Browse Definitions :

Browse Definitions by Alphabet

PER - PER

  • percent change (percent difference) - Percent change -- also known as percent difference.
  • percent change calculator - A calculator for finding percent increase and percent decrease - percent change.
  • percent difference - Percent change -- also known as percent difference.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • percent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • perfect RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.
  • performance - Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, (MIPS) - millions of instructions per second) during a benchmark test.
  • performance and accountability reporting - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • performance crime - A performance crime is an illegal act that is committed with the intention of being witnessed by an audience or seeking an audience afterwards.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • perigee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.
  • perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • periodic inventory system - A periodic inventory system is a mechanism for measuring the level of inventory and the cost of goods sold (COGS) by using an occasional physical count.
  • peripheral - A peripheral (pronounced peh-RIHF-uh-ruhl, a noun truncation of peripheral device, ) is any computer device that is not part of the essential computer (the processor, memory, and data paths) but is situated relatively close by.
  • Peripheral Component Interconnect - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Peripheral Component Interconnect Extended - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • peripheral drift illusion - The peripheral drift illusion is a perception of movement in a static image; the illusion is caused by the brain’s interpretation of patterns seen outside of the eye’s area of focus.
  • perishable data - Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.
  • Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.
  • permanent data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • permanent virtual circuit - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permanent virtual circuit (PVC) - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permeability - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability (magnetic permeability) - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability of free space - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permittivity - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity (electric permittivity) - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity of free space - The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.
  • perpetual inventory system - A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • Personal Access Communications System - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • Personal Access Communications System (PACS) - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • personal area network - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal cloud storage - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal communications service - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal communications services - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal computer - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • Personal Computer - Disk Operating System - Also see DOS.
  • Personal Computer Disk Operating System - Also see DOS.
  • Personal Computer Memory Card International Association - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • Personal Computer Memory Card International Association card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.
  • Personal Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • personal digital assistant - Personal digital assistants were the precursors to smartphones.
  • personal digital assistant (PDA) - Personal digital assistants were the precursors to smartphones.
  • personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.
  • personal firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • Personal Handyphone System - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.
  • Personal Handyphone System (PHS) - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.
  • personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • personal health record - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • Personal Home Page - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • Personal Home Page (PHP) - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personal identity verification card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • Personal Java - Now considered a Sun legacy product, PersonalJava is or was a software development platform for creating network-capable applications for various consumer devices for office, home, and mobile use.
  • personal operating space - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal portal - A bookmark portal is a free application service provider (ASP) Web site that allows registered users to save "bookmark" (Netscape) or "favorite" (Internet Explorer) Web links so that they can be accessed at any time from any Internet-connected device.
  • Personal Response System - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • Personal Response System (PRS) - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • Personal Search Syndication - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • Personal Search Syndication (PSS) - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • personal supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • personal TV receiver - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video station - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal virtual machine - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM (personal virtual machine or PVM) - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • Personal Web Server - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • Personality Test: What kind of geek are you? - A WhatIs.com geek personality test.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.
  • personally identifiable financial information - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable financial information (PIFI) - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable information - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • PERT - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT/CPM - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • pervasive computing - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close