Browse Definitions by Alphabet
P2P - PER
- P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
- PA-DSS (Payment Application Data Security Standard) - Payment Application Data Security Standard (PA-DSS) is a set of requirements intended to help software vendors develop secure payment applications for credit card transactions.
- packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
- packet filtering - Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and destination addresses, ports or protocols.
- packet loss - Packet loss is when one or more transmitted data packets fail to arrive at their destination.
- PACS (picture archiving and communication system) - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.
- page authority (Web page authority) - Page authority, in search engine optimization (SEO), is the value a search engine assigns a Web page.
- page description language (PDL) - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
- pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
- pagination - Pagination is the process of separating print or digital content into discrete pages.
- paging - Paging is a function of memory management where a computer will store and retrieve data from a device’s secondary storage to the primary storage.
- pair programming - Pair programming is an Agile software development technique originating from Extreme programming (XP) in which two developers team together and work on one computer.
- palm print recognition - Palm print recognition is a biometric authentication method based on the unique patterns of various characteristics in the palms of people’s hands.
- pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
- paperless office - The paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.
- Parallel ATA (Parallel Advanced Technology Attachment or PATA) - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
- parallel file system - A parallel file system is a software component designed to store data across multiple networked servers and to facilitate high-performance access through simultaneous, coordinated input/output operations (IOPS) between clients and storage nodes.
- parallel I/O - Parallel I/O is a way of performing multiple input/output operations concurrently, rather than serially.
- parallel processing - Parallel processing is a method in computing of running two or more processors (CPUs) to handle separate parts of an overall task.
- Parallels - Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.
- Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that allows Microsoft Windows, Linux and Google Chrome OSes and applications to run on an Apple Mac computer.
- parameter tampering - Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization.
- paravirtualization - Paravirtualization is an enhancement of virtualization technology in which a guest OS is modified prior to installation inside a virtual machine (VM) in order to allow all guest OSes within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.
- Pardot - Pardot is a software as a service (SaaS) marketing automation platform by SalesForce offering email automation, targeted email campaigns and lead management for B2B sales and marketing organizations.
- Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
- Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.
- Paris Agreement - The Paris Agreement is an international treaty that seeks to reduce the emission of greenhouse gases.
- parity - Parity is a method of detecting errors in data transmissions between computers, while parity bit and parity checking are used in RAID technology to guard against data loss.
- Parkinson's law - Cyril Northcote Parkinson observed that "work expands so as to fill the time available for its completion" in a 1955 essay published in "The Economist" based on his experience in the British Civil Service.
- Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation about the human tendency to devote a great deal of time to unimportant details, while crucial matters go unattended.
- parser - In computer technology, a parser is a program that's usually part of a compiler.
- partition - Partitioning a hard disk drive is the first step in preparing it for data storage.
- partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.
- partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.
- partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.
- partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners that sell their products.
- pascal - The pascal (Pa) is the unit of pressure or stress in the International System of Units (SI).
- Pascal case - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
- pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
- passenger name record (PNR) - A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together.
- passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.
- passive candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.
- passive keyless entry (PKE) - Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle.
- passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
- passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.
- passive scanning - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.
- passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.
- passive solar - Passive solar is the use of the sun’s energy directly for either heating or cooling purposes.
- passkey - A passkey is an alternative method of user authentication that eliminates the need for usernames and passwords.
- passphrase - A passphrase is a sentencelike string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
- password - A password is a string of characters used to verify the identity of a user during the authentication process.
- password cracking - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.
- password entropy - Password entropy is a measurement of how unpredictable a password is.
- password manager - A password manager is a technology tool that helps internet users create, save, manage and use passwords across different online services.
- password salting - Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them.
- passwordless authentication - Passwordless authentication is signing into a service without using a password.
- patch panel - A patch panel in a local area network (LAN) is a mounted hardware assembly that contains ports that are used to connect and manage incoming and outgoing LAN cables.
- Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system (OS) and other Microsoft software.
- paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they members of a large, extended family.
- Pathways Language Model (PaLM) - The Pathways Language Model is the name of a family of AI large language models developed by Google.
- pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.
- pay for performance (P4P) - Pay for performance (P4P), in healthcare, is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
- pay-as-you-go cloud computing (PAYG cloud computing) - Pay-as-you-go cloud computing (PAYG cloud computing) is a payment method for cloud computing that charges based on usage.
- payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.
- Payment Card Industry (PCI) - The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.
- payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
- payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.
- PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
- PC card - A PC card, also known as a PCMCIA card, is a credit card-sized memory or input/output (I/O) device that fits into a PC, usually a laptop.
- PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
- PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
- PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
- PCI DSS 12 requirements - The PCI DSS 12 requirements are a set of security controls businesses must implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
- PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
- PCI DSS merchant levels - Payment Card Industry Data Security Standard (PCI DSS) merchant levels rank merchants based on their number of transactions per year to outline compliance verification requirements.
- PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
- PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
- PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
- peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the highest and the lowest values in a waveform.
- PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
- pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.
- PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.
- peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
- peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
- Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
- pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
- Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
- pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, test and highlight vulnerabilities in their security posture.
- Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
- Pentium - Pentium is a widely used series of microprocessors developed by Intel Corporation.
- people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.
- PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
- percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
- perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
- perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
- performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an organization's achievements, efficiency and adherence to budget, comparing actual results against previously articulated goals.
- performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
- performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
- Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
- Perl - Perl is a family of script programming languages that is similar in syntax to the C language.