Browse Definitions :

Browse Definitions by Alphabet

BUZ - WHA

  • buzz marketing - Buzz marketing is a viral marketing technique focused on maximizing the word-of-mouth potential of a campaign or product.
  • BYOD (bring your own device) - BYOD (bring your own device) is a policy that allows employees in an organization to use their personally owned devices for work-related activities.
  • BYOE (bring your own encryption) - BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.
  • BYOI (bring your own identity) - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.
  • BYOT (bring your own technology) - Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho.
  • Bypass IVRS - Talk to a real person - cheatsheet - Cheat sheet quick look-up for how to get a real person on the telephone.
  • byte - In most computer systems, a byte is a unit of data that is eight binary digits long.
  • bytecode - Bytecode is computer object code that an interpreter converts into binary machine code so it can be read by a computer's hardware processor.
  • SAP BAPI (Business Application Programming Interface) - SAP BAPI (Business Application Programming Interface) is a standard interface to the business object models in SAP products.
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • The Boomi Platform - The Boomi Platform, previously known as Boomi AtomSphere, is a low-code and cloud-native integrated Platform as a Service (iPaaS).
  • What is BCDR? Business continuity and disaster recovery guide - Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
  • What is biometric authentication? - Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they are who they say they are.
  • What is business continuity and why is it important? - Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
  • What is business process management? An in-depth BPM guide - Business process management (BPM) is a structured approach to improving the processes organizations use to get work done, serve their customers and generate business value.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close