P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
898 INDEXBasis of Estimate (BOE),V1:585, 586
Bastion host,V1:833, 839
Batch optimistic lock type,V1:30, 34
Batch processing,V1:238, 633
sequential,V3: 494
Baudot code,V1: 237
Bayesian belief networks,V1: 403
B-commerce,V2: 441
BeanInfo interface,V2: 393
Because It’s Time Network (BITNET),
V1:180, 669;V2:119.See also
BITNET mail
Beenz,V1: 133
Behavioral agents,V2: 200
Behavioral profiles,V3:51–53
Behavior-based software,V1: 258
Bell Operating Companies (BOCs),
V3: 168
Benchmarking,V1:57–71
business,V1:58–59
company,V1: 59
defined,V1: 58
extensions of,V1:59–60
formal,V1: 59
of framework conditions,V1: 60
international,V1:60, 63–66
Internet,V1:57, 61–63, 63–66
public sector,V1: 60
stages of,V1: 59
studies,V1: 60
system performance,V1: 144
technical,V1:65–66
time framework for,V1:68–69
types of,V1: 59
Web sites and associations concerning,
V1:57–58
Benchmarking Belgium,V1: 65
Benchmarking eEurope,V1: 64
Benchmarking Exchange,V1: 57
Beowulf,V3: 27
Berkeley Digital Library SunSITE,
V1:509, 518
Berkeley Software Distribution (BSD),
V3:497– 498
Berne Convention for the Protection of
Literary and Artistic Works,
V1: 312
Berners-Lee, Tim,V1: 444
Bertillon system,V1: 73
Best Buy,V1: 608
“Best practice” management,V2: 552
Best Web Buys,V1: 285
Beta testing,V2: 5
Better Business Bureau,V1: 101
BetterButton,V1:19–20
Beyond Budgeting Round Table (BBRT)
model,V1: 209
Bezos, Jeff,V1: 285
B-frames,V3:559–560
Bibliographic control,V2: 485
Bibliographic instruction,V2:480 – 481
Bibliographic utility,V2: 485
Bidders Edge,V1: 348
Bid shielding,V1: 331
Big Brothers Big Sisters (BBBS) nonprofit
organization,V2:677–678
Bill payment, electronic,V2:726 –727
Bill presentment, electronic,V1: 631
Biological terrorism Web sites,
V2: 446Biometric Applications Programming
Interface (BioAPI) standards,
V1:79–80
Biometric authentication,V1:72–83,
530 –531, 533
applications for,V1:72–73
history of,V1: 73
Internet applications for,V1: 80
performance testing in,V1:76 –77
privacy and,V1:78–79
Biometric Certification Authority (BCA),
V1: 80
Biometric devices,V1: 49
transaction times for,V1: 77
Biometric forgeries,V1: 77
Biometric measures,V1: 81
theft of,V1: 79
Biometrics,V1:72, 526, 530 –531
commonsense use of,V1: 80
international standards for,V1:79–80
Biometric systems,V1:73–76
Biotechnology,V1: 440
Bit Error Rate (BER),V1:461;V3: 130
Bitmap animations,V2:654 –656
Bitmap editing,V2: 647
Bitmap (BMP) images,V1: 821
still,V2: 650
Bitmap rotoscoping,V2: 655
Bitmap-to-vector converters,V2:649–651
BITNET mail,V1:663;V3:202.See also
Because It’s Time Network (BITNET)
Bit rate,V3: 173
Bits,V3: 647
Bizrate,V1: 278
Blackboard 5 community portal system,
V2: 69
Black market goods, auctioning,
V1: 331
B language,V1: 164
“Blended learning,”V2: 158
Blind-bidding direct negotiation,V2: 751
Block elements, XHTML,V2: 132
Blogs,V2:795–796;V3:203.See alsoWeb
logs
BluetoothTM,V1:84 –95;V3:843–844
adopted protocols in,V1:91–92
applications for,V1:86 –88
history of,V1:84 –85
module,V1: 88
operation of,V1:93–94
profiles for,V1:92–93
protocol stack for,V1:88–91;V2: 633
BluetoothTMArchitecture Review Board
(BARB),V1: 85
BluetoothTMLocal Positioning Profile,
V1: 88
BluetoothTMNetwork Encapsulation
Protocol (BNEP),V1: 87
BluetoothTMQualification Program,
V1: 92
BluetoothTMSpecial Interest Group (SIG),
V1:84, 85, 95
Blurring, trademark,V3: 451
Bobby Accessibility Evaluation Web
resource,V3:487, 488
BOMBSQUAD software,V1: 258
Bond exchange, online,V1: 676
BOOKMAN Writer,V2: 791
Books.See alsoE-books; Electronic books
(e-books)audio,V2: 791
collections of digital,V1:509–510
electronic,V2:478, 788–789
future of,V1: 524
online sales of,V1:285–286
Bookstore vendor sites,V2: 478
Boolean logic,V1:842, 844
expressions,V1: 769
Boot-record infector viruses,V1: 328
Boot Sector Infectors (BSIs),V1: 253
Border,V1: 163
Border Gateway Protocol (BGP),V1:362,
368;V3:786, 834 –835
Bots,V1:348, 816
Bot software tool,V1:132, 137
Box model,V1: 163
CSS,V1:154 –155
Brainstorming,V3: 233
in computer game design,V2:6–7
Branding/brands,V2: 779
building loyalty to,V1: 101
community,V3:854 –855
managing,V2: 580
publicity for,V2: 570
Brick-and-click firms,V1:104, 137, 603
Brick-and-mortar firms,V1:104, 129–130,
281
e-ventures of,V1:98, 102
Brick-and-mortar marketplace,V1:672,
685
Bricks and clicks approach,V2:575.
See alsoClick-and-mortar firms
Bridge-builders, religious,V2: 804
Britain, e-business in,V1: 809
British Naval Connector (BNC),
V1: 266
Broadband,V1:183, 261;V3: 88
infrastructure,V1: 806
nontelephone services,V1: 299
webcasting and,V3: 684
Broadband ISDN (B-ISDN),V2:180,
187–189
Broadcasts:
e-mail,V2: 779
modeling,V1:177–178
networks for,V1: 184
services for,V2: 248
Brocade SANs,V3: 334
Brochureware,V1:129, 596, 811, 816
travel and tourism,V3: 465
Brokerage firm applications,
V2:294 –295
Brokerage models,V1: 604
Brokerage services,V2:728.See also
Brokers
e-commerce and,V3:195–196
Brokers:
discount,V3:280 –281
online,V1: 486
Browser data, IP addresses and,V3: 102
Browser objects,V1:445– 446, 455
Netscape,V1:447– 448
Browsers,V1:10;V2:288.See also
Browsing
“Browser sniffing,”V1: 450
“Browser wars,”V2: 121
Browsing:
downloading files by,V1: 570
GUI and non-GUI,V2: 303
history of,V2: 121