Browse Definitions by Alphabet
- bluesnarfing - Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection.
- Bluetooth - Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other endpoints can easily communicate with each other using a short-range wireless connection.
- Bluetooth 2.0+EDR - Bluetooth 2.
- Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
- board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
- bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
- bogon - A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.
- Bohr radius - The Bohr radius is a physical constant that represents the most probable distance between the electron and nucleus of a hydrogen atom at its ground state (lowest energy level).
- bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
- book of business - Book of business is another name for an account or client list.
- booking engine - A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online.
- Boolean - In computing, the term Boolean means a result that can only have one of two possible values: true or false.
- boomerang employee - A boomerang employee is a person who leaves a company and returns to work for the same company in the future.
- boot - To boot (to boot up, to start up or booting) a computer is to load an operating system (OS) into the computer's main memory or random-access memory (RAM).
- boot loader (boot manager) - A boot loader (boot manager) is a small program that places the operating system (OS) of a computer into memory.
- Boot2Docker - Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers.
- BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
- Bootstrap - Bootstrap is a free, open source front-end development framework for the creation of websites and web apps.
- BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
- bot - A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity.
- botnet - A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.
- Boto - Boto is a software development kit (SDK) designed to improve the use of the Python programming language in Amazon Web Services.
- bottleneck - A bottleneck, in a communications context, is a point in the enterprise where the flow of data is impaired or stopped entirely.
- Bourne shell - The Bourne shell is the original Unix shell -- command execution program, often called a command interpreter -- that was developed in 1979 at what at the time was Bell Labs.
- box plot - A box plot is a graphical rendition of statistical data based on the minimum, first quartile, median, third quartile, and maximum.
- BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that allows web services, APIs and human processes in a service-oriented architecture (SOA) to interconnect and share data in a business workflow.
- brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
- brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
- brainstorming - Brainstorming is a group problem-solving method that involves the spontaneous contribution of creative ideas and solutions.
- branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
- brand - A brand is a product, service or concept that is publicly distinguished from other products, services or concepts so that it can be easily communicated and usually marketed.
- brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
- break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
- bridge - A bridge is a class of network device designed to connect networks at OSI Level 2, which is the data link layer of a local area network.
- bring your own carrier (BYOC) - Bring your own carrier (BYOC) is a method of letting businesses choose their own carrier to connect their unified communications provider to the public switched telephone network.
- broadband - Broadband refers to telecommunications in which a wide band of frequencies is available to transmit information.
- brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
- broken windows theory - The broken windows theory posits that visible signs of disorder and neglect in an environment encourage further disorder and misconduct among those who live in it.
- brontobyte - A brontobyte is an unofficial measure of memory or data storage that is equal to 10 to the 27th power of bytes.
- brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
- browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
- browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
- browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
- brute-force attack - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
- BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
- BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
- budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
- buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
- buffer underflow - A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space during data transfer -- is fed data at a lower rate than it is being read from.
- bug - In computer technology, a bug is a coding error in a computer program.
- bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals like ethical hackers and security researchers for discovering and reporting vulnerabilities and bugs in software.
- build - In a programming context, a build is a version of a program that, as a rule, is a pre-release version and is identified by a build number rather than by a release number.
- build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
- Build, operate, transfer (BOT) - Build, operate, transfer (BOT) is a project management technique where a company hires a third-party firm to create a new subsidiary or product.
- build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
- building management system - A building management system (BMS) is a control system that can be used to monitor and manage the mechanical, electrical and electromechanical services in a facility.
- built-in administrator account - In the Windows operating system, the built-in administrator account -- the first account created when the OS was installed -- has the highest permissions of any profile on the computer system.
- bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
- burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
- burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
- burner phone - A burner phone, or 'burner,' is an inexpensive mobile phone designed for temporary, sometimes anonymous, use, after which it may be discarded.
- bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
- business analytics - Business analytics (BA) is a set of disciplines and technologies for solving business problems using data analysis, statistical models and other quantitative methods.
- business capability - A business capability is the ability of an organization to achieve a specific outcome or objective.
- business case - A business case is a formal document or verbal value proposition that outlines the justification for commencing a project or undertaking a specific task.
- business continuity - Business continuity is an organization's ability to maintain critical business functions during and after a disaster has occurred.
- business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
- business continuity plan audit - A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.
- business continuity policy - A business continuity policy is a set of standards and guidelines that an organization enforces to ensure resilience and proper risk management.
- business continuity software - Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.
- business email compromise (BEC, man-in-the-email attack) - A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity in order to commit fraud .
- business goals - A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.
- business impact analysis (BIA) - A business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
- business innovation - Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.
- business integration - Business integration is a strategy whose goal is to synchronize IT and business cultures and objectives and align technology with business strategy and goals.
- business intelligence competency center (BICC) - A business intelligence competency center (BICC) is a team of people that, in its most fully realized form, is responsible for managing all aspects of an organization's BI strategy, projects and systems.
- business logic - In programming, business logic is the part of a software program responsible for implementing the business rules that define how data should be created, modified, transformed, communicated and in other ways managed and controlled.
- business metric - A business metric is a quantifiable measure businesses use to track, monitor and assess the success or failure of various business processes.
- business plan - A business plan is a formal document that outlines a company's objectives, strategies and financial forecasts, serving as a comprehensive roadmap for business growth and development.
- business process - A business process is an activity or set of activities that accomplish a specific organizational goal.
- business process automation (BPA) - Business process automation (BPA) is the use of advanced technology to complete business processes with minimal human intervention.
- business process improvement (BPI) - Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas where they can improve accuracy, effectiveness and efficiency and then make changes within the processes to realize these improvements.
- Business Process Management Initiative (BPMI) - Established in August 2000, the Business Process Management Initiative (BPMI) is a nonprofit organization that promotes the standardization of common business processes, as a means of furthering e-business and B2B development.
- business process management software (BPMS) - Business process management software (BPMS) helps companies design, model, execute, automate and improve a set of activities and tasks that, when completed, achieve an organizational goal.
- business process mapping - Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish.
- Business Process Model Notation (BPMN) - Business Process Modeling Notation (BPMN), also called Business Process Model and Notation, is an open standard to diagram a business process.
- Business Process Modeling Language (BPML) - Business Process Modeling Language (BPML) is an XML standard metalanguage used to outline business processes in an easy-to-understand way.
- business process outsourcing (BPO) - Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to perform an essential business function or task.
- business process reengineering (BPR) - Business process reengineering (BPR) is a management practice in which business processes used are radically redesigned to improve efficiency, effectiveness and performance.
- business resilience - Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.
- business rules engine (BRE) - A business rules engine (BRE) is a software component that allows non-programmers to add or change business logic in a business process management (BPM) system.
- business services - Business services refer to all services that support a company.
- business structure - A business structure is a category of organization that is legally recognized in a given jurisdiction and characterized by the legal definition of that particular category.
- business transformation - Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.
- busy lamp field (BLF) - A busy lamp field (BLF) is a light on a VoIP phone -- also known as an IP phone -- that tells end users when another extension within the system is in use by displaying a clear status on the phone's display.
- buzz marketing - Buzz marketing is a viral marketing technique focused on maximizing the word-of-mouth potential of a campaign or product.
- BYOD (bring your own device) - BYOD (bring your own device) is a policy that enables employees in an organization to use their personally owned devices for work-related activities.
- BYOI (bring your own identity) - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password are managed by a third party.
- byte - In most computer systems, a byte is a unit of data that is eight binary digits long.
- bytecode - Bytecode is computer object code that an interpreter converts into binary machine code so it can be read by a computer's hardware processor.