Browse Definitions :

Browse Definitions by Alphabet

POK - PRO

  • poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.
  • polarity - Polarity is when an entity contains two distinct and opposite poles that can either attract or repel each other.
  • polarization (wave polarization) - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.
  • polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
  • polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
  • polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.
  • polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.
  • Pomodoro Technique - The Pomodoro Technique is a time management method based on 25-minute stretches of focused work broken by five-minute breaks.
  • POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • population - In statistics and other areas of mathematics, a population is a complete collection of entities or items that has at least one characteristic in common.
  • population health management (PHM) - Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.
  • port - A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
  • portability - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
  • portable app - A portable application (portable app) is a software product designed to be easily moved from one computing environment to another.
  • Portable Document Format (PDF) - Portable Document Format (PDF) is a file format that has captured all the elements of a printed document as an electronic image that users can view, navigate, print or forward to someone else.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • portmanteau - A portmanteau is a word created from two other words, or parts of words, that both contribute to its meaning.
  • positioning - Positioning, in a marketing context, is the process of identifying an appropriate market niche for a product, service or brand and getting it established it in that area.
  • positioning statement - A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t.
  • positron - A positron is a particle of matter with the same mass as an electron but an opposite charge.
  • POSIX (Portable Operating System Interface) - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
  • possession factor - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.
  • POST (Power-On Self-Test) - A Power-On Self-Test (POST) is an operation initiated by a computer after it has been turned on but before it boots up the OS.
  • post-quantum cryptography - Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers.
  • PostgreSQL - PostgreSQL (pronounced "post-gress-Q-L") is an open source relational database management system (DBMS) developed by a worldwide team of volunteers.
  • Postscript - Postscript is a programming language that describes the appearance of a printed page.
  • potential energy (U) - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
  • potentially unwanted program (PUP) - A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download it.
  • pounds per square inch (PSI) - PSI is commonly used to measure the pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure).
  • power - Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field.
  • power cycling - Power cycling is the process of turning hardware off and then turning it on again.
  • power distribution unit (PDU) - A power distribution unit (PDU) is a device for controlling electrical power in a data center.
  • Power over Ethernet (PoE) - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
  • power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine’s mechanical power to another piece of equipment.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • power user - A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user.
  • power-on reset (PoR) - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.
  • PowerPC - PowerPC is a microprocessor architecture that was developed jointly by Apple, IBM, and Motorola.
  • PowerShell - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
  • PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
  • PPM (project and portfolio management) - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.
  • pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
  • preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.
  • preboot execution environment (PXE) - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
  • Preboot Execution Environment (PXE) - The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.
  • precision agriculture - Precision agriculture (PA) is a farming management concept based on observing, measuring and responding to inter- and intra-field variability in crops.
  • precision medicine (PM) - Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider differences in genes, socioeconomic status and lifestyles when devising treatment regimens for patients.
  • prediction error - A prediction error is the failure of some expected event to occur.
  • Predictive Index (PI) - The Predictive Index (PI) is often used for employee profiling.
  • predictive modeling - Predictive modeling is a mathematical process used to predict future events or outcomes by analyzing patterns in a given set of input data.
  • predictive text - Predictive text is an input technology that facilitates typing on a device by suggesting words the user may wish to insert in a text field.
  • prescriptive analytics - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
  • presentation layer - Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.
  • presentation software (presentation graphics) - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.
  • Presidential Policy Directive 21 (PPD-21) - Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure.
  • press kit - A press kit is an information package provided for members of the media to promote events, organizations, products or candidates.
  • Pretty Good Privacy (PGP) - Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
  • prettyprint - Prettyprint is the process of converting and presenting source code or other objects in a legible and attractive way.
  • primary key (primary keyword) - A primary key, also called a primary keyword, is a column in a relational database table that's distinctive for each record.
  • primary storage (main storage) - Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use and critical for an organization’s operations.
  • prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.
  • primitive - In computer programming, a primitive (pronounced PRIH-muh-teev) is a basic interface or segment of code that can be used to build more sophisticated program elements or interfaces.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • print server - A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators.
  • printed circuit board (PCB) - A printed circuit board (PCB) is the board base for physically supporting and wiring surface-mounted and socketed components in most electronics.
  • printer - A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.
  • Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.
  • Prisma - Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services.
  • privacy compliance - Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.
  • privacy impact assessment (PIA) - A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • private 5G - Private 5G is wireless network technology that delivers cellular connectivity for private network use cases, such as private businesses, third-party providers and municipalities.
  • private API - A private API is an application programming interface that has its application hosted with in-house developers.
  • private branch exchange (PBX) - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • private CA (private PKI) - Private CA stands for private certification authority and is an enterprise specific CA that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private cloud storage (internal cloud storage) - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private IP address - A private IP address is a range of non-internet facing IP addresses used in an internal network.
  • private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data.
  • private platform as a service (private PaaS) - Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.
  • private sector - The private sector is the part of a country's economic system that is run by individuals and companies, rather than a government entity.
  • privatization - Privatization is the process of transferring an enterprise or industry from the public sector to the private sector.
  • privilege creep - Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job.
  • privileged access management (PAM) - Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • probe - In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close