P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
INDEX 899modern,V1: 450
privacy of,V3:101–102
using XML in,V1:745–747
Brussels Convention,V2: 218
Budgeting:
business,V1: 100
tools for,V1: 100
Buffering,V3: 555
Buffer overflow attacks,V1:256, 329, 428,
433
Buffers,V1: 334
Building material suppliers,
click-and-brick,V1: 191
Bulk-service ASPs (Application Service
Providers),V1: 38
Bulletin Board for Libraries (BUBL),
V1: 515
Bulletin Board Systems (BBSs),V3:202,
206
copyright infringement and,V1: 311
Bullwhip effect,V3:376, 388
Business.See alsoBusinesses; E-business;
Electronic commerce (e-commerce)
benchmarking,V1:58–59
continuity planning in,V1: 547
data protection for,V1:116 –117
disputes in,V2:748, 749
drivers of,V3: 217
function recovery by,V1:541–543
impact analysis of,V1:539–540
GIS applications for,V2:30 –31
management of,V1: 102
monitoring activity of,V1: 213
privacy and,V3:100 –101
streaming video in,V3: 563
wiretap laws and,V3: 100
Business applications, for accounting
technology,V3: 147
Businesses, strengths and weaknesses of,
V3:346 –347
Business information, point-to-point
transfer of,V1: 111
“Business intelligence” (BI),V2:686, 687,
690
Business models:
alternative,V2: 837
enhanced-TV,V1:703–704
Internet,V1:603–604;V3:379–381
value chain analysis and,
V3:528–529
Business partners, collaboration with,
V1: 795
Business plans,V1:141.See alsoNew
business ventures
budgeting in,V1: 100
for e-commerce projects,V1:96 –105
organizational issues in,V1:98–99
preparing,V1: 103
Business practices, collaborative,
V1:204 –205, 206
Business processes:
innovations in,V1: 107
integrating,V1:110 –111
Business Process Reengineering (BPR),
EDI applications for,V1:619–620
Business reporting.SeeExtensible
Business Reporting Language
(XBRL)
Business strategy, electronic data
interchange and,V1:618–619Business systems:
“open” versus “closed,”V1: 111
peer-to-peer,V3:31–32
Business-to-business space,
V1:98, 104
Business-to-Business (B2B) e-commerce,
V1:106 –119,
120 –128, 481, 601, 609.See also
B2B entries
challenges of,V1:114 –117
as an enabler of technologies and
services,V1:126 –127
foundations of,V1:106 –107
implementing,V1:110 –114
merits and limitations of,V1:125–126
models by ownership,V1:121–123
models by transaction methods,
V1:123–124
motivation for,V1:107–108
perspective on,V1: 117
strategies for,V1:108–110
success factors for,V1: 126
technological challenges in,V1:116 –117
transaction methods for,V1:123–124
Business-to-Consumer (B2C) e-commerce,
V1:285–287, 292.
See alsoB2C entries
Business-to-Government (B2G)
transactions,V1:646, 804
Business trends, supply chain and,
V2:551–553
Business Web (B-Web),V2:438, 441
Business workshops,V2: 726
Bus topology,V1:262;V2: 517
Buyer advocate business model,
V1:132–133
Buyer aggregation,V1: 611
Buyer-centric markets,V1:608–609
Buyers, e-commerce,V1: 187
Buyer-seller relations, e-commerce,
V1: 609
Buying,V1:284 –285
consortia for,V1: 122
direct,V1:121–122
Buy-side e-procurement architecture,
V1:648–649
Bytecode,V3: 35C# language,V1:225, 226.See alsoC/C++
languages
C2 architectural style,V2:398–399
Cable:
access methods,V1: 262
coaxial,V1:263–267
comparing and contrasting,V1: 270
fiber optic,V1:178, 269–270
providers,V1: 134
replacing with wireless technology,
V1: 88
token ring,V1: 269
twisted-pair,V1:267–269
“Cable clutter,”V1: 84
Cable modems,V2:300;V3:170 –171
access to,V3:779–780
Cable News Network site,V2: 761
Cable replacement applications,
BluetoothTM,V1:86 –87
Cable television,V1:297, 699
Caching,V1:9, 10, 334
WEB architecture and,V3:712–713Caching proxy network,V2:509–510
Cages,V3: 706
Calendars:
ActiveX,V1:21–22
group,V2: 69
systems of,V2:347–348
California Heritage Collection,V1: 512
California State Library,V1: 516
Camp, Robert C.,V1:57, 58
Campus Area Networks (CANs),
V2: 540
Canada:
law enforcement agency Web sites in,
V2: 444
privacy legislation in,V1: 341
CA*net II system,V3: 671
Capability, knowledge and,V2: 432
Capacity, of e-manufacturing,V1:724.See
alsoCapacity planning
Capacity management,V1:150 –151
modeling approaches for,V1:145–146
Capacity planning:
availability modeling and,V1:148–149
methodology for,V1: 141
models for,V1:143–144
performance and capacity process in,
V1:143–146
performance measurement and,
V1:142–143
software performance engineering and,
V1:146 –148
system parameters for,V1: 140
tools for,V1:149–150
for Web services,V1:139–151;V3: 719
Capital Expenditure (CE)
modeling/simulation,V1: 578
design architecture for,V1:581–583
Card sorting,V3:514 –515
Caribbean, Internet diffusion into,
V2:43– 44
Carnivore program,V2: 452
Carrier,V1: 466
Carrier Sense Multiple Access with
Collision Avoidance (CSMA-CA),
V1: 262
Carrier Sense Multiple Access with
Collision Detection (CSMA-CD),
V1: 262
Cartesian joins, in SQL,V3: 358
Cascade,V1: 163
“Cascading” changes,V1: 376
Cascading multiplexers,V2: 670
Cascading Style Sheets (CSS),
V1:152–163, 455, 824;V3:693–694,
770, 873.See alsoCSS entries; DeCSS
software
best practices for,V1:160 –162
determining order of,V1: 156
document validation and,V1: 153
evolution of,V1:162–163
formatting XML data with,V1:745–747
inheritance and,V1:155–156
language for,V1: 445
media types and,V1:153–154
practical uses of,V1:159–160
Cash flows, internal rate of return and,
V3:220 –221
Cash-like payment systems,V1: 641
Cash transactions,V1: 635
Casio mobile devices,V2: 630