Browse Definitions :

Browse Definitions by Alphabet

PLU - POP

  • plug-in - Plug-in applications are programs that can easily be installed and used as part of your Web browser.
  • plug-in hybrid electric vehicle (PHEV) - A plug-in hybrid electric vehicle (PHEV) is a type of hybrid electric vehicle that combines a gasoline or diesel engine with an electric motor and a large battery, which can be recharged by plugging it into an electrical outlet or charging stations.
  • PLUGE pattern - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.
  • PLUGE pattern (picture line-up generation equipment pattern) - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.
  • Plundervolt - Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.
  • plus minus interesting - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.
  • Plutchik's wheel of emotions - Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.
  • PM - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.
  • PMI (plus, minus, interesting) retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.
  • PMI retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.
  • PML - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).
  • PMML - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.
  • PMO - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.
  • PMO (project management office) - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.
  • PMP - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • PMS - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • pneumatics - Pneumatics (pronounced new-MATT-ix) is an aspect of physics and engineering that is concerned with using the energy in compressed gas to make something move or work.
  • pNFS (Parallel NFS) - The Parallel Network File System (pNFS) is part of the NFS v4.
  • PNG - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • PnP - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.
  • POC - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.
  • pod slurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
  • podcast - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • podcaster - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • podcasting - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • Podcasting Terms: Glossary - This glossary of podcasting terms defines the most common technologies and concepts that anyone will encounter in creating or consuming podcasts.
  • podosphere - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • podslurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
  • PoE - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
  • point - A point is a standard measurement unit for type sizes.
  • point (type) - A point is a standard measurement unit for type sizes.
  • point cloud - A point cloud is a collection of data points defined by a given coordinates system.
  • point of care (POC) testing - Point of care (POC) testing is medical testing that is performed outside of a laboratory setting.
  • point of presence - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • point of sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • point of sale platform - A point of sale platform is software that supports the completion of a retail transaction.
  • point of sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point release - A point release is a small or relatively minor software release that fixes or improves an existing software product.
  • point to point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • Point to Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.
  • Point to Point Protocol over Ethernet - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
  • Point to Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • point-in-time snapshot (PIT snapshot) - Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time.
  • point-of-presence - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • point-of-sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • point-of-sale security (POS security) - Point-of-sale security (POS security) is the study of vulnerabilities in retail checkout points and prevention of access by unauthorized parties looking to steal customer and payment card details from them.
  • point-of-sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point-of-sale terminal (POS terminal) - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point-to-point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • point-to-point graph (line graph) - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • Point-to-Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.
  • Point-to-Point Protocol over Ethernet - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
  • Point-to-Point Protocol over Ethernet (PPPoE) - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
  • Point-to-Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • pointing stick - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • PoIP - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.
  • poison mailbox - A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.
  • poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocol, poison reverse is a loop avoidance process.
  • poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • polarity - Polarity is a term used in electricity, magnetism, and electronic signaling.
  • polarization - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
  • polarization (wave polarization) - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
  • Policy Analysis of Internet Routing - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • policy-based management - Policy-based management is an administrative approach that is used to simplify the management of a given endeavor by establishing policies to deal with situations that are likely to occur.
  • policy-based networking - Policy-based networking is the management of a network so that various kinds of traffic - data, voice, and video - get the priority of availability and bandwidth needed to serve the network's users effectively.
  • Polish logic - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.
  • polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.
  • POLP - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
  • polyLED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED (light-emitting polymer or polyLED) - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
  • polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.
  • polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.
  • polynomial versus nondeterministic polynomial - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • pomodoro technique - The pomodoro technique is designed to help users use their time more effectively by overcoming tendencies to procrastinate and multitask, both of which impair productivity.
  • PON - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • POODLE (Padding Oracle On Downgraded Legacy Encryption) - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.
  • POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
  • POP - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • POP 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • pop up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • sandbox (software testing and security)

    A sandbox is an isolated testing environment that enables users to run programs or open files without affecting the application, ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close