Browse Definitions :

Browse Definitions by Alphabet

  • P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
  • PA-DSS (Payment Application Data Security Standard) - Payment Application Data Security Standard (PA-DSS) is a set of requirements intended to help software vendors develop secure payment applications for credit card transactions.
  • packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
  • packet filtering - Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and destination addresses, ports or protocols.
  • packet loss - Packet loss is when one or more transmitted data packets fail to arrive at their destination.
  • page description language (PDL) - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
  • pagination - Pagination is the process of separating print or digital content into discrete pages.
  • paging - Paging is a function of memory management where a computer will store and retrieve data from a device’s secondary storage to the primary storage.
  • pair programming - Pair programming is an Agile software development technique originating from Extreme programming (XP) in which two developers team together and work on one computer.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • paperless office - The paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.
  • Parallel ATA (Parallel Advanced Technology Attachment or PATA) - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a legacy standard for connecting internal floppy disks, hard disk drives (HDDs) and optical drives to older computer systems.
  • parallel file system - A parallel file system is a software component designed to store data across multiple networked servers and to facilitate high-performance access through simultaneous, coordinated input/output operations (IOPS) between clients and storage nodes.
  • parallel processing - Parallel processing is a method in computing of running two or more processors (CPUs) to handle separate parts of an overall task.
  • Parallels - Parallels is a software company best-known for its software that allows users to run Microsoft Windows systems on Apple Macintosh computers.
  • Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that allows Microsoft Windows, Linux and Google Chrome OSes and applications to run on an Apple Mac computer.
  • parameter tampering - Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization.
  • paravirtualization - Paravirtualization is an enhancement of virtualization technology in which a guest OS is modified prior to installation inside a virtual machine (VM).
  • Pardot - Pardot is a software as a service (SaaS) marketing automation platform by SalesForce offering email automation, targeted email campaigns and lead management for B2B sales and marketing organizations.
  • Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.
  • parity - Parity is a method of detecting errors in data transmissions between computers, while parity bit and parity checking are used in RAID technology to guard against data loss.
  • Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation about the human tendency to devote a great deal of time to unimportant details, while crucial matters go unattended.
  • parser - In computer technology, a parser is a program that's usually part of a compiler.
  • partition - Partitioning a hard disk drive is the first step in preparing it for data storage.
  • partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.
  • partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.
  • partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.
  • partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners that sell their products.
  • pascal - The pascal (Pa) is the unit of pressure or stress in the International System of Units (SI).
  • Pascal case - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
  • pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
  • passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.
  • passive candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.
  • passive keyless entry (PKE) - Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle.
  • passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.
  • passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.
  • passkey - A passkey is an alternative method of user authentication that eliminates the need for usernames and passwords.
  • passphrase - A passphrase is a sentencelike string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
  • password - A password is a string of characters used to verify the identity of a user during the authentication process.
  • password cracking - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.
  • password entropy - Password entropy is a measurement of a password's strength based on how difficult it would be to crack the password through guessing or a brute-force attack.
  • password manager - A password manager is a technology tool that helps internet users create, save, manage and use passwords across different online services.
  • password salting - Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them.
  • password spraying - Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target accounts.
  • passwordless authentication - Passwordless authentication is signing into a service without using a password.
  • patch panel - A patch panel in a local area network (LAN) is a mounted hardware assembly that contains ports that are used to connect and manage incoming and outgoing LAN cables.
  • Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system (OS) and other Microsoft software.
  • paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they were members of a large, extended family.
  • Pathways Language Model (PaLM) - The Pathways Language Model is the name of a family of AI large language models developed by Google.
  • pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.
  • pay for performance (P4P) - Pay for performance (P4P), in healthcare, is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
  • pay-as-you-go cloud computing (PAYG cloud computing) - Pay-as-you-go cloud computing (PAYG cloud computing) is a payment method for cloud computing that charges based on usage.
  • payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.
  • payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
  • payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC card - A PC card, also known as a PCMCIA card, is a credit card-sized memory or input/output (I/O) device that fits into a PC, usually a laptop.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a congressionally established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI compliance - PCI compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS 12 requirements - The PCI DSS 12 requirements are a set of security controls businesses must implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS merchant levels - Payment Card Industry Data Security Standard (PCI DSS) merchant levels rank merchants based on their number of transactions per year to outline compliance verification requirements.
  • PCIe SSD (Peripheral Component Interconnect Express solid-state drive) - A PCIe SSD (Peripheral Component Interconnect Express solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the highest and the lowest values in a waveform.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure that describes data capacity.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, test and highlight vulnerabilities in their security posture.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • Pentium - Pentium is a widely used series of microprocessors developed by Intel Corporation.
  • people analytics (HR analytics) - People analytics, also known as human resources (HR) analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their effect on business goals and evaluate the effectiveness of HR initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an organization's achievements, efficiency and adherence to budget, comparing actual results against previously articulated goals.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • permittivity (electric permittivity) - Permittivity (electric permittivity) is defined as the ratio of electric displacement to the electric field intensity.
  • permittivity of free space - The permittivity of free space is a physical constant that reflects the ability of electrical fields to pass through a classical vacuum.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection - A persistent connection, also known as an HTTP persistent connection, refers to a network communication channel that remains open for further HTTP requests and responses instead of closing after a single exchange.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • personal area network (PAN) - A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal computer (PC) - A personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
  • personal health record (PHR) - A personal health record (PHR) is an electronic summary of health information that a patient maintains control of themselves, as opposed to their healthcare provider.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close