Browse Definitions by Alphabet
- B2B (business to business) - B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, rather than from business to consumer (B2C).
- B2C (business-to-consumer) - B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has purchased the goods or services for personal use.
- BABOK Guide (Guide to the Business Analysis Body of Knowledge) - The guide to the Business Analysis Body of Knowledge, or the BABOK Guide, is a book from the International Institute of Business Analysis (IIBA) that provides essential support and direction to business analysts (BAs) by presenting a collection of the activities that comprise business analysis.
- backdoor (computing) - A backdoor attack is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
- backfire effect - The backfire effect is the tendency of some people to resist accepting evidence that conflicts with their beliefs.
- backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
- backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts.
- backup as a service (BaaS) - Backup as a service (BaaS) is an approach to backing up data that involves purchasing backup and recovery services from an online data backup provider.
- backup storage device - A backup storage device is a hardware component for storing copies of data.
- backward compatible (backward compatibility) - Backward compatible (also known as downward compatible or backward compatibility) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems.
- bad block - A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted.
- baffle - In data center hot aisle containment, a baffle is anything that disturbs the flow of air through a room, rack or system.
- BAI2 file format - BAI2 file format is a specialized and standardized set of codes used for cash management and bank reconciliations, and introduced by the Bank Administration Institute (BAI).
- Baidu - Baidu (百度) is a Chinese technology company.
- balanced scorecard - The balance scorecard (BSC) is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed if necessary to ensure that an organizations strategic goals are met.
- bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
- bang-bang (bang-bang control) - Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached.
- bank identifier code (BIC) - A bank identifier code (BIC) is a unique identifier for a specific financial institution.
- Bank Secrecy Act (BSA) - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
- BANT - BANT is an acronym that stands for 'Budget, Authority, Need, Timing.
- Bar Coded Medication Administration (BCMA) - Bar Coded Medication Administration (BCMA) is a hospital inventory control system that uses barcodes in the distribution of prescription medications with the goal of ensuring the patient is receiving the correct medication.
- barcode (or bar code) - A barcode (sometimes seen as two words, bar code) is the small image of lines (bars) and spaces that is affixed to retail store items, identification cards and postal mail to identify a particular product number, person or location.
- barcode reader - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a barcode.
- bare-metal cloud - Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or virtualization infrastructure.
- bare-metal hypervisor (Type 1 hypervisor) - A bare-metal hypervisor, also known as a Type 1 hypervisor, is virtualization software that has been installed directly onto the computing hardware.
- bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hard disk.
- bare-metal restore - A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.
- base station - In telecommunications, a base station is a fixed transceiver that is the main communication point for one or more wireless mobile client devices.
- baseband - Baseband in the transmission of communications signals means only one path is available to send and receive digital signals between devices.
- baseband unit (BBU) - A baseband unit (BBU) is a device that interprets baseband frequencies in telecom systems including computer networks, the internet, phone networks and radio broadcasting systems.
- baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.
- Basel II - Basel II is an international business standard that requires financial institutions to maintain enough cash reserves to cover risks incurred by their operations.
- bash (Bourne again shell) - Bash (Bourne Again Shell) is the free and enhanced version of the Bourne shell distributed with Linux and GNU operating systems.
- Basic Assembler Language (BAL) - BAL (Basic Assembler Language) is a version of IBM's assembler language (sometimes called assembly language) for its System/360 and System/370 mainframe operating system.
- batch file - A batch file is a script file that stores commands to be executed in a serial order.
- battery memory effect - The battery memory effect is a reduction in the longevity of a rechargeable battery's charge, due to incomplete discharge in previous uses.
- beamforming - Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.
- Bean - In its JavaBeans application program interface for writing a component, Sun Microsystems calls a component a "Bean" (thus continuing their coffee analogy).
- beep code - A beep code is the audio signal from a computer when it first powers on to give the Power-On Self-Test (POST) result.
- behavior-based security - Behavior-based security software scans for deviations from the norm and decides whether an anomaly poses a threat or can simply be ignored.
- behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
- bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
- benchmark - A benchmark is a standard or point of reference people can use to measure something else.
- benefits administration - Benefits administration is the process of assembling and managing the benefits an organization provides to employees.
- BERT language model - BERT language model is an open source machine learning framework for natural language processing (NLP).
- best practice - A best practice is a standard or set of guidelines that is known to produce good outcomes if followed.
- beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries out the product.
- Betteridge's law (of headlines) - Betteridge's law (of headlines) is an adage that states "Any headline that ends in a question mark can be answered by the word no.
- Betterworks - Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and employee performance, strengthening manager-employee relationships.
- bezel - A bezel is the border between the screen and frame of a computer monitor, smartphone or any other computing device.
- BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is the protocol that enables the global routing system of the internet.
- Big 4 - The Big 4 are the four largest international accounting and professional services firms.
- big data - Big data is a combination of structured, semi-structured and unstructured data that organizations collect, analyze and mine for information and insights.
- big data as a service (BDaaS) - Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, manage and analyze large data sets so they can generate insights to improve business operations and gain a competitive advantage.
- big data engineer - A big data engineer is an information technology (IT) professional who is responsible for designing, building, testing and maintaining complex data processing systems that work with large data sets.
- big data management - Big data management is the organization, administration and governance of large volumes of both structured and unstructured data.
- big data storage - Big data storage is a compute-and-storage architecture that collects and manages large data sets and enables real-time data analytics.
- Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
- big-endian and little-endian - The term endianness describes the order in which computer memory stores a sequence of bytes.
- billable hours - Billable hours are the amounts of an employee’s work time that can be charged to a client.
- bimodal IT (bimodal information technology) - Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.
- binary - Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems.
- binary file - A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
- binary-coded decimal - Binary-coded decimal is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base 10) number.
- biomedical informatics - Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve human health and provide healthcare.
- biometric authentication - Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they are who they say they are.
- biometric payment - Biometric payment is a point-of-sale (POS) technology that uses biometric authentication physical characteristics to identify the user and authorize the deduction of funds from a bank account.
- biometric verification - Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
- biometrics - Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.
- BIOS (basic input/output system) - BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
- BIOS password - A BIOS password is authentication information that's sometimes required to log into a computer's basic input/output system (BIOS) settings before a computer boots up.
- BIOS rootkit attack - A BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code.
- biotechnology (biotech) - Biotechnology is the use of biology to develop new products, methods and organisms intended to improve human health and society.
- bit (binary digit) - A bit (binary digit) is the smallest unit of data that a computer can process and store.
- bit stuffing - Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.
- Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
- Bitcoin Cash (BCH) - Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.
- bitcoin mining - Bitcoin mining is a type of cryptomining in which new bitcoin are entered into circulation and bitcoin transactions are verified and added to the blockchain.
- Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
- bits per second (bps or bit/sec) - In data communications, bits per second (bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
- bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common.
- blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
- blended threat - A blended threat is an exploit that combines elements of multiple types of malware and usually employs various attack vectors to increase the severity of damage and the speed of contagion.
- block diagram - A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.
- block storage - Block storage is an approach to data storage in which each volume acts as an individual hard drive that is configured by the administrator.
- blockchain - Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.
- blockchain decentralization - Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.
- blockchain economy - The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.
- blockchain storage - Blockchain storage is a way of saving data in a decentralized network, which utilizes the unused hard disk space of users across the world to store files.
- Blowfish - Blowfish is a variable-length, symmetric, 64-bit block cipher.
- Blu-ray - Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.
- Blue Origin - Blue Origin is a private spaceflight company based in Kent, Wash.
- bluesnarfing - Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection.
- Bluetooth - Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other endpoints can easily communicate with each other using a short-range wireless connection.
- Bluetooth 2.0+EDR - Bluetooth 2.
- Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
- board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
- bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
- bogon - A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.
- Bohr radius - The Bohr radius is a physical constant that represents the most probable distance between the electron and nucleus of a hydrogen atom at its ground state (lowest energy level).