IT Glossary - B - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Business Ecosystem Integration

The strategic alignment and technological integration of a company's systems and processes with those of its partners, suppliers, and customers to enhance efficiency, responsiveness, and competitive advantage.

You will find this term commonly used in Business Management, IT Strategy

Business Impact Analysis (BIA)

A critical process that identifies and evaluates the potential effects of disruptions to business operations as a basis for investment in recovery strategies, planning, and response.

You will find this term commonly used in IT Management, Risk Management

Business Intelligence (BI)

Business Intelligence involves analyzing business information (data) to support better business decision-making. BI tools and strategies allow companies to turn data into actionable insights, improving operational efficiency and gaining competitive advantages.

You will find this term commonly used in General IT, Data Analysis

Business Intelligence (BI) Tools

Software applications designed to analyze an organization's raw data to improve decision-making and performance. BI tools assist in transforming data into actionable insights through reporting, online analytical processing, analytics, dashboards, and data visualization.

You will find this term commonly used in Data Analysis, Business Management

Business Intelligence Analysis

The process of using BI tools and software to analyze data from various sources to support decision-making, identify trends, and provide actionable business insights.

You will find this term commonly used in Data Analysis, Business Intelligence

Business Intelligence Dashboard

An information management tool that visually displays the current status of metrics and key performance indicators (KPIs) for an enterprise. BI Dashboards consolidate and arrange numbers, metrics, and performance scorecards on a single screen.

You will find this term commonly used in Data Analysis, Business Management

Business Logic Layer

In software architecture, the layer that implements the core functionality of the application, processing commands, performing calculations, and making decisions. It acts as an intermediary between the presentation layer and the data access layer, encapsulating the business rules.

You will find this term commonly used in Software Development

Business Logic Vulnerability

A flaw in the design and implementation of an application's business logic that can be exploited to manipulate the application's functionality or data. These vulnerabilities are not related to traditional software bugs but rather involve the misuse of application features.

You will find this term commonly used in Cybersecurity, Software Development

Business Method Patent

A type of patent that covers inventions or discoveries that improve the performance of business operations. This can include new types of e-commerce, banking, insurance, tax compliance strategies, and more.

You will find this term commonly used in Legal, E-commerce

Business Process as a Service (BPaaS)

A cloud computing service that delivers business process outsourcing services through the internet. BPaaS models allow businesses to access and utilize business processes and workflows without the need for in-house infrastructure or resources.

You will find this term commonly used in Cloud Computing, Business Management

Business Process Automation (BPA)

The technology-enabled automation of complex business processes. It can streamline a business for simplicity, achieve digital transformation, increase service quality, improve service delivery or contain costs. It consists of integrating applications, restructuring labor resources, and using software applications throughout the organization.

You will find this term commonly used in General IT, Business Management

Business Process Engineering

The analysis and redesign of workflows and processes within an organization to optimize performance and efficiency. Business process engineering involves examining current practices and restructuring them to improve product delivery, reduce costs, and increase quality.

You will find this term commonly used in Business Management, General IT

Business Process Management Suite (BPMS)

An integrated set of tools and technologies that support the design, implementation, management, and analysis of operational business processes. BPMS helps organizations to automate, optimize, and monitor their workflows and processes.

You will find this term commonly used in Business Management, Software Development

Business Process Modeling (BPM)

A method used in business process management to represent processes of an enterprise, so that the current process may be analyzed or improved. BPM is typically performed by business analysts, who provide expertise in the modeling discipline.

You will find this term commonly used in Business Management, General IT

Business Process Modeling Notation (BPMN)

A graphical representation for specifying business processes in a business process model. BPMN is used to create a detailed map of a business process, including the activities, decision points, and the flow of control.

You will find this term commonly used in Business Management, Software Development

Business Process Optimization

The practice of increasing organizational efficiency by improving processes. It involves analyzing existing operations, identifying inefficiencies, and implementing changes to streamline workflows, reduce costs, and enhance productivity.

You will find this term commonly used in Business Management, General IT

Business Process Outsourcing (BPO)

The contracting of non-primary business activities and functions to a third-party provider. BPO services include payroll, human resources, accounting, and customer/call center relations.

You will find this term commonly used in Business Management, Outsourcing

Business Process Reengineering (BPR)

The radical redesign of core business processes to achieve dramatic improvements in productivity, cycle times, and quality. BPR aims at making significant changes to the workflow, structure, and culture of an organization to improve customer service, cut operational costs, and become world-class competitors.

You will find this term commonly used in Business Management, General IT

Business Process Simulation

The use of models to simulate, analyze, and visualize business processes for the purpose of understanding process behavior, analyzing performance, identifying bottlenecks, and predicting the impact of changes.

You will find this term commonly used in Business Management, Process Optimization

Business Service Agreement

A contract between a service provider and a customer that outlines the terms of service delivery, performance standards, and responsibilities of both parties. It's essential for managing expectations and ensuring quality of service.

You will find this term commonly used in IT Management, Service Delivery

Business Service Management (BSM)

An approach to managing IT resources that considers the direct impact that technology has on business outcomes. BSM tools are critical in linking technology performance to business goals and metrics.

You will find this term commonly used in IT Management, General IT

Business Service Modeling

The creation of representations of business processes, services, and information flows, and the analysis of these models to improve business performance.

You will find this term commonly used in Business Management, IT Strategy

Business Software

Any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity, and to perform other business functions accurately.

You will find this term commonly used in Software, Business Management

Business Technology Management (BTM)

An emerging discipline that integrates business and technology management across organizations to drive innovation, improve efficiency, and enhance competitive advantage.

You will find this term commonly used in IT Management, Business Strategy

Business Technology Optimization

The practice of aligning technology investments closely with business goals and requirements. Business technology optimization involves reviewing and adjusting IT strategies and operations to maximize efficiency, reduce costs, and deliver enhanced value to the business.

You will find this term commonly used in General IT, Business Management

Business-Driven IT

An approach where IT initiatives are directly aligned with business goals and strategies, ensuring that technology investments deliver measurable business value.

You will find this term commonly used in IT Management, Business Strategy

Business-IT Alignment

The strategic coordination that ensures business strategy and goals match the IT infrastructure and capabilities of an organization, aiming to maximize value creation.

You will find this term commonly used in IT Management, Strategic Planning

Business-to-Business (B2B)

The exchange of products, services, or information between businesses, rather than between businesses and consumers (B2C).

You will find this term commonly used in E-commerce, Business Management

Business-to-Business (B2B) Integration

The automation and coordination of technology and processes between two or more businesses. B2B integration solutions facilitate the seamless exchange of information and transactions, enhancing collaboration and efficiency across corporate boundaries.

You will find this term commonly used in Networking, Business Management

Business-to-Business Electronic Commerce (B2B EC)

The sale of goods or services between businesses via online portals. B2B EC platforms facilitate transactions between trading partners and streamline purchase processes through electronic means.

You will find this term commonly used in E-commerce, Business Management

Business-to-Consumer (B2C)

Refers to the direct selling of products and services from businesses to end-users or consumers, typically through online channels. B2C strategies focus on personalizing the customer experience and leveraging digital technologies to reach a wider audience.

You will find this term commonly used in E-commerce, Marketing

Business-to-Employee (B2E)

Electronic transactions conducted between a company and its employees, rather than between the company and other businesses or consumers. B2E applications often include portals for HR benefits, training, and internal communications.

You will find this term commonly used in E-commerce, HR Technology

BYOD (Bring Your Own Device)

A policy allowing employees to bring personally owned devices (laptops, tablets, smartphones) to their workplace and use these devices to access privileged company information and applications. BYOD has implications for corporate security and network management.

You will find this term commonly used in Networking, Security

Bypass Switch

A networking device that provides a fail-safe access port for an inline network security appliance, such as a firewall or intrusion detection system. In the event of a device failure or maintenance, the bypass switch ensures continuous network flow by routing traffic around the device.

You will find this term commonly used in Networking, Security

Byte

A byte is a unit of digital information that most commonly consists of eight bits. It's a fundamental measure in computing that represents a single character, such as a letter or symbol, in various encoding systems like ASCII.

You will find this term commonly used in General IT, Hardware

Byte Addressable Memory

A memory architecture where each byte of data can be addressed individually. This allows for the efficient manipulation and storage of data types smaller than the machine's word size.

You will find this term commonly used in Hardware, Software Development

Byte Order Mark (BOM)

A Unicode character used to denote the endianness (byte order) of a text file or stream. Its presence can affect how text data is interpreted and displayed by different software.

You will find this term commonly used in Software Development, Data Formats

Byte Ordering

The order in which bytes are arranged into larger numerical values when stored in memory or when transmitted over digital networks. The two most common byte orders are big-endian and little-endian.

You will find this term commonly used in Software Development, Networking

Byte Serving

The technique of sending portions of a file to a client upon request, allowing for efficient downloading and streaming of large files over the internet. It enables users to access and view content before the entire file is downloaded.

You will find this term commonly used in Networking, Web Development

Byte Swapping

The process of changing the order of bytes within a word of digital data. This is often necessary when transferring data between systems with different endianness (byte order).

You will find this term commonly used in Software Development, Data Formats

Bytecode

A form of instruction set designed for efficient execution by a software interpreter. Unlike machine code, bytecode is platform-independent, typically used in implementing advanced programming languages like Java, allowing for easy transport and execution of code across different systems.

You will find this term commonly used in Software Development, General IT

Bytecode Compilation

The process of compiling source code into bytecode, an intermediate code that can be executed by a virtual machine. This allows for platform-independent execution of programs.

You will find this term commonly used in Software Development, Compilation

Bytecode Interpreter

A program that executes instructions written in bytecode, which is a form of intermediate code more abstract than machine code. Bytecode interpreters read and execute bytecode, translating it into actions or machine code for the computer's CPU to perform.

You will find this term commonly used in Software Development, General IT

Bytecode Linking

The process of combining multiple bytecode files (intermediate representations of compiled source code) into a single executable or library. This step is part of the compilation process, especially in environments like Java Virtual Machine (JVM).

You will find this term commonly used in Software Development, Compilation

Bytecode Optimization

The process of improving the efficiency and performance of bytecode, which is an intermediate representation of code executed by virtual machines. Bytecode optimization techniques include dead code elimination, loop optimization, and inlining, aimed at reducing runtime and resource consumption.

You will find this term commonly used in Software Development, Performance Optimization

Bytecode Verification

The process of checking the correctness of bytecode before it is executed by a Java Virtual Machine (JVM) or similar runtime environment. Bytecode verification ensures that code adheres to certain format specifications and security checks.

You will find this term commonly used in Software Development, Security

Bytecode Virtual Machine

A virtual machine that executes bytecode, which is a form of instruction set designed for efficient execution by a computer interpreter. Used in various programming languages as an intermediate language before final compilation or during runtime.

You will find this term commonly used in Software Development, Virtualization

Byzantine Agreement

A consensus algorithm that is fault-tolerant to the point where it can function correctly even if some of the nodes in the network fail or act maliciously. It's crucial in distributed computing and blockchain technologies for achieving consensus under adverse conditions.

You will find this term commonly used in Distributed Systems, Blockchain

Byzantine Fault Tolerance (BFT)

A property of computer systems that allows them to tolerate the class of failures known as Byzantine faults. BFT systems can continue to operate correctly even if some of the nodes fail in arbitrary ways, ensuring the system's integrity and reliability, particularly in distributed computing environments.

You will find this term commonly used in Distributed Systems, Security

What's Your
Career Path?

SalesForce: Power User Course

Learn to master SalesForce with ITU Online’s Power User course. Gain the skills you need to become an expert with this online training course.
Total Hours
7 Hrs 45 Min
icons8-video-camera-58
35 On-demand Videos

$49.00

Add To Cart

All Access – Annual Subscription

Get access to all ITU courses with an All Access Annual Subscription. Advance your IT career with our comprehensive online training!
Total Hours
2635 Hrs 32 Min
icons8-video-camera-58
13,488 On-demand Videos

$279.00 / year

Project Management Professional

Prepare for the Project Management Professional (PMP Certification) exam with ITU’s online training
Total Hours
21 Hrs 48 Min
icons8-video-camera-58
101 On-demand Videos

$49.00

Add To Cart

Microsoft Word 2019 Training

Get proficient in Microsoft Word with our comprehensive online training course. Boost your skills and increase productivity. Enroll now!
Total Hours
4 Hrs 25 Min
icons8-video-camera-58
39 On-demand Videos

$49.00

Add To Cart

Learn Adobe Flash / Animate

Discover the power of Adobe Flash / Animate and become a master animator. Get the skills you need to succeed with ITU Online. Enroll now!
Total Hours
15 Hrs 46 Min
icons8-video-camera-58
57 On-demand Videos

$49.00

Add To Cart

Microsoft MTA 98-366

Boost your IT career with Microsoft MTA 98-366 training! Learn networking basics, hardware, protocols, and more. Enroll now and advance your skills.
Total Hours
5 Hrs 48 Min
icons8-video-camera-58
45 On-demand Videos

$49.00

Add To Cart

CompTIA Network Vulnerability Assessment Professional (CNVP)

Focus on Network Vulnerability in this CompTIA training series. Learn to assess network vulnerabilities and implement countermeasures with CompTIA Network Vulnerability Assessment Professional (CNVP) online course.
Total Hours
50 Hrs 24 Min
icons8-video-camera-58
230 On-demand Videos

$59.00

Add To Cart

Microsoft Excel 2019 Training

Master Microsoft Excel with our comprehensive online course. Learn formulas, functions, and more in this hands-on training series. Enroll now!
Total Hours
5 Hrs 37 Min
icons8-video-camera-58
58 On-demand Videos

$49.00

Add To Cart

Risk Management Professional (PMI-RMP)

Become a certified Risk Management Professional with our expert-led online course. Learn the latest techniques and best practices!
Total Hours
8 Hrs 45 Min
icons8-video-camera-58
27 On-demand Videos

$49.00

Add To Cart

CompTIA CySA Plus Certification Training

Learn how to identify and respond to cybersecurity threats with our CompTIA CySA+ (CS0-002) Cybersecurity Analyst course. Enroll now!
Total Hours
14 Hrs 35 Min
icons8-video-camera-58
36 On-demand Videos

$49.00

Add To Cart
ON SALE 70% OFF
All-Access IT Training Monthly Subscription

All Access Library – Monthly subscription

Get unlimited access to ITU’s online courses with a monthly subscription. Start learning today with our All Access Training program.
Total Hours
2622 Hrs 51 Min
icons8-video-camera-58
13,334 On-demand Videos

$14.99 / month with a 10-day free trial

Microsoft 70-341: Core Solutions of Exchange Server

Get hands-on experience with Microsoft 70-341: Core Solutions of Exchange Server 2013 training course and advance your career in IT.
Total Hours
7 Hrs 46 Min
icons8-video-camera-58
60 On-demand Videos

$49.00

Add To Cart