualization) - Virtualizing a browser helps companies run mission-critical applications in legacy browsers.
  • brushing scam - A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.
  • brute-force attack - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program that, as a rule, is a pre-release version and is identified by a build number rather than by a release number.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built-in administrator account - In the Windows operating system, the built-in administrator account -- the first account created when the OS was installed -- has the highest permissions of any profile on the computer system.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • burn rate - In venture investing and new company development, the burn rate is the rate at which a new company is spending its capital while waiting for profitable operation.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • burnout - Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.
  • burst - Burst is a term used in a number of information technology contexts to mean a specific amount of data sent or received in one intermittent operation.
  • burstiness - Burstiness is an intermittent type of data transmission.
  • bus - In a computer or on a network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line.
  • bus master - A bus master is the program, either in a microprocessor or more usually in a separate I/O controller, that directs traffic on the computer bus or input/output paths.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • bus number (What's your bus number?) - In project management, the bus number is the number of team members whose loss would endanger a project.
  • business agility (BA) - Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business capability - Business capabilities are one way of representing the highest conceptual-level view of an enterprise architecture.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business continuity plan (BCP) - A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
  • business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
  • business continuity policy - A business continuity policy is a set of standards and guidelines that an organization enforces to ensure resilience and proper risk management.
  • business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
  • business counterintelligence (business CI) - Business counterintelligence (business CI) is the collective efforts designed to protect an organization’s sensitive information from unauthorized access.
  • business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • business goals - A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.
  • business impact analysis (BIA) - A business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business innovation - Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.
  • business integration - Business integration is a strategy whose goal is to synchronize IT and business cultures and objectives and align technology with business strategy and goals.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • business intelligence architecture - A business intelligence architecture is the framework for the various technologies an organization deploys to run business intelligence and analytics applications.
  • business intelligence competency center (BICC) - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
  • business intelligence dashboard - A business intelligence dashboard, or BI dashboard, is a data visualization and analysis tool that displays on one screen the status of key performance indicators (KPIs) and other important business metrics and data points for an organization, department, team or process.
  • business logic - Business logic is the programming that manages communication between an end user application and a database.
  • business logic attack - A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.
  • business metric - A business metric is a quantifiable measure businesses use to track, monitor and assess the success or failure of various business processes.
  • business model - A business model is the conceptual structure supporting the viability of a business, including its purpose, its goals and its plans for achieving them.
  • business model innovation - Business model innovation is the implementation of unique concepts to support a company's viability, including the development of new processes for delivering products and services to customers.
  • business plan - A business plan is a document demonstrating the feasibility of a prospective new business and providing a roadmap for its first several years of operation.
  • Business Planning and Control System (BPCS) - Business Planning and Control System (BPCS) is a popular system of application programs for manufacturing and other industries that is developed and sold by Systems Software Associates (SSA).
  • business process - A business process is an activity or set of activities that accomplish a specific organizational goal.
  • business process automation (BPA) - Business process automation (BPA) is the use of advanced technology to complete business processes with minimal human intervention.
  • business process discovery - Business process discovery, also called process discovery, is a collection of tools and techniques used to define, map and analyze an organization�s existing business processes.
  • business process governance - Business process governance, also called process governance or business process management (BPM) governance, is the use of rules to manage BPM programs and initiatives.
  • business process improvement (BPI) - Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas where they can improve accuracy, effectiveness and efficiency and then make changes within the processes to realize these improvements.
  • Business Process Management Initiative (BPMI) - Established in August 2000, the Business Process Management Initiative (BPMI) is a non-profit organization that exists to promote the standardization of common business processes, as a means of furthering e-business and B2B development.
  • business process management software - Business process management software (BPMS) helps companies design, model, execute, automate and improve a set of activities and tasks that, when completed, achieve an organizational goal.
  • business process mapping - Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish.
  • business process modeling - Business process modeling, often called process modeling, is the analytical representation or illustration of an organization's business processes.
  • Business Process Modeling Language (BPML) - Business Process Modeling Language (BPML) is an XML standard metalanguage used to outline business processes in an easy-to-understand way.
  • Business Process Modeling Notation (BPMN) - Business Process Modeling Notation (BPMN), also called Business Process Model and Notation, is an open standard to diagram a business process.
  • business process monitoring - Business process monitoring is real-time scrutiny of an activity or set of activities that have been set up to accomplish a specific organizational goal.
  • business process outsourcing (BPO) - Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to perform an essential business function or task.
  • business process reengineering (BPR) - Business process reengineering (BPR) is a management practice in which the related tasks required to obtain a specific business outcome are radically redesigned.
  • business process transformation - Business process transformation (BPT) is an effort to significantly improve the actions required to accomplish an organizational goal.
  • business process visibility - Business process visibility, also called process visibility, is the ability to accurately and completely view the processes, transactions and other activities operating within an enterprise.
  • business resilience - Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.
  • business risk - A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels.
  • business rule - A business rule is a statement that describes a business policy or procedure.
  • business rules engine (BRE) - A business rules engine (BRE) is a software component that allows non-programmers to add or change business logic in a business process management (BPM) system.
  • business service management (BSM) - Business service management (BSM) is an approach to overseeing information technology that emphasizes treating IT offerings as part of the larger enterprise strategy, and provisioning IT resources based on an understanding of the business' most pressing needs.
  • business service provider (BSP) - A business service provider (BSP) is a company that rents third-party software application packages to their customers.
  • business services - Business services is a general term that describes work that supports a business but does not produce a tangible commodity.
  • business structure - A business structure is a category of organization that is legally recognized in a given jurisdiction and characterized by the legal definition of that particular category.
  • business sustainability - Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.
  • business technologist - A business technologist is an IT (information technology) professional with a combination of broad general knowledge of technology along with an understanding of non-technical aspects of a business, including corporate and competitive strategies, marketing and finances.
  • business technology (BT) - Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.
  • business transformation - Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.
  • busy lamp field (BLF) - A busy lamp field (BLF) is a light on a VoIP phone -- also known as an IP phone -- that tells end users when another extension within the system is in use by displaying a clear status on the phone's display.
  • butterfly effect - The butterfly effect is the notion that a small initial factor may have a part in determining greater and unpredictable changes in large, complex systems.
  • buyer personas - A buyer persona is a composite representation of a specific subdivision of a market segment.
  • buying signals - Buying signals are behavioral cues that indicate the intentions of prospective or existing customers in terms of their readiness to buy.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close