Browse Definitions by Alphabet

  • P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.
  • PA-DSS (Payment Application Data Security Standard) - Payment Application Data Security Standard (PA-DSS) is a set of requirements intended to help software vendors develop secure payment applications for credit card transactions.
  • packet coalescing - Packet coalescing involves using a computer's network interface card (NIC) to reduce the number of generated receive interrupts the adapter issues.
  • packet filtering - Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and destination addresses, ports or protocols.
  • packet loss - Packet loss is when one or more transmitted data packets fail to arrive at their destination.
  • pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.
  • pagination - Pagination is the process of separating print or digital content into discrete pages.
  • paging - Paging is a function of memory management where a computer will store and retrieve data from a device’s secondary storage to the primary storage.
  • pair programming - Pair programming is an Agile software development technique originating from Extreme programming (XP) in which two developers team together and work on one computer.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • Parallel ATA (Parallel Advanced Technology Attachment or PATA) - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a legacy standard for connecting internal floppy disks, hard disk drives (HDDs) and optical drives to older computer systems.
  • parallel file system - A parallel file system is a software component designed to store data across multiple networked servers.
  • Parallels - Parallels is a software company best-known for its software that allows users to run Microsoft Windows systems on Apple Macintosh computers.
  • Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that allows Microsoft Windows, Linux and Google Chrome OSes and applications to run on an Apple Mac computer.
  • parameter tampering - Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization.
  • paravirtualization - Paravirtualization is a type of hardware virtualization that enables the guest operating system (OS) in a virtual machine (VM) to access the hypervisor directly, rather than indirectly through a complex abstraction layer, as is the case with conventional full virtualization.
  • Pardot - Pardot is a software-as-a-service (SaaS) marketing automation platform by Salesforce that offers email automation, targeted email campaigns, and lead management for business-to-business (B2B) sales and marketing organizations.
  • Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.
  • Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.
  • Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation about the human tendency to devote a great deal of time to unimportant details, while crucial matters go unattended.
  • parser - In computer technology, a parser is a program that's usually part of a compiler.
  • partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.
  • partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.
  • partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.
  • partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners that sell their products.
  • pascal - The pascal (Pa) is the unit of pressure or stress in the International System of Units (SI).
  • pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
  • passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.
  • passive candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.
  • passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.
  • passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.
  • passkey - A passkey is an alternative method of user authentication that eliminates the need for usernames and passwords.
  • passphrase - A passphrase is a sentencelike string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
  • password - A password is a string of characters used to verify the identity of a user during the authentication process.
  • password cracking - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.
  • password entropy - Password entropy is a measurement of a password's strength based on how difficult it would be to crack the password through guessing or a brute-force attack.
  • password manager - A password manager is a technology tool that helps internet users create, save, manage and use passwords across different online services.
  • password salting - Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them.
  • password spraying - Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target accounts.
  • passwordless authentication - Passwordless authentication is signing into a service without using a password.
  • patch catalog - A patch catalog is a repository of data associated with software patches.
  • patch panel - A patch panel in a local area network (LAN) is a mounted hardware assembly that contains ports that are used to connect and manage incoming and outgoing LAN cables.
  • Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system (OS) and other Microsoft software.
  • paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they were members of a large, extended family.
  • Pathways Language Model (PaLM) - The Pathways Language Model is the name of a family of AI large language models developed by Google.
  • pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.
  • pay-as-you-go cloud computing (PAYG cloud computing) - Pay-as-you-go cloud computing (PAYG cloud computing) is a payment method for cloud computing that charges based on usage.
  • payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.
  • payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC card - A PC card, also known as a PCMCIA card, is a credit card-sized memory or input/output (I/O) device that fits into a PC, usually a laptop.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a congressionally established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI compliance - PCI compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS 12 requirements - The PCI DSS 12 requirements are a set of security controls businesses must implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS merchant levels - Payment Card Industry Data Security Standard (PCI DSS) merchant levels rank merchants based on their number of transactions per year to outline compliance verification requirements.
  • PCIe SSD (Peripheral Component Interconnect Express solid-state drive) - A PCIe SSD (Peripheral Component Interconnect Express solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the highest and the lowest values in a waveform.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure that describes data capacity.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, test and highlight vulnerabilities in their security posture.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • Pentium - Pentium is a widely used series of microprocessors developed by Intel Corporation.
  • people analytics (HR analytics) - People analytics, also known as human resources (HR) analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their effect on business goals and evaluate the effectiveness of HR initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an organization's achievements, efficiency and adherence to budget, comparing actual results against previously articulated goals.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - Peripheral Component Interconnect Express (PCIe or PCI-E) is a serial expansion bus standard for connecting a computer to one or more peripheral devices.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • permittivity (electric permittivity) - Permittivity (electric permittivity) is defined as the ratio of electric displacement to the electric field intensity.
  • permittivity of free space - The permittivity of free space is a physical constant that reflects the ability of electrical fields to pass through a classical vacuum.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection - A persistent connection, also known as an HTTP persistent connection, refers to a network communication channel that remains open for further HTTP requests and responses instead of closing after a single exchange.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal computer (PC) - A personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - A personal digital assistant (PDA) is a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
  • personal health record (PHR) - A personal health record (PHR) is an electronic summary of health information that a patient maintains control of themselves, as opposed to their healthcare provider.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • pharmaceutical detailing - Pharmaceutical detailing is a 1:1 marketing technique pharmaceutical companies use to educate a physician about a vendor's products, hoping that the physician will prescribe the company's products more often.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phase - In electronic signaling, a phase is the position of a wave at a point in time (instant) on a waveform cycle.
  • phase-locked loop (PLL) - A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.
  • phased rollout - Phased rollout is a hardware or software migration method that involves incrementally implementing a new system.
  • PHI breach (protected health information breach) - A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.
Networking
Security
CIO
HRSoftware
Customer Experience
Close