Browse Definitions :

Browse Definitions by Alphabet

PMS - POP

  • PMS - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • pneumatics - Pneumatics (pronounced new-MATT-ix) is an aspect of physics and engineering that is concerned with using the energy in compressed gas to make something move or work.
  • pNFS (Parallel NFS) - The Parallel Network File System (pNFS) is part of the NFS v4.
  • PNG - PNG (pronounced ping as in ping-pong; for Portable Network Graphics) is a file format for image compression that, in time, is expected to replace the Graphics Interchange Format (GIF) that is widely used on today's Internet.
  • PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.
  • PnP - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.
  • pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.
  • pod slurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
  • podcast - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • Podcast: Understanding crowdsourcing - This podcast defines and discusses crowdsourcing, the act of taking a function traditionally performed by an employee and outsourcing it to an undefined, generally large group of people using information technology.
  • Podcast: What is a portable application? - This podcast defiines and then discusses portable applications, software that has been adapted for use on a flash drive, iPod or other mobile external hard drive.
  • Podcast: What is SOA? - In this podcast you will learn what service-oriented architecture (SOA) is, how it relates to other programming approaches and what standards and tools you need to be aware of before implementing SOA.
  • podcaster - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • podcasting - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • Podcasting Terms: Glossary - This glossary of podcasting terms defines the most common technologies and concepts that anyone will encounter in creating or consuming podcasts.
  • podosphere - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.
  • podslurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
  • podslurping (slurping) - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
  • PoE - Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.
  • point - A point is a standard measurement unit for type sizes.
  • point (type) - A point is a standard measurement unit for type sizes.
  • point cloud - A point cloud is a collection of data points defined by a given coordinates system.
  • point of care (POC) testing - Point of care (POC) testing is medical testing that is performed outside of a laboratory setting.
  • point of sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • point of sale platform - A point of sale platform is software that supports the completion of a retail transaction.
  • point of sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point release - A point release is a small or relatively minor software release that fixes or improves an existing software product.
  • point to point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • Point to Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.
  • Point to Point Protocol over Ethernet - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.
  • Point to Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • point-in-time snapshot (PIT snapshot) - Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time.
  • point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • point-of-sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.
  • point-of-sale security (POS security) - Point-of-sale security (POS security) is the study of vulnerabilities in retail checkout points and prevention of access by unauthorized parties looking to steal customer and payment card details from them.
  • point-of-sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point-of-sale terminal (POS terminal) - A point-of-sale (POS) terminal is a computerized replacement for a cash register.
  • point-to-point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • point-to-point graph (line graph) - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • Point-to-Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.
  • Point-to-Point Protocol over Ethernet - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.
  • Point-to-Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • Point-to-Point Tunneling Protocol (PPTP) - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • pointing stick - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.
  • PoIP - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.
  • poison mailbox - A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.
  • poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocols, a poison reverse is a way in which a gateway node tells its neighbor gateways that one of the gateways is no longer connected.
  • poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • polar coordinates - Polar coordinates provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface.
  • polarity - Polarity is a term used in electricity, magnetism, and electronic signaling.
  • polarization - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
  • polarization (wave polarization) - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
  • policy - In policy-based networking, a policy is a formal set of statements that define how the network's resources are to be allocated among its clients.
  • Policy Analysis of Internet Routing - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • Policy and Charging Rules Function (PCRF) - Policy and Charging Rules Function (PCRF) is the part of the Evolved Packet Core (EPC) that supports service data flow detection, policy enforcement and flow-based charging.
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • policy server - A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files.
  • policy-based management - Policy-based management is an administrative approach that is used to simplify the management of a given endeavor by establishing policies to deal with situations that are likely to occur.
  • policy-based networking - Policy-based networking is the management of a network so that various kinds of traffic - data, voice, and video - get the priority of availability and bandwidth needed to serve the network's users effectively.
  • Polish logic - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.
  • polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.
  • POLP - The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
  • polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
  • polyLED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymer LED (light-emitting polymer or polyLED) - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.
  • polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
  • polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.
  • polynomial - A polynomial is a mathematical expression consisting of a sum of terms, each term including a variable or variables raised to a power and multiplied by a coefficient.
  • polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.
  • polynomial versus nondeterministic polynomial - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).
  • pomodoro technique - The pomodoro technique is designed to help users use their time more effectively by overcoming tendencies to procrastinate and multitask, both of which impair productivity.
  • Pong - Pong is said to have been both the first coin-operated arcade game and the first popular home video game.
  • POODLE (Padding Oracle On Downgraded Legacy Encryption) - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.
  • POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
  • POP 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • pop up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up ad - A pop-up ad is a pop-up window used for advertising.
  • pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up blocker (pop-up killer) - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • pop-up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.
  • pop-up menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • pop-up transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • POP3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • population - In statistics and other areas of mathematics, a population is a complete collection of entities or items that has at least one characteristic in common.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close