Browse Definitions :

Browse Definitions by Alphabet

PER - PHA

  • performance crime - A performance crime is an illegal act that is committed with the intention of being witnessed by an audience or seeking an audience afterwards.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • perigee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.
  • perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • periodic inventory system - A periodic inventory system is a mechanism for measuring the level of inventory and the cost of goods sold (COGS) by using an occasional physical count.
  • Peripheral Component Interconnect - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Peripheral Component Interconnect Extended - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • peripheral drift illusion - The peripheral drift illusion is a perception of movement in a static image; the illusion is caused by the brain’s interpretation of patterns seen outside of the eye’s area of focus.
  • perishable data - Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.
  • Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.
  • permanent data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • permanent virtual circuit - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permanent virtual circuit (PVC) - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permeability - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability (magnetic permeability) - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability of free space - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permittivity - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity (electric permittivity) - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity of free space - The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.
  • perpetual inventory system - A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • Personal Access Communications System - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • Personal Access Communications System (PACS) - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • personal area network - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal cloud storage - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal communications service - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal communications services - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal computer - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • Personal Computer - Disk Operating System - Also see DOS.
  • Personal Computer Disk Operating System - Also see DOS.
  • Personal Computer Memory Card International Association - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • Personal Computer Memory Card International Association card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.
  • Personal Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • personal digital assistant - Personal digital assistants were the precursors to smartphones.
  • personal digital assistant (PDA) - Personal digital assistants were the precursors to smartphones.
  • personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.
  • personal firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • Personal Handyphone System - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.
  • Personal Handyphone System (PHS) - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.
  • personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • personal health record - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • Personal Home Page - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • Personal Home Page (PHP) - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personal identity verification card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • Personal Java - Now considered a Sun legacy product, PersonalJava is or was a software development platform for creating network-capable applications for various consumer devices for office, home, and mobile use.
  • personal operating space - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal portal - A bookmark portal is a free application service provider (ASP) Web site that allows registered users to save "bookmark" (Netscape) or "favorite" (Internet Explorer) Web links so that they can be accessed at any time from any Internet-connected device.
  • Personal Response System - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • Personal Search Syndication - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • personal supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • personal TV receiver - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video station - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal virtual machine - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM (personal virtual machine or PVM) - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • Personal Web Server - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • Personality Test: What kind of geek are you? - A WhatIs.com geek personality test.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.
  • personally identifiable financial information - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable financial information (PIFI) - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable information - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • PERT - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT/CPM - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • pervasive computing - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive gaming - Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.
  • pervasive Wi-Fi - Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.
  • petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • Peter principle - The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.
  • pF/m - The picofarad per meter (symbolized pF/m) is a unit of electric permittivity, a constant of proportionality that exists between electric displacement and electric field intensity.
  • PFC - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • PFC (power factor correction or power factor controller) - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • PGP - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • pharma hack - The pharma hack is an exploit that takes advantage of vulnerabilities in WordPress or Joomla documents, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings.
  • pharmaceutical detailing - Detailing is a marketing technique used by pharmaceutical companies wherein a pharmaceutical representative visits and attempts to persuade a doctor to prescribe a certain company’s product more often.
  • pharmacovigilance - pharmacovigilance.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phase - In electronic signaling, phase is a definition of the position of a point in time (instant) on a waveform cycle.
  • Phase Alternation Line - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close