Browse Definitions :

Browse Definitions by Alphabet

POL - POU

  • Polish logic - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.
  • polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.
  • POLP - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
  • polyLED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED (light-emitting polymer or polyLED) - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
  • polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.
  • polynomial - A polynomial is a mathematical expression consisting of a sum of terms, each term including a variable or variables raised to a power and multiplied by a coefficient.
  • polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.
  • polynomial versus nondeterministic polynomial - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • pomodoro technique - The pomodoro technique is designed to help users use their time more effectively by overcoming tendencies to procrastinate and multitask, both of which impair productivity.
  • PON - A passive optical network (PON) is a system that brings optical fiber cabling and signals all or most of the way to the end user.
  • POODLE (Padding Oracle On Downgraded Legacy Encryption) - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.
  • POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
  • POP - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • POP 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • pop up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • pop-up transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • POP3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • population - In statistics and other areas of mathematics, a population is a complete collection of entities or items that has at least one characteristic in common.
  • population health management (PHM) - Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.
  • PoR - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.
  • port - A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • port 9875 (port of doom) - Port 9875 is a port often associated with setting up VoIP communications.
  • Port Address Translation - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
  • port interface card - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.
  • port layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • port mirroring - Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.
  • port mirroring (roving analysis port) - Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • port redirector - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
  • portability - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
  • portable - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
  • portable app - A portable application (portable app) is a software product designed to be easily moved from one computing environment to another.
  • portable computer - A portable computer is a personal computer that is designed to be easily transported and relocated, but is larger and less convenient to transport than a notebook computer.
  • Portable Document Format - PDF is also an abbreviation for the Netware Printer Definition File.
  • Portable Document Format (PDF) - PDF is also an abbreviation for the Netware Printer Definition File.
  • portable keyboard - A portable keyboard (or handheld keyboard) is one that is designed to be used with wireless devices, such as personal digital assistants (PDAs) and smartphones.
  • portable keyboard (handheld keyboard) - A portable keyboard (or handheld keyboard) is one that is designed to be used with wireless devices, such as personal digital assistants (PDAs) and smartphones.
  • Portable Network Graphics - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • Portable Operating System Interface - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • Portal Markup Language - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).
  • Portal of Doom - Portal of Doom (abbreviated as PoD and sometimes spelled all one word, as PortalOfDoom) is a Trojan horse that hijacks the computers of unsuspecting Windows users running old operating systems.
  • Porter's Five Forces - Porter's Five Forces is a framework developed by economist Michael E.
  • porting - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.
  • portmanteau - A portmanteau is a word created from two other words, or parts of words, that both contribute to its meaning.
  • portrait - In computer printing, portrait is a mode in which the printer orients content for reading across the shorter length (the width) of the sheet of paper.
  • POS - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • POS - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • POS data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • POS malware (point-of-sale malware) - Point-of-sale malware (POS malware) is malicious software expressly written to steal customer payment data -- especially credit card data -- from retail checkout systems.
  • POS scanner - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • POS terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • positioning - Positioning, in a marketing context, is the process of identifying an appropriate market niche for a product, service or brand and getting it established it in that area.
  • positioning statement - A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t.
  • positive correlation - A positive correlation is a relationship between two variables such that their values increase or decrease together.
  • positron - A positron is a particle of matter with the same mass as an electron but an opposite charge.
  • POSIX - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
  • POSIX (Portable Operating System Interface) - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
  • possession factor - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.
  • POST - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.
  • POST (Power-On Self-Test) - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.
  • Post Office Protocol 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • post processing deduplication - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.
  • post-processing deduplication - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.
  • post-processing deduplication (PPD) - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.
  • post-quantum cryptography - Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers.
  • postfix notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • PostgreSQL - PostgreSQL (pronounced "post-gress-Q-L") is an open source relational database management system (DBMS) developed by a worldwide team of volunteers.
  • Postscript - Postscript is a programming language that describes the appearance of a printed page.
  • Postscript - A WhatIs.com tech vocabulary quiz.
  • Postscript Printer Description file - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
  • potential energy - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
  • potential energy (U) - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
  • potentially unwanted program - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • POTS - POTS is a term sometimes used in discussion of new telephone technologies in which the question of whether and how existing voice transmission for ordinary phone communication can be accommodated.
  • pounds per square inch (PSI) - PSI is commonly used to measure the pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure).
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close