BYOD is short for bring your own device.
In the consumerization of IT, BYOD, or bring your own device, is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and tablets – to the workplace for use and connectivity on the secure corporate network.
Today, employees expect to use personal smartphones and mobile devices at work, making BYOD security a concern for IT teams. Many corporations that allow employees to use their own mobile devices at work implement a BYOD security policy that clearly outlines the company’s position and governance policy to help IT better manage these devices and ensure network security is not compromised by employees using their own devices at work.
BYOD security can be addressed by having IT provide detailed security requirements for each type of personal device that is used in the workplace and connected to the corporate network. For example, IT may require devices to be configured with passwords, prohibit specific types of applications from being installed on the device or require all data on the device to be encrypted. Other BYOD security policy initiatives may include limiting activities that employees are allowed to perform on these devices at work (e.g. email usage is limited to corporate email accounts only) and periodic IT audits to ensure the device is in compliance with the company’s BYOD security policy.
Short for Bearer-channel, the main data channel in an ISDN connection. Basic Rate ISDN (BRI) service consists of two 64 Kbps B-channels, and one D-channel for transmitting control information. Primary ISDN service consists of 23 B-channels (in the U.S.) or 30 B-channels (in Europe). Compare with D-channel.
Short for bi-directional frame, or bi-directional predictive frame, a video compression method used by the MPEG standard. In a motion sequence, individual frames of pictures are grouped together (called a group of pictures, or GOP) and played back so that the viewer registers the video��s spatial motion. As the name suggests, B-frames rely on the […]
Most often used in databases and file systems, B-trees are tree structures (a type of data structure) that are optimized for situations when all or part of the tree must be maintained on a secondary storage device such as an optical disk or tape. A B-tree is designed to minimize the number of disk accesses.
- Bezier Curve
Pronounced bez-ee-ay, Bézier curves are curved lines (splines) defined by mathematical formulas. Nearly all draw programs support Bézier curves. Named after the French mathematician Pierre Bézier, Bézier curves employ at least three points to define a curve. The two endpoints of the curve are called anchor points. The other points, which define the shape of […]
- Baby AT
The form factor used by most PC motherboards prior to 1998. The original motherboard for the PC-AT measured 12″x13″. Baby AT motherboards are a little smaller, 8.5″x13″ usually. The Baby AT is being replaced by the new ATX form factor.