Browse Definitions :

Browse Definitions by Alphabet

PEB - PER

  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • pebi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.
  • PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.
  • PECR - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer botnet (P2P botnet) - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.
  • peer-to-peer computing - Definition: Learn what peer-to-peer (P2P) means and how the P2P communication model allows each network node to be both a client and a server.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • peercasting - Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.
  • peering - Peering is the arrangement of traffic exchange between Internet service providers (ISPs).
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.
  • Pel - The term pel has been replaced by pixel, another contraction of "picture element.
  • Peltier effect - The Peltier effect is a temperature difference created by applying a voltage between two electrodes connected to a sample of semiconductor material.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen test - Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  • pen test (penetration testing) - Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • penetration testing - Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  • penguin - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • Pentium - Also see the Pentium MMX and the Pentium 3.
  • Pentium 3 - The Pentium III is a microprocessor designed by Intel as a successor to its Pentium II.
  • Pentium 4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • Pentium 4 (P4) - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • PeopleSoft eProcurement - PeopleSoft eProcurement is a component of Oracle’s Supplier Relationship Management (SRM) product group that enables self-service for requisition and other procurement tasks.
  • per cent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • per cent symbol (%) - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • per mil symbol - The per mil symbol is used in mathematics, and especially in economics, to indicate parts per thousand.
  • percent - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent change - Percent change -- also known as percent difference.
  • percent change (percent difference) - Percent change -- also known as percent difference.
  • percent change calculator - A calculator for finding percent increase and percent decrease - percent change.
  • percent difference - Percent change -- also known as percent difference.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • percent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • perfect RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.
  • performance - Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, (MIPS) - millions of instructions per second) during a benchmark test.
  • performance and accountability reporting - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • performance crime - A performance crime is an illegal act that is committed with the intention of being witnessed by an audience or seeking an audience afterwards.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • perigee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.
  • perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • periodic inventory system - A periodic inventory system is a mechanism for measuring the level of inventory and the cost of goods sold (COGS) by using an occasional physical count.
  • peripheral - A peripheral (pronounced peh-RIHF-uh-ruhl, a noun truncation of peripheral device, ) is any computer device that is not part of the essential computer (the processor, memory, and data paths) but is situated relatively close by.
  • Peripheral Component Interconnect - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • Peripheral Component Interconnect Extended - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • peripheral drift illusion - The peripheral drift illusion is a perception of movement in a static image; the illusion is caused by the brain’s interpretation of patterns seen outside of the eye’s area of focus.
  • perishable data - Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.
  • Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.
  • permanent data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • permanent virtual circuit - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permanent virtual circuit (PVC) - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permeability - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability (magnetic permeability) - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability of free space - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • Permission Marketing - Permission marketing is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
  • permittivity - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity (electric permittivity) - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity of free space - The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.
  • perpetual inventory system - A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.
  • persistent desktop - A persistent desktop is a virtual desktop that maintains user settings and data so that each time a user logs into their virtual desktop, all of their personalized settings, files and data appear.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • Personal Access Communications System - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • Personal Access Communications System (PACS) - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • personal area network - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal cloud storage - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal communications service - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal communications services - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • personal computer - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • Personal Computer - Disk Operating System - Also see DOS.
  • Personal Computer Disk Operating System - Also see DOS.
  • Personal Computer Memory Card International Association - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • Personal Computer Memory Card International Association (PCMCIA) - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • Personal Computer Memory Card International Association card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.
  • Personal Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • personal digital assistant - Personal digital assistants were the precursors to smartphones.
  • personal digital assistant (PDA) - Personal digital assistants were the precursors to smartphones.
  • personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.
  • personal firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • personal firewall (desktop firewall) - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.
  • Personal Handyphone System - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.
  • Personal Handyphone System (PHS) - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close