B to C Wipe iFrame Core Dump Telepresence Tweet Workflow Cross- platform Open Source Wireshark Cloud Blog Nerd SEO Sniffer Whitelist Wikiality Jailbreak WiFi Hypervisor Cookie EULA Android Data Mining SolarWinds SLA Honeypot Black Tuesday Chrome MetroApp Spoofing Malware B to B Safari Azure Content Management Byte Filezilla Tagging SPAM De- duping Firewall Softphone Trojan Fuzzy Logic Pentium QR Code Viral 4G Daisy Chain iOS LogRhythm Phishing SYN Flood Dongle API Safe Harbor Host Mobile DLP Zipping Wiki BYOD Hashing Benchmarking Warm Boot ERP Podcast Webtops Two Factor Bloatware Webinar Big Data Scareware CRM Virtualization Blacklist Protocol ITIL Bit Crowdsourcing SaaS Murfing Web 2.0 Stress Test Snort Cache DDoS Single Sign On RAM Ajax Ultrabook Beta B to C Wipe iFrame Core Dump Telepresence Tweet Workflow Cross- platform Open Source Wireshark Cloud Blog Nerd SEO Sniffer Whitelist Wikiality Jailbreak WiFi Hypervisor Cookie EULA Android Data Mining SolarWinds SLA Honeypot Black Tuesday Chrome MetroApp Spoofing Malware B to B Safari Azure Content Management Byte Filezilla Tagging SPAM De- duping Firewall Softphone Trojan Fuzzy Logic Pentium QR Code Viral 4G Daisy Chain iOS LogRhythm Phishing SYN Flood Dongle API Safe Harbor Host Mobile DLP Zipping Wiki BYOD Hashing Benchmarking Warm Boot ERP Podcast Webtops Two Factor Bloatware Webinar Big Data Scareware CRM Virtualization Blacklist Protocol ITIL Bit Crowdsourcing SaaS Murfing Web 2.0 Stress Test Snort Cache DDoS Single Sign On RAM Ajax Ultrabook Beta
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B to C
Wipe
iFrame
Core Dump
Telepresence
Tweet
Workflow
Cross-platform
Open Source
Wireshark
Cloud
Blog
Nerd
SEO
Sniffer
Whitelist
Wikiality
Jailbreak
WiFi
Hypervisor
Cookie
EULA
Android
Data Mining
SolarWinds
SLA
Honeypot
Black Tuesday
Chrome
MetroApp
Spoofing
Malware
B to B
Safari
Azure
Content Management
Byte
Filezilla
Tagging
SPAM
De-duping
Firewall
Softphone
Trojan
Fuzzy Logic
Pentium
QR Code
Viral
4G
Daisy Chain
iOS
LogRhythm
Phishing
SYN Flood
Dongle
API
Safe Harbor
Host
Mobile
DLP
Zipping
Wiki
BYOD
Hashing
Benchmarking
Warm Boot
ERP
Podcast
Webtops
Two Factor
Bloatware
Webinar
Big Data
Scareware
CRM
Virtualization
Blacklist
Protocol
ITIL
Bit
Crowdsourcing
SaaS
Murfing
Web 2.0
Stress Test
Snort
Cache
DDoS
Single Sign On
RAM
Ajax
Ultrabook
Beta