Browse Definitions :

Browse Definitions by Alphabet

PAR - PAT

  • paradox - A paradox is a statement or concept that contains conflicting ideas.
  • paradox of choice - The paradox of choice is an observation that having many options to choose from, rather than making people happy and ensuring they get what they want, can cause them stress and problematize decision-making.
  • parallax - Parallax is the way an object�s position or direction changes, depending on viewing angle.
  • parallel - In the context of the Internet and computing, parallel means more than one event happening at a time.
  • parallel adoption - Parallel adoption is a method of hardware or software migration that involves using the existing and new systems simultaneously until the implementation is judged to be complete and satisfactory.
  • Parallel Advanced Technology Attachment - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
  • Parallel ATA - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
  • Parallel ATA (Parallel Advanced Technology Attachment or PATA) - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
  • parallel file system - In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed logically for storage and retrieval.
  • parallel file system - A parallel file system is a software component designed to store data across multiple networked servers and to facilitate high-performance access through simultaneous, coordinated input/output operations (IOPS) between clients and storage nodes.
  • parallel I/O - Parallel I/O is a way of performing multiple input/output operations concurrently, rather than serially.
  • parallel presence detect - Parallel presence detect (PPD) is a method of using resistors to communicate a memory module's speed and density to the basic input/output system (BIOS) when a computer boots (starts or restarts).
  • parallel presence detect (PPD) - Parallel presence detect (PPD) is a method of using resistors to communicate a memory module's speed and density to the basic input/output system (BIOS) when a computer boots (starts or restarts).
  • parallel processing - Parallel processing is a method in computing of running two or more processors (CPUs) to handle separate parts of an overall task.
  • parallel processing software - Parallel processing software manages the execution of a program on parallel processing hardware with the objectives of obtaining unlimited scalability (being able to handle an increasing number of interactions at the same time) and reducing execution time.
  • parallel sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
  • Parallel Virtual Machine - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.
  • Parallel Virtual Machine (PVM) - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.
  • Parallels - Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.
  • Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that can replicate a native user experience for guest applications and operating systems on Apple Mac computers.
  • parameter - In information technology, a parameter (pronounced puh-RAA-meh-tuhr, from Greek for, roughly, through measure) is an item of information - such as a name, a number, or a selected option - that is passed to a program by a user or another program.
  • parameter RAM - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.
  • parameter RAM (PRAM or parameter random access memory) - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.
  • parameter random access memory - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.
  • parameter tampering - Parameter tampering is a form of Web-based hacking event (called an attack) in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization.
  • paravirtualization - Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.
  • PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley.
  • Pardot - Pardot is a software as a service (SaaS) marketing automation platform by SalesForce offering email automation, targeted email campaigns and lead management for B2B sales and marketing organizations.
  • parent company - A parent company is a corporation that has subsidiaries, which are wholly or partially-owned separate businesses controlled by the parent.
  • parent partition - A parent partition is a logical hard drive division in the Microsoft Hyper-V environment that's responsible for running the hypervisor layer and creating and managing child partitions.
  • Pareto chart - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto distribution diagram - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto efficiency - Pareto efficiency is a balance of resource distribution such that one individual’s lot cannot be improved without impairing the lot of another individual.
  • Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.
  • Paris Agreement - The Paris Agreement is an international treaty that seeks to reduce the emission of greenhouse gases.
  • parity - Parity is a method of detecting errors in data transmissions between computers, while parity bit and parity checking are used in RAID technology to guard against data loss.
  • Parkinson's law - Cyril Northcote Parkinson observed that "work expands so as to fill the time available for its completion" in a 1955 essay published in "The Economist" based on his experience in the British Civil Service.
  • Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation that people tend to waste a lot of time attending to unimportant details while crucial matters don't get the attention they require.
  • Parlay - Parlay (pronounced PAHR-LAY as in the French verb "parler" - to speak) is an evolving set of specifications for industry-standard application programming interfaces (APIs) for managing network "edge" services such as call control, messaging, and content-based charging.
  • parse - To parse is to analyze something in an orderly way.
  • parser - In computer technology, a parser is a program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and their attributes or options) that can then be managed by other programming (for example, other components in a compiler).
  • part-of-speech tagger (PoS tagger) - A part of speech (PoS) tagger is a software tool that labels words as one of several categories to identify the word's function in a given language.
  • partition - Partitioning a hard disk drive is the first step in preparing it for data storage.
  • partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.
  • partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.
  • partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.
  • partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.
  • partner specialization - A partner specialization is a designation achieved when a value-added reseller, integrator or solution provider has demonstrated a particular expertise specified by its vendor.
  • partnership - In a partnership, all profits and losses pass through to partners and are reported on their individual tax returns.
  • pascal - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).
  • Pascal - Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.
  • pascal (unit of pressure or stress) - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).
  • Pascal case - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
  • pass phrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.
  • pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
  • passenger name record (PNR) - A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together.
  • passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.
  • Passive Candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • passive FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.
  • passive keyless entry (PKE) - Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle.
  • passive optical network (PON) - A passive optical network (PON) is a system that brings optical fiber cabling and signals all or most of the way to the end user.
  • passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.
  • passive scanning - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.
  • passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.
  • passive solar - Passive solar is the use of the sun’s energy directly for either heating or cooling purposes.
  • passphrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.
  • password - A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.
  • password blacklist - A password blacklist is a list of words disallowed as user passwords due to their commonplace use.
  • password chaos - Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
  • password cracker - A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources.
  • password cracking - A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources.
  • password entropy - Password entropy is a measurement of how unpredictable a password is.
  • password hardening - Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process.
  • password strength meter - A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user.
  • password synchronization - Password synchronization is an authentication process that coordinates user passwords across various computers and computing devices so a user only has to remember a single password instead of multiple passwords for different machines or devices.
  • passwordless authentication - Passwordless authentication is a verification process that determines whether someone is, in fact, who they say they are without requiring the person to manually enter a string of characters.
  • Pasta Theory - The Pasta Theory of Programming is the idea that various programming structures can be likened to the structures of well-known pasta dishes.
  • Pasta Theory of Programming - The Pasta Theory of Programming is the idea that various programming structures can be likened to the structures of well-known pasta dishes.
  • pastebin - A pastebin is a Web application that allows users to upload and share text online.
  • PASV FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.
  • PAT - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • PATA - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.
  • patch - A software patch or fix helps resolve issues that crop up in different programs.
  • patch antenna - A patch antenna is a wafer-like directional antenna suitable for covering single-floor small offices, small stores and other indoor locations where access points cannot be placed centrally.
  • patch cable - A patch cord is a length of cable, with connectors on the ends, that is used to connect an end device to something else, such as a power source.
  • patch cord - A patch cord is a length of cable, with connectors on the ends, that is used to connect an end device to something else, such as a power source.
  • patch management - Patch management is an area of systems management that involves acquiring, testing and installing multiple patches, or code changes, to an administered computer system.
  • patch Matrix - A patch Matrix, in a video context, is the display in the Monitors window that identifies video and audio tracks in the current source clip and the available tracks in the Sequencer window.
  • patch panel - A network patch panel is a mounted hardware unit containing ports used to interconnect and manage LAN cables as well as connect them to the internet and wide area networks.
  • Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's scheduled release of the newest security fixes for its Windows operating system and related software applications, as detailed in the Windows Security Updates Guide.
  • patent - A patent is a government-awarded license that grants the inventor of a product or process exclusive rights to its manufacture, use or sale for a specified time period.
  • patent troll - A patent troll is an individual or an organization that purchases and holds patents for unscrupulous purposes such as stifling competition or launching patent infringement suits.
  • paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they members of a large, extended family.
  • path - In a computer operating system, a path is the route through a file system to a particular file.
  • Path Computation Element (PCE) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route based on a network graph.
  • Path Computation Element Protocol (PCEP) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route by applying computational constraints in real time.
  • path control - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • path to profitability - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close