Browse Definitions :

Browse Definitions by Alphabet

P - PAR

  • P and NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • P equals NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • P Ink - Photonic ink (P-Ink) is a substance that can change color electronically.
  • p ram - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.
  • P versus NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • P versus NP (polynomial versus nondeterministic polynomial) - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • P-Ink - Photonic ink (P-Ink) is a substance that can change color electronically.
  • P/390 - The P/390 is basically an IBM mainframe system adapted to run on a personal computer.
  • P/E cycle - A solid-state-storage program-erase cycle is a sequence of events in which data is written to solid-state NAND flash memory cell (such as the type found in a so-called flash or thumb drive), then erased, and then rewritten.
  • P2P - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • P2P - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • P2P - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
  • P2P model (peer-to-peer model) - The peer-to-peer model (P2P model) is a non-hierarchical system of exchange, transfer or transmission.
  • P2V - Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.
  • P3P - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.
  • P3P (Platform for Privacy Preferences) - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.
  • P4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • P4P - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.
  • P4P (proactive provider participation for P2P) - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.
  • PA DSS - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.
  • PA-DSS - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.
  • PA-DSS (Payment Application Data Security Standard) - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.
  • PaaS - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • PaaS (platform as a service) - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • PABX - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.
  • package management system - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • package manager - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • package manager or package management system (PMS) - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • packet analyzer - A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity.
  • packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
  • packet filter - On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols.
  • packet filtering - On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols.
  • Packet Hound - PacketHound is a product that aims to help an enterprise regulate traffic that might otherwise slow services down for all users of a local area network.
  • Packet Level Procedure - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.
  • packet loss - Packet loss is the failure of one or more transmitted packets to arrive at their destination.
  • packet loss concealment - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.
  • packet loss concealment (PLC) - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.
  • packet monkey - On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
  • Packet Order Correction - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • Packet Order Correction (POC) - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • packet shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.
  • packet switching - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
  • packet writing - Packet writing is a technology that enables the writing of data to a recordable compact disk (CD-R) incrementally, in multiple small blocks of data, rather than in a single block (as in disk-at-once recording), or in blocks defined by tracks (as in track-at-once recording), the other two common methods.
  • Packet-Level Procedure - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.
  • packet-switched - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
  • packet-switching - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
  • PACS - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • PACS - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.
  • PACS (picture archiving and communication system) - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.
  • page - On the World Wide Web, a page is a file notated with the Hypertext Markup Language (HTML).
  • page authority (Web page authority) - Page authority, in search engine optimization (SEO), is the value a search engine assigns a Web page.
  • page description language - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • page description language (PDL) - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • page file - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
  • pagefile - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • pagejacking - Pagejacking is stealing the contents of a Web site by copying some of its pages, putting them on a site that appears to be the legitimate site, and then inviting people to the illegal site by deceptive means - for example, by having the contents indexed by major search engines whose results in turn link users to the illegal site.
  • pager - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.
  • PageRank - PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP).
  • pages per minute - In printing, PPM is an abbreviation that stands for "pages per minute.
  • pagination - Pagination is the process of separating content into discrete pages.
  • paging - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.
  • paging - Paging is a function of memory management where a computer will store and retrieve data from a device’s secondary storage to the primary storage.
  • paid inclusion - Paid inclusion is a search engine marketing model in which Web site owners pay a search engine company to guarantee their sites will show up in search results.
  • paid prioritization - Paid prioritization, in relation to the internet, is the optimization of data transfer rates for certain content providers, websites and web services.
  • PAIR - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • pair programming - Pair programming is an Agile technique originating from XP in which two developers team together and work on one computer.
  • PAL - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.
  • Paladion - Paladion Networks is a Bengaluru, India-based provider of information security products and services.
  • palette - Lynda Weinman's 216-color palette for Mac and Windows browsers For actual RGB values to specify, see our table containing the 216-Color Browser-Safe Palette.
  • Palladium - Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level.
  • Palm - Palm is the trade name for a popular personal digital assistant (PDA), a form of handheld device that is also known as a palmtop computer.
  • Palm Operating System - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.
  • Palm OS - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.
  • Palm OS (Palm Operating System) - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.
  • palm print recognition - Palm print recognition is a biometric authentication method based on the unique patterns of various characteristics in the palms of people’s hands.
  • palm vein recognition - Palm vein recognition is a biometric authentication method based on the unique patterns of veins in the palms of people’s hands.
  • PAM - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • PAN - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • pan - pan: In a video, context, panning is the sweeping movement of a camera across a scene or the appearance of such movement in a video as created by EditDV's PZR filter.
  • pan (video) - pan: In a video, context, panning is the sweeping movement of a camera across a scene or the appearance of such movement in a video as created by EditDV's PZR filter.
  • pan setting - A pan setting, in an audio context, is the setting that determines how audio output is divided between left and right speakers.
  • PAN truncation - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.
  • PAN truncation (primary account number) - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.
  • Panasas - Panasas is a scale-out NAS (network-attached storage) vendor that produces hardware and software for demanding technical and enterprise environments.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • panel - In computer program development, a panel is a representation of what information will be sent to a user's display screen in given circumstances.
  • Pango - Pango is an open source project dedicated to creating a Unicode framework for rendering international text.
  • Panther - Panther was the code name for Mac OS version 10.
  • PAP - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.
  • paper battery - A paper battery is a flexible, ultra-thin energy production and storage device formed by combining carbon nanotubes with a conventional sheet of cellulose-based paper.
  • paperless office - Paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.
  • Paperwork Reduction Act - The Paperwork Reduction Act is a U.
  • PAR - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • paradigm - A paradigm (pronounced PEHR-uh-daim, from Greek paradeiknyai - to show side by side) is a pattern or an example of something.
  • paradox - A paradox is a statement or concept that contains conflicting ideas.
  • paradox of choice - The paradox of choice is an observation that having many options to choose from, rather than making people happy and ensuring they get what they want, can cause them stress and problematize decision-making.
  • parallax - Parallax is the way an object�s position or direction changes, depending on viewing angle.
  • parallel - In the context of the Internet and computing, parallel means more than one event happening at a time.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close