Browse Definitions :

Browse Definitions by Alphabet

PER - PHO

  • personal health record - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • Personal Home Page (PHP) - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personal identity verification card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • Personal Java - Now considered a Sun legacy product, PersonalJava is or was a software development platform for creating network-capable applications for various consumer devices for office, home, and mobile use.
  • personal operating space - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • Personal Response System - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • Personal Response System (PRS) - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • Personal Search Syndication - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • Personal Search Syndication (PSS) - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • personal supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.
  • personal TV receiver - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal video station - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal virtual machine - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personal VM (personal virtual machine or PVM) - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • Personal Web Server (PWS) - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • Personality Test: What kind of geek are you? - A WhatIs.com geek personality test.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.
  • personally identifiable financial information - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable financial information (PIFI) - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable information - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • PERT - A PERT chart is a project management tool used to schedule, organize, and coordinate tasks within a project.
  • PERT chart - A PERT chart is a project management tool used to schedule, organize, and coordinate tasks within a project.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • PERT/CPM - A PERT chart is a project management tool used to schedule, organize, and coordinate tasks within a project.
  • pervasive computing - Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive gaming - Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.
  • pervasive Wi-Fi - Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.
  • petabit - A petabit is one quadrillion (1015) binary digits and is used in discussing possible volumes of data traffic per second in a large telecommunications network.
  • petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • Peter principle - The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.
  • pF/m - The picofarad per meter (symbolized pF/m) is a unit of electric permittivity, a constant of proportionality that exists between electric displacement and electric field intensity.
  • PFC - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • PFC (power factor correction or power factor controller) - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • PGP - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.
  • Ph - Ph is an Internet facility that lets you search for someone's e-mail address if their e-mail provider has a Ph server program.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • phantom dialing - In mobile wireless communication, phantom dialing is a term used to describe what occurs when a user unintentionally presses a pre-programmed auto-dial number on their cellular telephone keypad and unintentionally initiates a phone call.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • pharma hack - The pharma hack is an exploit that takes advantage of vulnerabilities in WordPress or Joomla documents, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings.
  • pharmaceutical detailing - Detailing is a marketing technique used by pharmaceutical companies wherein a pharmaceutical representative visits and attempts to persuade a doctor to prescribe a certain company’s product more often.
  • pharmacovigilance - pharmacovigilance.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phase - In electronic signaling, phase is a definition of the position of a point in time (instant) on a waveform cycle.
  • Phase Alternation Line - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.
  • Phase Alternation Line (PAL) - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.
  • phase change - Phase change is a type of compact disk (CD) recording technology that enables the disks to be written, erased, and rewritten through the use of a layer of a special material (called the phase change layer) that can be changed repeatedly from an amorphous (formless) to a crystalline state, or phase-through exposure to variably-powered laser beams.
  • phase change cooling - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.
  • PHase change Liquid EXchange - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.
  • phase change memory - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • phase locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.
  • phase modulation - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.
  • phase modulation (PM) - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.
  • phase shift keying - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • phase state low electron drive memory - PLEDM (phase-state low electron drive memory) is a new memory microchip technology that offers vastly greater capacity than memory devices commonly used in the past.
  • phase-change cooling - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.
  • phase-change cooling (vapor cooling) - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.
  • PHase-change Liquid EXchange - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.
  • phase-change memory - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • phase-change RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • phase-lock loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.
  • phase-locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.
  • phase-locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.
  • phase-shift keying - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • phase-shift keying (PSK) - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • phase-state low electron drive memory - PLEDM (phase-state low electron drive memory) is a new memory microchip technology that offers vastly greater capacity than memory devices commonly used in the past.
  • phased antenna system - .
  • phased rollout - Phased rollout is a hardware or software migration method that involves incremental implementation of a new system.
  • phaser - A phaser is an electronic sound processor, that creates a sweeping effect by modulating a narrow notch signal filter.
  • PHDSC - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • phenomenon - A phenomenon, in a scientific context, is something that is observed to occur or to exist.
  • PHI - Protected health information (PHI), also referred to as personal health information, generally refers to demographic information, medical histories, test and laboratory results, mental health conditions, insurance information, and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • PHI breach (protected health information breach) - A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.
  • phish - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • phisher - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • phishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • Phishing season (quiz) - Ah, the festive season! Carolers come a-caroling; callers come a-calling and.
  • phishing via SMS - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • phlashing - Phlashing is a permanent denial of service (PDoS) attack that exploits a vulnerability in network-based firmware updates.
  • PHOLED - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).
  • PHOLED (phosphorescent organic light-emitting device) - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).
  • Phone numbers - Resources for looking up phone numbers.
  • phosphorescent organic light emitting device - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).
  • phosphorescent organic light-emitting device - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).
  • Photo CD - Photo CD is a process from Kodak that puts film images (including scanned prints and slides) on a compact disk as digitally stored images that you can view or work with at your computer.
  • photo messaging - Picture messaging (sometimes called photo messaging) is the practice of taking a picture with a built-in camera on a mobile phone or other handheld device and sending it to another mobile device or an e-mail recipient.
  • photoconductivity - Photoconductivity is the tendency of a substance to conduct electricity to an extent that depends on the intensity of light-radiant energy (usually infrared transmission or visible light) striking the surface of a sample.
  • photocopier - A photocopier is an electronic machine that makes copies of images and documents.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close