Browse Definitions :

Browse Definitions by Alphabet

POL - PRI

  • policy-based networking - Policy-based networking is the management of a network so that various kinds of traffic - data, voice, and video - get the priority of availability and bandwidth needed to serve the network's users effectively.
  • Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.
  • polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.
  • polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
  • polymer LED (light-emitting polymer or polyLED) - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
  • polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.
  • polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.
  • pomodoro technique - The pomodoro technique is designed to help users use their time more effectively by overcoming tendencies to procrastinate and multitask, both of which impair productivity.
  • POODLE (Padding Oracle On Downgraded Legacy Encryption) - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.
  • POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • population - In statistics and other areas of mathematics, a population is a complete collection of entities or items that has at least one characteristic in common.
  • population health management (PHM) - Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.
  • port - A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port mirroring (roving analysis port) - Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
  • portability - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
  • portable app - A portable application (portable app) is a software product designed to be easily moved from one computing environment to another.
  • Portable Document Format (PDF) - PDF is also an abbreviation for the Netware Printer Definition File.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • Portal of Doom - Portal of Doom (abbreviated as PoD and sometimes spelled all one word, as PortalOfDoom) is a Trojan horse that hijacks the computers of unsuspecting Windows users running old operating systems.
  • Porter's Five Forces - Porter's Five Forces is a framework developed by economist Michael E.
  • portmanteau - A portmanteau is a word created from two other words, or parts of words, that both contribute to its meaning.
  • portrait - In computer printing, portrait is a mode in which the printer orients content for reading across the shorter length (the width) of the sheet of paper.
  • positioning - Positioning, in a marketing context, is the process of identifying an appropriate market niche for a product, service or brand and getting it established it in that area.
  • positioning statement - A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t.
  • positive correlation - A positive correlation is a relationship between two variables such that their values increase or decrease together.
  • positron - A positron is a particle of matter with the same mass as an electron but an opposite charge.
  • POSIX (Portable Operating System Interface) - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
  • possession factor - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.
  • POST (Power-On Self-Test) - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.
  • post-processing deduplication (PPD) - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.
  • post-quantum cryptography - Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers.
  • PostgreSQL - PostgreSQL (pronounced "post-gress-Q-L") is an open source relational database management system (DBMS) developed by a worldwide team of volunteers.
  • Postscript - Postscript is a programming language that describes the appearance of a printed page.
  • potential energy (U) - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
  • potentially unwanted program (PUP) - A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download it.
  • pounds per square inch (PSI) - PSI is commonly used to measure the pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure).
  • power - Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field.
  • power cycling - Power cycling is the process of turning hardware off and then turning it on again.
  • power distribution unit (PDU) - A power distribution unit (PDU) is a device for controlling electrical power in a data center.
  • Power over Ethernet (PoE) - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
  • power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine’s mechanical power to another piece of equipment.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • power user - A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user.
  • power-on reset (PoR) - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.
  • PowerBuilder - PowerBuilder is a popular rapid application development (RAD) tool for buildingobject-oriented programmingclient/serverapplications the parts of which can bedistributedwithin a network.
  • PowerPC - PowerPC is a microprocessor architecture that was developed jointly by Apple, IBM, and Motorola.
  • PowerShell - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
  • POX - POX is an open source development platform for Python-based software-defined networking (SDN) control applications, such as OpenFlow SDN controllers.
  • PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
  • PPM (pages per minute) - In printing, PPM is an abbreviation that stands for "pages per minute.
  • PPM (project and portfolio management) - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.
  • Practice Fusion - Practice Fusion Inc.
  • pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
  • preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.
  • preboot execution environment (PXE) - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
  • Preboot Execution Environment (PXE) - The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.
  • precision agriculture - Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.
  • precision medicine (PM) - Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider differences in genes, socioeconomic status and lifestyles when devising treatment regimens for patients.
  • prediction error - A prediction error is the failure of some expected event to occur.
  • predictive coding - Predictive coding software can be used to automate portions of an e-discovery document review.
  • Predictive Index (PI) - The Predictive Index (PI) is often used for employee profiling.
  • predictive modeling - Predictive modeling is a mathematical process used to predict future events or outcomes by analyzing patterns in a given set of input data.
  • predictive technology - Predictive technology is a body of tools capable of discovering and analyzing patterns in data so that past behavior can be used to forecast likely future behavior.
  • predictive text - Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.
  • preemptive multitasking - Preemptive multitasking is task in which a computer operating system uses some criteria to decide how long to allocate to any one task before giving another task a turn to use the operating system.
  • prescription drug monitoring program (PDMP) - A prescription drug monitoring program (PDMP) is an electronic database that collects designated data on controlled substances that are prescribed and dispensed within a state.
  • prescriptive analytics - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
  • presence technology - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
  • presentation layer - Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.
  • presentation management - Presentation management is the supervised creation, distribution, updating and publishing of messages and visuals in presentations across an entire enterprise.
  • presentation software (presentation graphics) - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.
  • Presidential Policy Directive 21 (PPD-21) - Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure.
  • press kit - A press kit is an information package provided for members of the media to promote events, organizations, products or candidates.
  • pressure sensor - A pressure sensor is a device that detects a force exerted on a surface (pressure) and converts it to an electronic signal whose strength is relative to the strength of the force.
  • Pretty Good Privacy (PGP) - Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
  • Pretty Please mode - Pretty Please mode is a feature added to require the use of “please” and “thank you” in voice commands for Google Assistant as used on Android devices and Google Home.
  • prettyprint - Prettyprint is the process of converting and presenting source code or other objects in a legible and attractive way.
  • preventive health - Preventive health is the use of recognized proactive health screenings, counseling and maintenance to prevent future illness and treatment.
  • preventive maintenance - Preventive maintenance is the practice of routinely taking measures in hardware administration that reduces the risk of failures and improves the likelihood of quick recovery in the event that a failure does occur.
  • primary key (primary keyword) - A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.
  • primary storage (main storage) - Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use and critical for an organization’s operations.
  • prime contract - A prime contract is any contract or contractual action that is awarded directly to a contractor by the U.
  • prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.
  • primitive - In computer programming, a primitive (pronounced PRIH-muh-teev) is a basic interface or segment of code that can be used to build more sophisticated program elements or interfaces.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • print bed - A print bed is the surface on a 3D printer where a print head lays down the materials that make up a 3D print.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close