Browse Definitions by Alphabet
- phishing - Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of communication.
- phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
- Photoshop - Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
- PHP (Hypertext Preprocessor) - PHP (Hypertext Processor) is a general-purpose scripting language and interpreter that is freely available and widely used for web development.
- phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
- phygital - Phygital (physical plus digital) is a marketing term that describes blending digital experiences with physical ones.
- physical layer - The physical layer is the first and lowest layer of the Open Systems Interconnection (OSI) communications model.
- physical security - Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
- physical to virtual (P2V) - Physical to virtual (P2V), also called hardware virtualization, refers to the migration of physical machines to virtual machines (VMs).
- physiognomy - Physiognomy is a pseudoscience based on associating personal characteristics and traits with physical differences, and especially with elements of people's faces.
- PICK chart (Possible, Implement, Challenge and Kill chart) - A PICK chart (Possible, Implement, Challenge and Kill chart) is a visual tool for organizing ideas.
- pick to light - Pick to light is order fulfillment technology that employs alphanumeric displays and buttons at storage locations to guide the manual picking and recording of items for shipment.
- Picture in Picture (PIP) - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.
- pigs and chickens - Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.
- pilot program (pilot study) - A pilot program, also called a feasibility study or experimental trial, is a small-scale, short-term experiment that helps an organization learn how a large-scale project might work in practice.
- ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
- ping sweep (ICMP sweep) - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
- Pinterest - Pinterest is a social curation website for sharing and categorizing images found online.
- PIO (Programmed Input/Output) - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.
- pipe - In computer programming, especially in Unix operating systems (OSes), a pipe is a technique for passing information from one program process or command to another.
- pipeline as code - Pipeline as code is an approach to a continuous integration (CI) pipeline where the pipeline is expressed entirely in computer code.
- pipelining - Pipelining is the process of storing and prioritizing computer instructions that the processor executes.
- pixel - The pixel -- a word invented from picture element -- is the basic unit of programmable color on a computer display or in a computer image.
- pizza box server - The term 'pizza box server' refers to the shape of a computer server enclosed in a rectangular and horizontally- arranged chassis and often installed in a rack with similar servers.
- PKI (public key infrastructure) - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.
- PL/SQL (procedural language extension to Structured Query Language) - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).
- Plain Old Telephone Service (POTS) - Plain Old Telephone Service (POTS) refers to the traditional, analog voice transmission phone system implemented over physical copper wires (twisted pair).
- plaintext - In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.
- Planck's constant - Planck's constant, symbolized as h, is a fundamental universal constant that defines the quantum nature of energy and relates the energy of a photon to its frequency.
- plane (in networking) - A plane is an integral component of telecommunications architecture and networks.
- planogram - A planogram is a diagram that shows how and where specific retail products should be placed on retail shelves or displays to increase customer purchases.
- platform - In IT, a platform is any hardware or software used to host an application or service.
- platform economy - Platform economy is the tendency for commerce to increasingly move toward and favor digital platform business models.
- platform engineering - Platform engineering is a specialized discipline within software development that focuses on designing, building, maintaining and improving the toolchains and workflows software developers use.
- plenum - In building construction, a plenum (pronounced PLEH-nuhm, from Latin meaning full) is a separate space provided for air circulation for heating, ventilation and air conditioning (sometimes referred to as HVAC).
- plotter - A plotter is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
- plug-in hybrid electric vehicle (PHEV) - A plug-in hybrid electric vehicle (PHEV) is a type of hybrid electric vehicle that combines a gasoline or diesel engine with an electric motor and a large battery, which can be recharged by plugging it into an electrical outlet or charging stations.
- Plundervolt - Plundervolt is the name of an undervolting attack that targeted Intel central processing units (CPUs).
- Plutchik's wheel of emotions - Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.
- PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.
- point of care (POC) testing - Point of care testing (POC testing or POCT) is medical testing performed with the patient, outside of a laboratory setting.
- point-of-presence (POP) - A point-of-presence (POP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.
- Point-to-Point Protocol (PPP) - Point-to-Point Protocol (PPP) refers to a suite of computer communication protocols that provide a standard way to transport multiprotocol data over point-to-point links.
- Point-to-Point Protocol over Ethernet (PPPoE) - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
- poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocol, poison reverse is a loop avoidance process.
- poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.
- polarity - Polarity is when an entity contains two distinct and opposite poles that can either attract or repel each other.
- polarization (wave polarization) - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).
- policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
- polling (computing) - In computer science, polling or a polled operation denotes the process of repeatedly sampling the status of external devices by a client program.
- polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.
- polyglot persistence - Polyglot persistence is a conceptual term that refers to the use of different data storage approaches and technologies to support the unique storage requirements of various data types that live within enterprise applications.
- polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.
- polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.
- polymorphism - Polymorphism is a popular concept in object-oriented programming (OOP), referring to the idea that an entity in code such as a variable, function or object can have more than one form.
- Pomodoro Technique - The Pomodoro Technique is a time management method based on 25-minute stretches of focused work broken by five-minute breaks.
- POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.
- pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
- POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
- population health management (PHM) - Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.
- port - A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software.
- port address translation (PAT) - Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public IP address.
- port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
- port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.
- portable application - A portable application (portable app) is a software product designed to be easily moved from one computing environment to another.
- Portable Document Format (PDF) - Portable Document Format (PDF) is a file format that has captured all the elements of a printed document as an electronic image that users can view, navigate, print or forward to someone else.
- portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
- positioning statement - A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t.
- positron - A positron is a particle of matter with the same mass as an electron but an opposite charge.
- POSIX (Portable Operating System Interface) - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
- possession factor - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.
- POST (Power-On Self-Test) - A Power-On Self-Test (POST) is an operation initiated by a computer after it has been turned on but before it boots up the OS.
- post-quantum cryptography - Post-quantum cryptography, also known as quantum encryption, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers.
- Postscript - Postscript is a programming language that describes the appearance of a printed page.
- potential energy (U) - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.
- pounds per square inch (PSI) - Pounds per square inch (PSI) is the pressure that results when a 1-pound force is applied to a unit area of 1 square inch.
- power - Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field.
- power cycling - Power cycling is the process of turning hardware off and then turning it on again.
- power distribution unit (PDU) - A power distribution unit (PDU) is a device for controlling electrical power in a data center.
- power factor correction (PFC) - Power factor correction (PFC) is the set of mechanisms built into a power supply circuit to raise the power factor (PF).
- Power over Ethernet (PoE) - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
- Power Platform - Power Platform is an intuitive and collaborative platform from Microsoft.
- power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine's mechanical power to another piece of equipment.
- power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
- power-on reset (PoR) - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.
- PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
- pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
- preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.
- Preboot Execution Environment (PXE) - The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.
- preboot execution environment (PXE) - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
- precision agriculture - Precision agriculture (PA) is a farming management concept based on observing, measuring and responding to inter- and intra-field variability in crops.
- precision medicine (PM) - Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider differences in genes, socioeconomic status and lifestyles when devising treatment regimens for patients.
- prediction error - A prediction error is the failure of some expected event to occur.
- Predictive Index (PI) - The Predictive Index (PI) is a theory-based, self-report measurement of normal, adult, work-related personality that was developed and validated for use in occupational and organizational populations.
- predictive modeling - Predictive modeling is a mathematical process used to predict future events or outcomes by analyzing patterns in a given set of input data.
- predictive text - Predictive text is an input technology that facilitates typing on a device by suggesting words the user may wish to insert in a text field.
- prescriptive analytics - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
- presentation layer - The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that communications that pass through it are in the appropriate form for the recipient application.
- presentation software - Presentation software, also known as graphics presentation applications or presentation graphics programs, is a category of software used to create content where information is often represented in a graphical or visual way.
- Presidential Policy Directive 21 (PPD-21) - Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure.