Browse Definitions :

Browse Definitions by Alphabet

PER - POI

  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an organization's achievements, efficiency and adherence to budget, comparing actual results against previously articulated goals.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permittivity (electric permittivity) - Permittivity (electric permittivity) is defined as the ratio of electric displacement to the electric field intensity.
  • permittivity of free space - The permittivity of free space is a physical constant that reflects the ability of electrical fields to pass through a classical vacuum.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • personal area network (PAN) - A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
  • personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • PFC (power factor correction or power factor controller) - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • pharmaceutical detailing - Pharmaceutical detailing is a 1:1 marketing technique pharmaceutical companies use to educate a physician about a vendor's products, hoping that the physician will prescribe the company's products more often.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phase - In electronic signaling, a phase is the position of a wave at a point in time (instant) on a waveform cycle.
  • phase-locked loop (PLL) - A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.
  • phased rollout - Phased rollout is a hardware or software migration method that involves incremental implementation of a new system.
  • phenomenon - A phenomenon, in a scientific context, is something that is observed to occur or to exist.
  • PHI breach (protected health information breach) - A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.
  • phishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • photolithography - Photolithography is the standard method of printed circuit board (PCB) and microprocessor fabrication.
  • Photoshop - Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
  • photovoltaic cell (PV Cell) - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).
  • photovoltaic glass (PV glass) - Photovoltaic glass (PV glass) is a technology that enables the conversion of light into electricity.
  • PHP (Hypertext Preprocessor) - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • phygital - Companies are seeking to combine physical and digital (phygital) communication channels and provide customers with a seamless experience.
  • physical layer - Located at the lowest layer of the Open Systems Interconnection (OSI) communications model, the physical layer's function is to transport data using electrical, mechanical or procedural interfaces.
  • physical security - Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
  • physical to virtual (P2V) - Physical to virtual (P2V), also called hardware virtualization, refers to the migration of physical machines to virtual machines (VMs).
  • physiognomy - Physiognomy is a pseudoscience based on associating personal characteristics and traits with physical differences, and especially with elements of people's faces.
  • PIC microcontrollers - PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.
  • PICK chart (Possible, Implement, Challenge and Kill chart) - A PICK chart (Possible, Implement, Challenge and Kill chart) is a visual tool for organizing ideas.
  • pick to light - Pick to light is order-fulfillment technology that employs alphanumeric displays and buttons at storage locations to guide the manual "picking" and recording of items for shipment.
  • pick two (pick any two) - Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.
  • Picture in Picture (PIP) - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.
  • piezoelectricity - Piezoelectricity, also called the piezoelectric effect, is the ability of certain materials to generate an AC (alternating current) voltage when subjected to mechanical stress or vibration, or to vibrate when subjected to an AC voltage, or both.
  • piggybacking - Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority.
  • pigs and chickens - Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.
  • pilot program (pilot study) - A pilot program, also called a feasibility study or experimental trial, is a small-scale experiment that helps an organization learn how a large-scale project might work in practice.
  • pin or PIN - A pin is a pronged contact as part of a signal interface in a computer or other communications device.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • ping sweep (ICMP sweep) - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
  • Pinterest - Pinterest is a social curation website for sharing and categorizing images found online.
  • PIO (Programmed Input/Output) - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.
  • pipe - In computer programming, especially in Unix operating systems (OSes), a pipe is a technique for passing information from one program process or command to another.
  • pipeline as code - Pipeline as code is an approach to a continuous integration (CI) pipeline where the pipeline is expressed entirely in computer code.
  • pipelining - Pipelining is the process of storing and prioritizing computer instructions that the processor executes.
  • piracy - Software piracy is the illegal copying, distribution, or use of software.
  • pivot table - A pivot table is a statistics tool that summarizes and reorganizes selected columns and rows of data in a spreadsheet or database table to obtain a desired report.
  • pixel - The pixel -- a word invented from picture element -- is the basic unit of programmable color on a computer display or in a computer image.
  • pizza box server - The term "pizza box server" refers to the shape of a computer server enclosed in a rectangular and horizontally-arranged chassis and often installed in a rack with similar servers.
  • PKI (public key infrastructure) - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.
  • PL/SQL (procedural language extension to Structured Query Language) - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).
  • Plain Old Telephone Service (POTS) - Plain Old Telephone Service (POTS) refers to the traditional, analog voice transmission phone system implemented over physical copper wires (twisted pair).
  • plaintext - In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.
  • Planck's constant - Planck's constant, symbolized as h, is a fundamental universal constant that defines the quantum nature of energy and relates the energy of a photon to its frequency.
  • plane (in networking) - A plane, in a networking context, is one of three integral components of a telecommunications architecture.
  • planogram - A planogram is a diagram that shows how and where specific retail products should be placed on retail shelves or displays in order to increase customer purchases.
  • plasma - Plasma is a form of matter in which many of the electrons wander around freely among the nuclei of the atom s.
  • plasma TV - Plasma TV is a television display technology in which each pixel on the screen is illuminated by a tiny bit of plasma (charged gas).
  • platform - In IT, a platform is any hardware or software used to host an application or service.
  • platform economy - Platform economy is the tendency for commerce to increasingly move towards and favor digital platform business models.
  • Playstation - Playstation is a video game console developed by Sony.
  • plenum - In buildings, a plenum is a separate space provided for air circulation for heating, ventilation, and air-conditioning (sometimes referred to as HVAC) and typically provided in the space between the structural ceiling and a drop-down ceiling.
  • plotter - A plotter is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
  • plug-in - Plug-in applications are programs that can easily be installed and used as part of your Web browser.
  • plug-in hybrid electric vehicle (PHEV) - A plug-in hybrid electric vehicle (PHEV) is a type of hybrid electric vehicle that combines a gasoline or diesel engine with an electric motor and a large battery, which can be recharged by plugging it into an electrical outlet or charging stations.
  • Plundervolt - Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.
  • Plutchik's wheel of emotions - Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.
  • PMI (plus, minus, interesting) retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.
  • PMO (project management office) - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.
  • pneumatics - Pneumatics (pronounced new-MATT-ix) is an aspect of physics and engineering that is concerned with using the energy in compressed gas to make something move or work.
  • PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • podcasting - Podcasting is the preparation and distribution of audio files using RSS feeds to the computers or mobile devices of subscribed users.
  • point of care (POC) testing - Point of care (POC) testing is medical testing that is performed outside of a laboratory setting.
  • point-in-time snapshot (PIT snapshot) - Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time.
  • point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • point-to-point graph (line graph) - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • Point-to-Point Protocol (PPP) - Point-to-Point Protocol (PPP) refers to a suite of computer communication protocols that provide a standard way to transport multiprotocol data over point-to-point links.
  • Point-to-Point Protocol over Ethernet (PPPoE) - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
  • poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocol, poison reverse is a loop avoidance process.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close