Tech: A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z

Bring Your Own Apps (BYOA)

Short for Bring Your Own Applications as well as Build Your Own Apps, BYOA is an evolution of the term BYOD (Bring Your Own Device) in the consumerization of IT that refers to the growing use of personal apps by employees for increased productivity in their work environments. Examples of Bring Your Own Apps span […]

backslash

The backslash character is \; a simple slash or forward slash is /. In DOS and Windows systems, the backslash represents the root directory and is also used to separate directory names and filenames in a pathname.

backdoor

Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.

bootcfg

An MS DOS recovery console command. Bootcfg lets a user view and make changes to the boot.ini file.

bohrbug

In computer programming, bohrbug is a classification of an unusual software bug that always produces a failure on retying the operation which caused the failure. The bohrbug was named after the Bohr atom because the bohrbug represents a solid and easily detectable bug that can be isolated by standard debugging techniques. Contrast with heisenbug.

BSI

BSI is the National Standards Body of the UK. The organization was founded in 1901 as the Engineering Standards Committee. The BSI Group manages more than 27,000 standards for a number of subjects including biometrics, business continuity, Green IT, nanotechnology, and others.

broken hyperlink

A hyperlink on a Web page that will point users to an incorrect URL, a missing page, or a missing file. Broken hyperlinks often lead users to a 404 File Not Found error.

brand advocate

In electronic commerce and online advertising, a brand advocate is a person, or customer who talks favorably about a brand or product, and then passes on positive word-of-mouth (WOM) messages about the brand to other people.

BOM

Short for byte order mark, BOM is the character code (such as U+FEFF) at the beginning of a data stream that is used to define the byte order and encoding form. BOM is most commonly associated with plaintext files where it is not known if the file is in big or little endian format. BOM […]

Business Intelligence software

Business Intelligence software, also called BI software, is software that is designed to analyze business data to better understand an organization’s strengths and weaknesses. Business intelligence software allows an organization’s management to better see the relationship between different data for better decision-making and optimal deployment of resources. Business Intelligence software plays a key role in […]

Page 1 of 3812345...102030...Last »