Browse Definitions :

Browse Definitions by Alphabet

PAR - PC

  • parent company - A parent company is a corporation that has subsidiaries, which are wholly or partially-owned separate businesses controlled by the parent.
  • parent partition - A parent partition is a logical hard drive division in the Microsoft Hyper-V environment that's responsible for running the hypervisor layer and creating and managing child partitions.
  • Pareto chart - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto distribution diagram - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto efficiency - Pareto efficiency is a balance of resource distribution such that one individual’s lot cannot be improved without impairing the lot of another individual.
  • Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.
  • Paris Agreement - The Paris Agreement is an international treaty that seeks to reduce the emission of greenhouse gases.
  • parity - Parity is a method of detecting errors in data transmissions between computers, while parity bit and parity checking are used in RAID technology to guard against data loss.
  • Parkinson's law - Cyril Northcote Parkinson observed that "work expands so as to fill the time available for its completion" in a 1955 essay published in "The Economist" based on his experience in the British Civil Service.
  • Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation that people tend to waste a lot of time attending to unimportant details while crucial matters don't get the attention they require.
  • parser - In computer technology, a parser is a program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and their attributes or options) that can then be managed by other programming (for example, other components in a compiler).
  • parsing - In computer technology, a parser is a program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and their attributes or options) that can then be managed by other programming (for example, other components in a compiler).
  • part-of-speech tagger (PoS tagger) - A part of speech (PoS) tagger is a software tool that labels words as one of several categories to identify the word's function in a given language.
  • partition - Partitioning a hard disk drive is the first step in preparing it for data storage.
  • partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.
  • partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.
  • partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.
  • partner relationship management - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.
  • partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.
  • partner specialization - A partner specialization is a designation achieved when a value-added reseller, integrator or solution provider has demonstrated a particular expertise specified by its vendor.
  • partnership - In a partnership, all profits and losses pass through to partners and are reported on their individual tax returns.
  • Pascal - Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.
  • pascal - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).
  • pascal (unit of pressure or stress) - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).
  • Pascal case - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
  • pass phrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.
  • pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
  • passenger name record (PNR) - A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together.
  • passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.
  • Passive Candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • passive keyless entry (PKE) - Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle.
  • passive optical network - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.
  • passive scanning - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.
  • passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.
  • passive solar - Passive solar is the use of the sun’s energy directly for either heating or cooling purposes.
  • passphrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.
  • password - A password is a string of characters used to verify the identity of a user during the authentication process.
  • password blacklist - A password blacklist is a list of words disallowed as user passwords due to their commonplace use.
  • password chaos - Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
  • password cracking - A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources.
  • password cracking - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.
  • password entropy - Password entropy is a measurement of how unpredictable a password is.
  • password hardening - Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process.
  • password strength meter - A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user.
  • passwordless authentication - Passwordless authentication is a verification process that determines whether someone is, in fact, who they say they are without requiring the person to manually enter a string of characters.
  • Pasta Theory - The Pasta Theory of Programming is the idea that various programming structures can be likened to the structures of well-known pasta dishes.
  • pastebin - A pastebin is a Web application that allows users to upload and share text online.
  • PASV FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.
  • PAT - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • PATA - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
  • patch - A software patch or fix helps resolve issues that crop up in different programs.
  • patch cable - A patch cord is a length of cable, with connectors on the ends, that is used to connect an end device to something else, such as a power source.
  • patch management - Patch management is an area of systems management that involves acquiring, testing and installing multiple patches, or code changes, to an administered computer system.
  • patch panel - A network patch panel is a mounted hardware unit containing ports used to interconnect and manage LAN cables as well as connect them to the internet and wide area networks.
  • Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system (OS) and other Microsoft software.
  • patent - A patent is a government-awarded license that grants the inventor of a product or process exclusive rights to its manufacture, use or sale for a specified time period.
  • patent troll - A patent troll is an individual or an organization that purchases and holds patents for unscrupulous purposes such as stifling competition or launching patent infringement suits.
  • paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they members of a large, extended family.
  • Path Computation Element Protocol (PCEP) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route by applying computational constraints in real time.
  • path control - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • path to profitability - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • path to profitability (P2P) - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • pathing - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • pathing (path control) - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • pathological computer use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • pathological Internet use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • patient engagement - Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in their own medical care.
  • patient matching - Patient matching is a process of comparing data from different health IT systems to see if data sources match and belong to the same patient to obtain a complete record of the patient’s health history and medical care.
  • patient portal - A patient portal is a web-based access point that enables self-serve health IT services for patients.
  • patient record locator - A patient record locator is a computer service that allows doctors and nurses to obtain a patient’s electronic health records including electronic medical records, ambulatory medical record and prescription data.
  • patient similarity - Patient similarity is the concept of researching the best treatments and the ones to avoid based on the records of like individuals with like health conditions.
  • patient-generated health data (PGHD) - Patient-generated health data (PGHD) is data created, recorded or gathered by or from patients, family members or caregivers to help address a medical concern.
  • pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • pattern (design pattern) - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.
  • pay for performance (P4P) - Pay for performance (P4P), in healthcare, is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
  • pay for privacy - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access.
  • pay per click fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • pay per use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • pay-as-you-go cloud computing (PAYG cloud computing) - The pay-as-you-go cloud computing (PAYG cloud computing) method charges users only for the services they use, eliminating wasted resources.
  • pay-as-you-grow pricing - Vendors that offer a pay-as-you-grow storage allow customers with growing environments to acquire capacity after an array has been installed through the purchase of licenses.
  • pay-per-click fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • pay-per-use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • pay-per-view - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.
  • payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.
  • Payment Application Data Security Standard - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.
  • Payment Card Industry (PCI) - The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.
  • payment card industry compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • Payment Card Industry Data Security Standard - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.
  • payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
  • PayPhrase - Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.
  • payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.
  • PBD - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.
  • PBX - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • PC - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

Close