Glossary Letter P

P and NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).

P equals NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).

P Ink - Photonic ink (P-Ink) is a substance that can change color electronically.

p ram - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.

P versus NP - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).

P versus NP (polynomial versus nondeterministic polynomial) - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).

P-Ink - Photonic ink (P-Ink) is a substance that can change color electronically.

P/390 - The P/390 is basically an IBM mainframe system adapted to run on a personal computer.

P/E cycle - A solid-state-storage program-erase cycle is a sequence of events in which data is written to solid-state NAND flash memory cell (such as the type found in a so-called flash or thumb drive), then erased, and then rewritten.

P2P - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.

P2P - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

P2P - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.

P2P lending (peer-to-peer lending) - P2P lending (peer-to-peer lending) is a type of platform that allows participants to borrow and lend sums of money without having to rely on a conventional financial institution to control transactions.

P2P model (peer-to-peer model) - The peer-to-peer model (P2P model) is a non-hierarchical system of exchange, transfer or transmission.

P2V - Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

P3P - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.

P3P (Platform for Privacy Preferences) - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.

P4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.

P4P - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.

P4P (proactive provider participation for P2P) - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.

PA DSS - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.

PA-DSS - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.

PA-DSS (Payment Application Data Security Standard) - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.

PaaS - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

PaaS (platform as a service) - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

PABX - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.

package management system - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.

package manager - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.

package manager or package management system (PMS) - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.

packet analyzer - A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity.

packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.

packet filter - On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols.

packet filtering - On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols.

Packet Hound - PacketHound is a product that aims to help an enterprise regulate traffic that might otherwise slow services down for all users of a local area network.

Packet Level Procedure - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.

packet loss - Packet loss is the failure of one or more transmitted packets to arrive at their destination.

packet loss concealment - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.

packet loss concealment (PLC) - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.

packet monkey - On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.

Packet Order Correction - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.

Packet Order Correction (POC) - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.

packet shaping - Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

packet switching - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.

packet writing - Packet writing is a technology that enables the writing of data to a recordable compact disk (CD-R) incrementally, in multiple small blocks of data, rather than in a single block (as in disk-at-once recording), or in blocks defined by tracks (as in track-at-once recording), the other two common methods.

Packet-Level Procedure - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.

packet-switched - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.

packet-switching - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.

PACS - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.

PACS - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.

PACS (picture archiving and communication system) - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.

page - On the World Wide Web, a page is a file notated with the Hypertext Markup Language (HTML).

page authority (Web page authority) - Page authority, in search engine optimization (SEO), is the value a search engine assigns a Web page.

page description language - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.

page description language (PDL) - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.

page file - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).

pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random access memory (RAM) for data in RAM that hasn't been used recently.

pagefile - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).

pagejacking - Pagejacking is stealing the contents of a Web site by copying some of its pages, putting them on a site that appears to be the legitimate site, and then inviting people to the illegal site by deceptive means - for example, by having the contents indexed by major search engines whose results in turn link users to the illegal site.

pager - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.

PageRank - PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP).

pages per minute - In printing, PPM is an abbreviation that stands for "pages per minute.

pagination - Pagination is the process of separating content into discrete pages.

paging - Paging is a function of memory management where a computer will store and retrieve data from a device’s secondary storage to the primary storage.

paging - A pager is a small telecommunications device that receives (and, in some cases, transmits) alert signals and/or short messages.

paid inclusion - Paid inclusion is a search engine marketing model in which Web site owners pay a search engine company to guarantee their sites will show up in search results.

paid prioritization - Paid prioritization, in relation to the internet, is the optimization of data transfer rates for certain content providers, websites and web services.

PAIR - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.

pair programming - Pair programming is an Agile technique originating from XP in which two developers team together and work on one computer.

PAL - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.

Paladion - Paladion Networks is a Bengaluru, India-based provider of information security products and services.

palette - Lynda Weinman's 216-color palette for Mac and Windows browsers For actual RGB values to specify, see our table containing the 216-Color Browser-Safe Palette.

Palladium - Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level.

Palm - Palm is the trade name for a popular personal digital assistant (PDA), a form of handheld device that is also known as a palmtop computer.

Palm Operating System - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.

Palm OS - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.

Palm OS (Palm Operating System) - Palm OS is the computer operating system that provides a software platform for the Palm series of handheld personal digital assistants (PDAs) made by Palm Inc.

palm print recognition - Palm print recognition is a biometric authentication method based on the unique patterns of various characteristics in the palms of people’s hands.

palm vein recognition - Palm vein recognition is a biometric authentication method based on the unique patterns of veins in the palms of people’s hands.

PAM - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.

pan - pan: In a video, context, panning is the sweeping movement of a camera across a scene or the appearance of such movement in a video as created by EditDV's PZR filter.

PAN - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.

pan (video) - pan: In a video, context, panning is the sweeping movement of a camera across a scene or the appearance of such movement in a video as created by EditDV's PZR filter.

pan setting - A pan setting, in an audio context, is the setting that determines how audio output is divided between left and right speakers.

PAN truncation - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.

PAN truncation (primary account number) - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.

Panasas - Panasas is a scale-out NAS (network-attached storage) vendor that produces hardware and software for demanding technical and enterprise environments.

pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.

panel - In computer program development, a panel is a representation of what information will be sent to a user's display screen in given circumstances.

Pango - Pango is an open source project dedicated to creating a Unicode framework for rendering international text.

Panther - Panther was the code name for Mac OS version 10.

PAP - PAP (Packet-Level Procedure) is a full-duplex protocol for transferring packets between parties in an X.

paper battery - A paper battery is a flexible, ultra-thin energy production and storage device formed by combining carbon nanotubes with a conventional sheet of cellulose-based paper.

paperless office - Paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.

Paperwork Reduction Act - The Paperwork Reduction Act is a U.

PAR - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.

paradigm - A paradigm (pronounced PEHR-uh-daim, from Greek paradeiknyai - to show side by side) is a pattern or an example of something.

paradox - A paradox is a statement or concept that contains conflicting ideas.

paradox of choice - The paradox of choice is an observation that having many options to choose from, rather than making people happy and ensuring they get what they want, can cause them stress and problematize decision-making.

parallax - Parallax is the way an object’s position or direction changes, depending on viewing angle.

parallel - In the context of the Internet and computing, parallel means more than one event happening at a time.

parallel adoption - Parallel adoption is a method of hardware or software migration that involves using the existing and new systems simultaneously until the implementation is judged to be complete and satisfactory.

Parallel Advanced Technology Attachment - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.

Parallel ATA - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.

Parallel ATA (Parallel Advanced Technology Attachment or PATA) - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.

parallel file system - In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed logically for storage and retrieval.

parallel file system - A parallel file system is a software component designed to store data across multiple networked servers and to facilitate high-performance access through simultaneous, coordinated input/output operations (IOPS) between clients and storage nodes.

parallel I/O - Parallel I/O is a way of performing multiple input/output operations concurrently, rather than serially.

parallel presence detect - Parallel presence detect (PPD) is a method of using resistors to communicate a memory module's speed and density to the basic input/output system (BIOS) when a computer boots (starts or restarts).

parallel presence detect (PPD) - Parallel presence detect (PPD) is a method of using resistors to communicate a memory module's speed and density to the basic input/output system (BIOS) when a computer boots (starts or restarts).

parallel processing - Parallel processing is a method in computing of running two or more processors (CPUs) to handle separate parts of an overall task.

parallel processing software - Parallel processing software manages the execution of a program on parallel processing hardware with the objectives of obtaining unlimited scalability (being able to handle an increasing number of interactions at the same time) and reducing execution time.

parallel sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.

Parallel Virtual Machine - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.

Parallel Virtual Machine (PVM) - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.

Parallels - Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.

Parallels Desktop for Mac - Parallels Desktop for Mac is desktop virtualization software that can replicate a native user experience for guest applications and operating systems on Apple Mac computers.

parameter - In information technology, a parameter (pronounced puh-RAA-meh-tuhr, from Greek for, roughly, through measure) is an item of information - such as a name, a number, or a selected option - that is passed to a program by a user or another program.

parameter RAM - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.

parameter RAM (PRAM or parameter random access memory) - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.

parameter random access memory - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.

parameter tampering - Parameter tampering is a form of Web-based hacking event (called an attack) in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization.

paravirtualization - Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.

PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley.

Pardot - Pardot is a software as a service (SaaS) marketing automation platform by SalesForce offering email automation, targeted email campaigns and lead management for B2B sales and marketing organizations.

parent company - A parent company is a corporation that has subsidiaries, which are wholly or partially-owned separate businesses controlled by the parent.

parent partition - A parent partition is a logical hard drive division in the Microsoft Hyper-V environment that's responsible for running the hypervisor layer and creating and managing child partitions.

Pareto chart - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.

Pareto chart (Pareto distribution diagram) - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.

Pareto distribution diagram - A Pareto chart, also called a Pareto distribution diagram, is a vertical bar graph in which values are plotted in decreasing order of relative frequency from left to right.

Pareto efficiency - Pareto efficiency is a balance of resource distribution such that one individual’s lot cannot be improved without impairing the lot of another individual.

Pareto principle - The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.

Paris Agreement - The Paris Agreement is an international treaty that seeks to reduce the emission of greenhouse gases.

parity - Parity is a method of detecting errors in data transmissions between computers, while parity bit and parity checking are used in RAID technology to guard against data loss.

Parkinson's law - Cyril Northcote Parkinson observed that "work expands so as to fill the time available for its completion" in a 1955 essay published in "The Economist" based on his experience in the British Civil Service.

Parkinson's law of triviality (bikeshedding) - Parkinson's law of triviality is an observation that people tend to waste a lot of time attending to unimportant details while crucial matters don't get the attention they require.

parse - To parse is to analyze something in an orderly way.

parser - In computer technology, a parser is a program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and their attributes or options) that can then be managed by other programming (for example, other components in a compiler).

parsing - In computer technology, a parser is a program, usually part of a compiler, that receives input in the form of sequential source program instructions, interactive online commands, markup tags, or some other defined interface and breaks them up into parts (for example, the nouns (objects), verbs (methods), and their attributes or options) that can then be managed by other programming (for example, other components in a compiler).

part-of-speech tagger (PoS tagger) - A part of speech (PoS) tagger is a software tool that labels words as one of several categories to identify the word's function in a given language.

partition - Partitioning a hard disk drive is the first step in preparing it for data storage.

partner - A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members.

partner account manager (PAM) - A partner account manager is a job title within a vendor organization that uses channel partners to sell its products or services.

partner program - A partner program, which may also be referred to as channel partner program or alliance program, is a business strategy that vendors develop to encourage others to work with the vendor and sell its products or services.

partner relationship management - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.

partner relationship management (PRM) - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.

partner specialization - A partner specialization is a designation achieved when a value-added reseller, integrator or solution provider has demonstrated a particular expertise specified by its vendor.

partnership - In a partnership, all profits and losses pass through to partners and are reported on their individual tax returns.

Pascal - Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler.

pascal - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).

pascal (unit of pressure or stress) - The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).

Pascal case - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.

pass phrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.

pass the hash attack - A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.

passenger name record (PNR) - A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together.

passive attack - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities.

Passive Candidate - A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.

passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.

passive keyless entry (PKE) - Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle.

passive optical network - A passive optical network (PON) is a system that brings optical fiber cabling and signals all or most of the way to the end user.

passive optical network (PON) - A passive optical network (PON) is a system that brings optical fiber cabling and signals all or most of the way to the end user.

passive reconnaissance - Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.

passive scanning - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.

passive sensor - Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment.

passive solar - Passive solar is the use of the sun’s energy directly for either heating or cooling purposes.

passphrase - A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.

password - A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

password blacklist - A password blacklist is a list of words disallowed as user passwords due to their commonplace use.

password chaos - Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.

password cracking - A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources.

password cracking - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource.

password entropy - Password entropy is a measurement of how unpredictable a password is.

password hardening - Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process.

password strength meter - A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user.

password synchronization - Password synchronization is an authentication process that coordinates user passwords across various computers and computing devices so a user only has to remember a single password instead of multiple passwords for different machines or devices.

passwordless authentication - Passwordless authentication is a verification process that determines whether someone is, in fact, who they say they are without requiring the person to manually enter a string of characters.

Pasta Theory - The Pasta Theory of Programming is the idea that various programming structures can be likened to the structures of well-known pasta dishes.

Pasta Theory of Programming - The Pasta Theory of Programming is the idea that various programming structures can be likened to the structures of well-known pasta dishes.

pastebin - A pastebin is a Web application that allows users to upload and share text online.

PASV FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.

PAT - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.

PATA - Parallel ATA (Parallel Advanced Technology Attachment or PATA) is a standard for connecting hard drives into computer systems.

patch - A software patch or fix helps resolve issues that crop up in different programs.

patch antenna - A patch antenna is a wafer-like directional antenna suitable for covering single-floor small offices, small stores and other indoor locations where access points cannot be placed centrally.

patch cable - A patch cord is a length of cable, with connectors on the ends, that is used to connect an end device to something else, such as a power source.

patch cord - A patch cord is a length of cable, with connectors on the ends, that is used to connect an end device to something else, such as a power source.

patch management - Patch management is an area of systems management that involves acquiring, testing and installing multiple patches, or code changes, to an administered computer system.

patch Matrix - A patch Matrix, in a video context, is the display in the Monitors window that identifies video and audio tracks in the current source clip and the available tracks in the Sequencer window.

patch panel - A network patch panel is a mounted hardware unit containing ports used to interconnect and manage LAN cables as well as connect them to the internet and wide area networks.

Patch Tuesday - Patch Tuesday is the unofficial name of Microsoft's scheduled release of the newest security fixes for its Windows operating system and related software applications, as detailed in the Windows Security Updates Guide.

patent - A patent is a government-awarded license that grants the inventor of a product or process exclusive rights to its manufacture, use or sale for a specified time period.

patent troll - A patent troll is an individual or an organization that purchases and holds patents for unscrupulous purposes such as stifling competition or launching patent infringement suits.

paternalistic leadership - Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they members of a large, extended family.

Path Computation Element (PCE) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route based on a network graph.

Path Computation Element Protocol (PCEP) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route by applying computational constraints in real time.

path control - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.

path to profitability - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.

path to profitability (P2P) - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.

pathing - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.

pathing (path control) - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.

pathological computer use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.

pathological Internet use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.

patient engagement - Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in their own medical care.

patient matching - Patient matching is a process of comparing data from different health IT systems to see if data sources match and belong to the same patient to obtain a complete record of the patient’s health history and medical care.

patient portal - A patient portal is a web-based access point that enables self-serve health IT services for patients.

patient record locator - A patient record locator is a computer service that allows doctors and nurses to obtain a patient’s electronic health records including electronic medical records, ambulatory medical record and prescription data.

patient similarity - Patient similarity is the concept of researching the best treatments and the ones to avoid based on the records of like individuals with like health conditions.

patient-generated health data (PGHD) - Patient-generated health data (PGHD) is data created, recorded or gathered by or from patients, family members or caregivers to help address a medical concern.

pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.

pattern (design pattern) - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.

pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.

pay for performance (P4P) - Pay for performance (P4P), in healthcare, is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.

pay for privacy - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access.

pay per click fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.

pay per use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.

pay-as-you-go cloud computing (PAYG cloud computing) - The pay-as-you-go cloud computing (PAYG cloud computing) method charges users only for the services they use, eliminating wasted resources.

pay-as-you-grow pricing - Vendors that offer a pay-as-you-grow storage allow customers with growing environments to acquire capacity after an array has been installed through the purchase of licenses.

pay-per-click fraud - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.

pay-per-use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.

pay-per-view - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.

payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.

Payment Application Data Security Standard - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.

Payment Card Industry (PCI) - The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.

payment card industry compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

Payment Card Industry Data Security Standard - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.

payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.

PayPal - PayPal is a Web-based application for the secure transfer of funds between member accounts.

PayPhrase - Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.

payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.

PBD - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.

PBX - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.

PC - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.

PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.

PC blade - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.

PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.

PC demo - A demo is a non-interactive multimedia presentation that is rendered in real time.

PC DOS - Also see DOS.

PC philanthropy - PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.

PC-DOS - Also see DOS.

PC-DOS (Personal Computer - Disk Operating System) - Also see DOS.

PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

PCI - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.

PCI (Peripheral Component Interconnect) - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.

PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.

PCI compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

PCI DSS - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

PCI DSS 12 requirements - PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).

PCI DSS 2.0 - PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.

PCI DSS 3.0 - PCI DSS 3.0 is the third major iteration of the Payment Card Industry Data Security Standard, a set of policies and procedures administered by the Payment Card Industry Security Standards Council (PCI SSC) to ensure the security of electronic payment data and sensitive authentication data.

PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

PCI DSS merchant levels - Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses.

PCI DSS Requirements Fast Guide - A chart that lists the 6 control objectives and 12 requirements that make up the Payment Card Industry Data Security Standards (PCI DSS).

PCI DSS vocabulary quiz - Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).

PCI e - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.

PCI Express - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.

PCI forensic investigator program - A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks.

PCI gap assessment - A PCI gap assessment is the identification, analysis and documentation of areas of non-compliance with the Payment Card Industry Data Security Standard (PCI DSS).

PCI policy - A PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).

PCI QSA - Payment Card Industry Qualified Security Assessor (PCI QSA) is a designation conferred by the PCI Security Standards Council to individuals it deems qualified to perform PCI assessments and consulting services.

PCI Security Standards Council - The PCI Security Standards Council is an organization created by the major credit card companies in an effort to better protect credit card holder data.

PCI X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.

PCI-CISP - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.

PCI-E - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.

PCI-X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.

PCI-X (Peripheral Component Interconnect Extended) - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.

PCIe - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.

PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

PCL - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.

PCM - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.

PCM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

PCMCIA - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.

PCMCIA card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.

PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.

PCRAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

PCS - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.

PCS - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.

PCS (personal communications service) - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.

PDA - Personal digital assistants were the precursors to smartphones.

PDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.

PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.

PDD-63 - HSPD-7 (Homeland Security Presidential Directive No.

PDF - PDF is also an abbreviation for the Netware Printer Definition File.

PDL - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.

PDM - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.

PDP 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.

PDP-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.

PDP-11 (Programmed Data Processor-11) - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.

PDU - A power distribution unit is a device for controlling electrical power in a data center.

Peachtree - Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.

peak - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.

peak (pk) - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.

peak to peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.

peak-to-peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.

peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.

PEAP - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.

PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.

PEBCAK - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.

PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.

pebi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.

pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.

PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.

PECR - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.

peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.

peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.

peer-to-peer botnet (P2P botnet) - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.

peer-to-peer computing - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.

peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.

peercasting - Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.

Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.

pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.

Pel - The term pel has been replaced by pixel, another contraction of "picture element.

Peltier effect - The Peltier effect is a temperature difference created by applying a voltage between two electrodes connected to a sample of semiconductor material.

Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.

pen test - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.

pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.

Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.

penetration testing - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.

penguin - Tux, the penguin, is the generally accepted official logo for the Linux operating system.

Pentium - Also see the Pentium MMX and the Pentium 3.

Pentium 3 - The Pentium III is a microprocessor designed by Intel as a successor to its Pentium II.

Pentium 4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.

Pentium 4 (P4) - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.

people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.

PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.

PeopleSoft eProcurement - PeopleSoft eProcurement is a component of Oracle’s Supplier Relationship Management (SRM) product group that enables self-service for requisition and other procurement tasks.

per cent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.

per cent symbol (%) - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.

per mil symbol - The per mil symbol is used in mathematics, and especially in economics, to indicate parts per thousand.

percent - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.

percent change - Percent change -- also known as percent difference.

percent change (percent difference) - Percent change -- also known as percent difference.

percent change calculator - A calculator for finding percent increase and percent decrease - percent change.

percent difference - Percent change -- also known as percent difference.

percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.

percent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.

perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.

perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.

perfect RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.

performance - Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, (MIPS) - millions of instructions per second) during a benchmark test.

performance and accountability reporting - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.

performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.

performance crime - A performance crime is an illegal act that is committed with the intention of being witnessed by an audience or seeking an audience afterwards.

performance management software - Performance management software is designed to improve business performance by spurring employee productivity.

performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.

performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.

perigee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.

perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

periodic inventory system - A periodic inventory system is a mechanism for measuring the level of inventory and the cost of goods sold (COGS) by using an occasional physical count.

peripheral - A peripheral (pronounced peh-RIHF-uh-ruhl, a noun truncation of peripheral device, ) is any computer device that is not part of the essential computer (the processor, memory, and data paths) but is situated relatively close by.

Peripheral Component Interconnect - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.

Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.

Peripheral Component Interconnect Extended - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.

peripheral drift illusion - The peripheral drift illusion is a perception of movement in a static image; the illusion is caused by the brain’s interpretation of patterns seen outside of the eye’s area of focus.

perishable data - Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.

Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.

permanent data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.

permanent virtual circuit - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.

permanent virtual circuit (PVC) - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.

permeability - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.

permeability (magnetic permeability) - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.

permeability of free space - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.

permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.

Permission Marketing - Permission marketing is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.

permittivity - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.

permittivity (electric permittivity) - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.

permittivity of free space - The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.

perpetual inventory system - A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.

perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.

persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.

persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.

persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.

Personal Access Communications System - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.

Personal Access Communications System (PACS) - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.

personal area network - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.

personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.

personal cloud storage - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.

personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.

personal communications service - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.

personal communications services - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.

personal computer - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.

personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.

Personal Computer - Disk Operating System - Also see DOS.

Personal Computer Disk Operating System - Also see DOS.

Personal Computer Memory Card International Association - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.

Personal Computer Memory Card International Association (PCMCIA) - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.

Personal Computer Memory Card International Association card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.

Personal Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.

personal digital assistant - Personal digital assistants were the precursors to smartphones.

personal digital assistant (PDA) - Personal digital assistants were the precursors to smartphones.

personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.

personal firewall - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.

personal firewall (desktop firewall) - A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders.

Personal Handyphone System - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.

Personal Handyphone System (PHS) - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.

personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

personal health record - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.

personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.

Personal Home Page - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.

Personal Home Page (PHP) - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.

personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.

personal identity verification card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.

Personal Java - Now considered a Sun legacy product, PersonalJava is or was a software development platform for creating network-capable applications for various consumer devices for office, home, and mobile use.

personal operating space - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.

personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.

personal portal - A bookmark portal is a free application service provider (ASP) Web site that allows registered users to save "bookmark" (Netscape) or "favorite" (Internet Explorer) Web links so that they can be accessed at any time from any Internet-connected device.

Personal Response System - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.

Personal Response System (PRS) - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.

Personal Search Syndication - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.

Personal Search Syndication (PSS) - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.

personal supercomputer - A desktop supercomputer, also called a personal supercomputer, is a term that is used to describe any exceptionally powerful computer that can be placed at a single workstation.

personal TV receiver - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

personal video recorder - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

personal video station - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

personal virtual machine - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.

personal VM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.

personal VM (personal virtual machine or PVM) - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.

Personal Web Server - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.

Personal Web Server (PWS) - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.

personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.

Personality Test: What kind of geek are you? - A WhatIs.com geek personality test.

personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.

personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.

personally identifiable financial information - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.

personally identifiable financial information (PIFI) - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.

personally identifiable information - Personally identifiable information (PII) is any data that could potentially identify a specific individual.

personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.

PERT - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

PERT/CPM - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

pervasive computing - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.

pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.

pervasive gaming - Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.

pervasive Wi-Fi - Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.

petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).

Peter principle - The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.

pF/m - The picofarad per meter (symbolized pF/m) is a unit of electric permittivity, a constant of proportionality that exists between electric displacement and electric field intensity.

PFC - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.

PFC (power factor correction or power factor controller) - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.

PGP - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

Ph - Ph is an Internet facility that lets you search for someone's e-mail address if their e-mail provider has a Ph server program.

phablet - A phablet is a computing device with a screen size between five and seven inches long.

phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.

pharma hack - The pharma hack is an exploit that takes advantage of vulnerabilities in WordPress or Joomla documents, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings.

pharmaceutical detailing - Detailing is a marketing technique used by pharmaceutical companies wherein a pharmaceutical representative visits and attempts to persuade a doctor to prescribe a certain company’s product more often.

pharmacovigilance - pharmacovigilance.

pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.

phase - In electronic signaling, phase is a definition of the position of a point in time (instant) on a waveform cycle.

Phase Alternation Line - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.

Phase Alternation Line (PAL) - Phase Alternation Line (PAL) is the analog television display standard that is used in Europe and certain other parts of the world.

phase change - Phase change is a type of compact disk (CD) recording technology that enables the disks to be written, erased, and rewritten through the use of a layer of a special material (called the phase change layer) that can be changed repeatedly from an amorphous (formless) to a crystalline state, or phase-through exposure to variably-powered laser beams.

phase change cooling - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.

PHase change Liquid EXchange - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.

phase change memory - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

phase locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.

phase modulation - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.

phase modulation (PM) - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.

phase shift keying - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.

phase state low electron drive memory - PLEDM (phase-state low electron drive memory) is a new memory microchip technology that offers vastly greater capacity than memory devices commonly used in the past.

phase-change cooling - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.

phase-change cooling (vapor cooling) - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.

PHase-change Liquid EXchange - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.

phase-change memory - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

phase-change RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

phase-lock loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.

phase-locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.

phase-locked loop - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.

phase-shift keying - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.

phase-state low electron drive memory - PLEDM (phase-state low electron drive memory) is a new memory microchip technology that offers vastly greater capacity than memory devices commonly used in the past.

phased antenna system - .

phased rollout - Phased rollout is a hardware or software migration method that involves incremental implementation of a new system.

phaser - A phaser is an electronic sound processor, that creates a sweeping effect by modulating a narrow notch signal filter.

PHDSC - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.

phenomenon - A phenomenon, in a scientific context, is something that is observed to occur or to exist.

PHI - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

PHI breach (protected health information breach) - A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.

phish - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

phisher - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

phishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.

Phishing season (quiz) - Ah, the festive season! Carolers come a-caroling; callers come a-calling and.

phishing via SMS - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.

phlashing - Phlashing is a permanent denial of service (PDoS) attack that exploits a vulnerability in network-based firmware updates.

PHOLED - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).

PHOLED (phosphorescent organic light-emitting device) - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).

phosphorescent organic light emitting device - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).

phosphorescent organic light-emitting device - PHOLED (phosphorescent organic light-emitting device) is a proprietary display technology developed by the Universal Display Corporation (UDC) that uses soluble phosphorescent small molecule materials to create organic light-emitting devices (OLED s).

Photo CD - Photo CD is a process from Kodak that puts film images (including scanned prints and slides) on a compact disk as digitally stored images that you can view or work with at your computer.

photo messaging - Picture messaging (sometimes called photo messaging) is the practice of taking a picture with a built-in camera on a mobile phone or other handheld device and sending it to another mobile device or an e-mail recipient.

photoconductivity - Photoconductivity is the tendency of a substance to conduct electricity to an extent that depends on the intensity of light-radiant energy (usually infrared transmission or visible light) striking the surface of a sample.

photocopier - A photocopier is an electronic machine that makes copies of images and documents.

photogrammetry - Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.

photolithography - Photolithography is the standard method of printed circuit board (PCB) and microprocessor fabrication.

photometric stereo - Photometric stereo is a computer vision method of analyzing and detailing the contour and reflectivity of a surface in 3D (three-dimensional) space.

photon - In some ways, visible light behaves like a wave phenomenon, but in other respects it acts like a stream of high-speed, submicroscopic particles.

photonic computer - An optical computer (also called a photonic computer) is a device that uses the photons in visible light or infrared (IR) beams,rather than electric current, to perform digital computations.

photonic ink - Photonic ink (P-Ink) is a substance that can change color electronically.

photonic ink (P-Ink) - Photonic ink (P-Ink) is a substance that can change color electronically.

photonic network - An optical (photonic) network transmits information as optical rather than electronic signals: It uses light, not electrical currents, to convey data.

photonic switching - Lambda switching (sometimes called photonic switching, or wavelength switching) is the technology used in optical networking to switch individual wavelengths of light onto separate paths for specific routing of information.

photonics - Photonics is an area of study that involves the use of radiant energy (such as light), whose fundamental element is the photon.

photosensor - A photosensor is an electronic component that detects the presence of visible light, infrared transmission (IR), and/or ultraviolet (UV) energy.

Photoshop - Photoshop is Adobe's photo editing, image creation and graphic design software.

photovoltaic cell - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).

photovoltaic cell (PV Cell) - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).

photovoltaic glass (PV glass) - Photovoltaic glass (PV glass) is a technology that enables the conversion of light into electricity.

photovoltaics - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).

PHP - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.

PHP - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.

PHP - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.

PHP (Hypertext Preprocessor) - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.

PHP3 - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.

PHP4 - PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers.

PHR - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.

phreak - A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.

phreaking - A phreak is someone who breaks into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.

PHS - Developed by the Nippon Telegraph and Telephone Corporation, the Personal Handyphone is a lightweight portable wireless telephone that functions as a cordless phone in the home and as a mobile phone elsewhere.

PHTML - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.

phtml suffix - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.

phtml suffix (PHP) - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.

phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.

phygital - Companies are seeking to combine physical and digital (phygital) communication channels and provide customers with a seamless experience.

physical address - A physical address is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory), or to a particular register in a memory-mapped I/O (input/output) device.

physical attack surface - The physical attack surface is the totality of the security vulnerabilities in a given system that are available to an attacker in the same location as the target.

physical block device - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.

physical block device (PBD) - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.

physical computer - A physical computer is a hardware-based device, such as a personal computer.

physical layer - Located at the lowest layer of the Open Systems Interconnection (OSI) communications model, the physical layer's function is to transport data using electrical, mechanical or procedural interfaces.

physical security - Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.

physical to virtual - Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

physical to virtual (P2V) - Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

physical unit - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).

physical unit (PU) - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).

physics tool - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.

physiognomy - Physiognomy is a pseudoscience based on associating personal characteristics and traits with physical differences, and especially with elements of people's faces.

pi - Pi is a numerical constant that represents the ratio of a circle's circumference to its diameter on a flat plane surface.

PI - The Predictive Index (PI) is often used for employee profiling.

PIC - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.

PIC microcontrollers - PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.

Pick - Pick is a data base management system (DMS) based on a business model of data and its organization and traditionally associated with minicomputer systems for small- to medium-size businesses.

PICK chart (Possible, Implement, Challenge and Kill chart) - A PICK chart (Possible, Implement, Challenge and Kill chart) is a visual tool for organizing ideas.

pick to light - Pick to light is order-fulfillment technology that employs alphanumeric displays and buttons at storage locations to guide the manual "picking" and recording of items for shipment.

pick two (pick any two) - Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.

pico - A picoliter is a trillionth (one millionth of a millionth, or 10 to the -12th power) of a liter, which can be represented numerically as 0.

pico projector - A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.

picocell - A picocell is a small mobile base station that improves in-building cellular coverage.

picofarad per meter - The picofarad per meter (symbolized pF/m) is a unit of electric permittivity, a constant of proportionality that exists between electric displacement and electric field intensity.

picofarad per meter (pF/m) - The picofarad per meter (symbolized pF/m) is a unit of electric permittivity, a constant of proportionality that exists between electric displacement and electric field intensity.

picoliter - A picoliter is a trillionth (one millionth of a millionth, or 10 to the -12th power) of a liter, which can be represented numerically as 0.

picosatellite - A miniaturized satellite is an earth-orbiting device having lower mass and smaller physical dimensions than a conventional satellite, such as a geostationary satellite.

picosecond - A picosecond is one trillionth (10 -12) of a second, or one millionth of a microsecond.

PICS - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.

PictBridge - PictBridge is the name of an industry standard for firmware (built-in software) that allows digital cameras and printers to communicate directly with each other.

PICTIVE - PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process.

PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) - PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process.

pictograph - In graph theory, a pictograph is a graph that shows numerical information by using picture symbols or icons to represent data sets.

picture archiving and communication system - PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.

picture element - The term pel has been replaced by pixel, another contraction of "picture element.

picture element (pel) - The term pel has been replaced by pixel, another contraction of "picture element.

Picture in Picture - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.

Picture in Picture (PIP) - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.

picture in picture box - A PIP box (picture in picture box) is the graphic image you manipulate in the FX monitor when creating a Picture in a Picture effect.

picture line up generation equipment pattern - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.

picture line-up generation equipment pattern - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.

picture messaging - Picture messaging (sometimes called photo messaging) is the practice of taking a picture with a built-in camera on a mobile phone or other handheld device and sending it to another mobile device or an e-mail recipient.

picture messaging (photo messaging) - Picture messaging (sometimes called photo messaging) is the practice of taking a picture with a built-in camera on a mobile phone or other handheld device and sending it to another mobile device or an e-mail recipient.

picture view - Picture view is a mode of appearance for EditDV's Project window.

pie chart - A pie graph (or pie chart) is a specialized graph used in statistics.

pie graph - A pie graph (or pie chart) is a specialized graph used in statistics.

pie graph (or pie chart) - A pie graph (or pie chart) is a specialized graph used in statistics.

piezoelectricity - Piezoelectricity, also called the piezoelectric effect, is the ability of certain materials to generate an AC (alternating current) voltage when subjected to mechanical stress or vibration, or to vibrate when subjected to an AC voltage, or both.

PIFI - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.

piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.

pigs and chickens - Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.

PII - Personally identifiable information (PII) is any data that could potentially identify a specific individual.

pilot conversion - A pilot conversion is a hardware or software migration method that involves rolling out the new system to a small group of users for testing and evaluation.

pilot program (pilot study) - A pilot program, also called a feasibility study or experimental trial, is a small-scale experiment that helps an organization learn how a large-scale project might work in practice.

PIM - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.

PIM - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.

PIM - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.

PIN - A pin is a pronged contact as part of a signal interface in a computer or other communications device.

PIN lock - The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.

pin or PIN - A pin is a pronged contact as part of a signal interface in a computer or other communications device.

pin out - A pinout is a description of the purpose of each pin (electronic contact) in a multi-pin hardware connection interface.

ping - Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.

ping of death - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.

ping storm - A ping storm is a condition in which the Internet ping program is used to send a flood of packets to a server to test its ability to handle a high amount of traffic or, maliciously, to make the server inoperable.

ping strangeness - Ping strangeness is a term used in troubleshooting to describe the incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a specific network node or an unusual number of error messages returning.

ping sweep - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).

ping sweep (ICMP sweep) - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).

pink noise - Pink noise is acoustical energy distributed uniformly by octave throughout the audio spectrum (the range of human hearing, approximately 20 Hz to 20 kHz).

pinout - A pinout is a description of the purpose of each pin (electronic contact) in a multi-pin hardware connection interface.

Pinterest - Pinterest is a social curation website for sharing and categorizing images found online.

PIO - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.

PIO (Programmed Input/Output) - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.

PIP - Picture in Picture (PIP) is a video effect which places several complete images on the screen at the same time.

PIP box - A PIP box (picture in picture box) is the graphic image you manipulate in the FX monitor when creating a Picture in a Picture effect.

pipe - In computer programming, especially in UNIX operating systems, a pipe is a technique for passing information from one program process to another.

pipeline burst cache - A pipeline burst cache is a cache or storage area for a computer processor that is designed to be read from or written to in a pipelining succession of four data transfers (or bursts) in which later bursts can start to flow or transfer before the first burst has arrived at the processor.

pipelining - In computers, a pipeline is the continuous and somewhat overlapped movement of instruction to the processor or in the arithmetic steps taken by the processor to perform an instruction.

piracy - Software piracy is the illegal copying, distribution, or use of software.

pirate - Software piracy is the illegal copying, distribution, or use of software.

pirate radio - Pirate radio is the transmission of communications over radio waves by unlicensed amateurs; such broadcasts are illegal because they are not in accordance with FCC transmission requirements.

pirating - Software piracy is the illegal copying, distribution, or use of software.

Pisano - Leonardo Pisano, also known as Fibonacci (for filius Bonacci, meaning son of Bonacci), was an Italian mathematician who lived from 1170 - 1250.

PIV card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.

pivot table - A pivot table is a statistics tool that summarizes and reorganizes selected columns and rows of data in a spreadsheet or database table to obtain a desired report.

Pivot3 - Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world.

pixel - The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.

pixelate - Pixelation is the display of a digitized image where the individual pixels are apparent to a viewer.

pixelated - Pixelation is the display of a digitized image where the individual pixels are apparent to a viewer.

pixelation - Pixelation is the display of a digitized image where the individual pixels are apparent to a viewer.

pixels per inch - In computers, pixels per inch (ppi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.

pixels per inch (ppi) - In computers, pixels per inch (ppi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.

pixie dust - Pixie dust is the informal name that IBM is using for its antiferromagnetically-coupled (AFC) media technology, which can increase the data capacity of hard drives to up to four times the density possible with current drives.

pixie dust or antiferromagnetically-coupled (AFC) media - Pixie dust is the informal name that IBM is using for its antiferromagnetically-coupled (AFC) media technology, which can increase the data capacity of hard drives to up to four times the density possible with current drives.

pizza box server - The term "pizza box server" refers to the shape of a computer server enclosed in a rectangular and horizontally-arranged chassis and often installed in a rack with similar servers.

pk - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.

pk pk - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.

pk-pk - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.

PKCS - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).

PKI - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.

PKI (public key infrastructure) - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.

PKUNZIP - PKZIP (also capitalized as PKZip) is a program, originally written for the DOS operating system, that gathers multiple files into a single compressed file that can be stored in less space and transmitted more quickly from one place to another.

PKZIP - PKZIP (also capitalized as PKZip) is a program, originally written for the DOS operating system, that gathers multiple files into a single compressed file that can be stored in less space and transmitted more quickly from one place to another.

PKZIP (or PKZip) - PKZIP (also capitalized as PKZip) is a program, originally written for the DOS operating system, that gathers multiple files into a single compressed file that can be stored in less space and transmitted more quickly from one place to another.

PL SQL - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

PL/1 - PL/I is a third-generation (3GL) programming language developed in the early 1960s as an alternative to assembler language (for low-level computer processing functions), COBOL (for large-scale business applications), and FORTRAN (for scientific and algorithmic applications).

PL/I - PL/I is a third-generation (3GL) programming language developed in the early 1960s as an alternative to assembler language (for low-level computer processing functions), COBOL (for large-scale business applications), and FORTRAN (for scientific and algorithmic applications).

PL/S - PL/S is a language that IBM designed for use in developing system programs, especially in mainframe operating systems and application subsystems.

PL/SQL - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

PL/SQL (procedural language extension to Structured Query Language) - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

plagiarism - Plagiarism is the illicit copying of another person's work, especially written content, for presentation as one's own.

plain old telephone service - POTS is a term sometimes used in discussion of new telephone technologies in which the question of whether and how existing voice transmission for ordinary phone communication can be accommodated.

plain old telephone service (POTS) - POTS is a term sometimes used in discussion of new telephone technologies in which the question of whether and how existing voice transmission for ordinary phone communication can be accommodated.

plaintext - In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.

Planck's constant - Planck's constant, symbolized h, relates the energy in one quantum (photon) of electromagnetic radiation to the frequency of that radiation.

plane (in networking) - A plane, in a networking context, is one of three integral components of a telecommunications architecture.

planned obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.

planned obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.

planning board - In agile software development, a planning board is used to track the progress of an project.

planning game - In agile software development, a planning game is a meeting attended by both IT and business teams that is focused on choosing stories for a release or iteration.

planning poker - Planning Poker is a teambuilding activity for achieving group consensus.

planogram - A planogram is a diagram that shows how and where specific retail products should be placed on retail shelves or displays in order to increase customer purchases.

plasma - Plasma is a form of matter in which many of the electrons wander around freely among the nuclei of the atom s.

plasma display - A plasma display is a computer video display in which each pixel on the screen is illuminated by a tiny bit of plasma or charged gas, somewhat like a tiny neon light.

plasma TV - Plasma TV is a television display technology in which each pixel on the screen is illuminated by a tiny bit of plasma (charged gas).

Plastic Interface for Collaborative Technology Initiatives - PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process.

Plastic Interface for Collaborative Technology Initiatives through Video Exploration - PICTIVE (Plastic Interface for Collaborative Technology Initiatives through Video Exploration) is a paper mock-up technique that allows users to participate in the development process.

plastic pin grid array - PPGA (plastic pin grid array) is a microchip design from Intel that has the silicon core of the microchip facing down toward the computer motherboard.

PlateSpin - PlateSpin is a company that provides tools to help with server virtualization, including physical-to-virtual migrations and server workload management.

platform - A computer platform is an underlying computer system on which application programs can run, or, in general, any base of technologies on which other technologies or processes are built.

Platform as a Service - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

platform business model - A platform business model is a plan for creating revenue by allowing registered members to create content that can be consumed by a specific user group or general audience.

platform cooperative - A platform cooperative is an employee-owned and operated business that relies on a web-based platform for the sale of goods and services.

platform economy - Platform economy is the tendency for commerce to increasingly move towards and favor digital platform business models.

Platform for Internet Content Selection - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.

Platform for Internet Content Selection (PICS) - The Platform for Internet Content Selection (PICS) is a World Wide Web Consortium (W3C) group that defines rating systems and rating information for Web-based content.

Platform for Privacy Preferences - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.

PLATO - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.

PLATO (Programmed Logic for Automatic Teaching Operations) - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.

Playstation - Playstation is a video game console developed by Sony.

PLC - Packet loss concealment (PLC) is a technology designed to minimize the practical effect of lost packets in digital communications.

PLC - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.

PLEDM - PLEDM (phase-state low electron drive memory) is a new memory microchip technology that offers vastly greater capacity than memory devices commonly used in the past.

plenum - In building construction, a plenum (pronounced PLEH-nuhm, from Latin meaning full) is a separate space provided for air circulation for heating, ventilation, and air-conditioning (sometimes referred to as HVAC) and typically provided in the space between the structural ceiling and a drop-down ceiling.

Plexxi - Plexxi is a Cambridge Massachusetts company that makes software-defined networking (SDN) software.

PLL - A phase-locked loop (PLL) is an electronic circuit with a current-driven oscillator that constantly adjusts to match the frequency of an input signal, often used in wireless systems.

PLM - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.

PLMN - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.

plotter - A plotter is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.

PLSQL - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

plug - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.

Plug and Play - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.

Plug and Play (PnP) - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.

plug-and-play - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.

plug-in - Plug-in applications are programs that can easily be installed and used as part of your Web browser.

plug-in hybrid electric vehicle (PHEV) - A plug-in hybrid electric vehicle (PHEV) is a type of hybrid electric vehicle that combines a gasoline or diesel engine with an electric motor and a large battery, which can be recharged by plugging it into an electrical outlet or charging stations.

PLUGE pattern - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.

PLUGE pattern (picture line-up generation equipment pattern) - A PLUGE (picture line-up generation equipment) pattern is a test pattern used to calibrate the black level on a video display.

Plundervolt - Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

plus minus interesting - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.

Plutchik's wheel of emotions - Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.

PM - Phase modulation (PM) is a method of impressing data onto an alternating-current (AC) waveform by varying the instantaneous phase of the wave.

PMI (plus, minus, interesting) retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.

PMI retrospective - PMI (plus, minus, interesting) is a brainstorming activity that encourages participants in a discussion to look at an idea from more than one viewpoint.

PML - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).

PMML - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.

PMML (Predictive Model Markup Language) - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.

PMO - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.

PMO (project management office) - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.

PMP - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).

PMS - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.

pneumatics - Pneumatics (pronounced new-MATT-ix) is an aspect of physics and engineering that is concerned with using the energy in compressed gas to make something move or work.

pNFS (Parallel NFS) - The Parallel Network File System (pNFS) is part of the NFS v4.

PNG - PNG (Portable Network Graphics) is a file format used for lossless image compression.

PNG (Portable Network Graphics) - PNG (Portable Network Graphics) is a file format used for lossless image compression.

PnP - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there.

POC - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.

pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.

pod slurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.

podcast - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.

Podcast: Understanding crowdsourcing - This podcast defines and discusses crowdsourcing, the act of taking a function traditionally performed by an employee and outsourcing it to an undefined, generally large group of people using information technology.

Podcast: What is a portable application? - This podcast defiines and then discusses portable applications, software that has been adapted for use on a flash drive, iPod or other mobile external hard drive.

Podcast: What is SOA? - In this podcast you will learn what service-oriented architecture (SOA) is, how it relates to other programming approaches and what standards and tools you need to be aware of before implementing SOA.

podcaster - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.

podcasting - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.

Podcasting Terms: Glossary - This glossary of podcasting terms defines the most common technologies and concepts that anyone will encounter in creating or consuming podcasts.

podosphere - Podcasting is the preparation and distribution of audio files using RSS to the computers of subscribed users.

podslurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.

podslurping (slurping) - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.

PoE - Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.

point - A point is a standard measurement unit for type sizes.

point (type) - A point is a standard measurement unit for type sizes.

point cloud - A point cloud is a collection of data points defined by a given coordinates system.

point of care (POC) testing - Point of care (POC) testing is medical testing that is performed outside of a laboratory setting.

point of presence - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.

point of sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.

point of sale platform - A point of sale platform is software that supports the completion of a retail transaction.

point of sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.

point release - A point release is a small or relatively minor software release that fixes or improves an existing software product.

point to point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.

Point to Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.

Point to Point Protocol over Ethernet - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.

Point to Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.

point-in-time snapshot (PIT snapshot) - Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time.

point-of-presence - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.

point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.

point-of-sale data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.

point-of-sale security (POS security) - Point-of-sale security (POS security) is the study of vulnerabilities in retail checkout points and prevention of access by unauthorized parties looking to steal customer and payment card details from them.

point-of-sale terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.

point-of-sale terminal (POS terminal) - A point-of-sale (POS) terminal is a computerized replacement for a cash register.

point-to-point graph - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.

point-to-point graph (line graph) - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.

Point-to-Point Protocol - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.

Point-to-Point Protocol over Ethernet - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.

Point-to-Point Tunneling Protocol - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.

pointing stick - A TrackPoint, also called a pointing stick, is a cursor control device found in IBM ThinkPad notebook computers.

PoIP - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.

poison mailbox - A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocols, a poison reverse is a way in which a gateway node tells its neighbor gateways that one of the gateways is no longer connected.

poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.

Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.

polar coordinates - Polar coordinates provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface.

polarity - Polarity is a term used in electricity, magnetism, and electronic signaling.

polarization - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).

polarization (wave polarization) - Polarization, also called wave polarization, is an expression of the orientation of the lines of electric flux in an electromagnetic field (EM field).

policy - In policy-based networking, a policy is a formal set of statements that define how the network's resources are to be allocated among its clients.

Policy Analysis of Internet Routing - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.

Policy and Charging Rules Function (PCRF) - Policy and Charging Rules Function (PCRF) is the part of the Evolved Packet Core (EPC) that supports service data flow detection, policy enforcement and flow-based charging.

policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.

policy server - A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files.

policy-based management - Policy-based management is an administrative approach that is used to simplify the management of a given endeavor by establishing policies to deal with situations that are likely to occur.

policy-based networking - Policy-based networking is the management of a network so that various kinds of traffic - data, voice, and video - get the priority of availability and bandwidth needed to serve the network's users effectively.

Polish logic - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

Polish notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.

polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.

polling - In electronic communication, 'polling' is the continuous checking of other programs or devices by one progam or device to see what state they are in, usually to see whether they are still connected or want to communicate.

POLP - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.

polygenic risk score (PRS) - A polygenic risk score (PRS) is an expression of someone's likelihood of having or developing a particular medical condition.

polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.

polyglot programming - Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.

polyLED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.

polymer LED - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.

polymer LED (light-emitting polymer or polyLED) - Polymer LED (light-emitting diode) - sometimes called light-emitting polymer or polyLED - is a technology based on the use of polymer as the semiconductor material in LEDs.

polymorphic virus - A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to detect with antimalware programs.

polymorphism - In object-oriented programming, polymorphism (from the Greek meaning "having multiple forms") is the characteristic of being able to assign a different meaning or usage to something in different contexts - specifically, to allow an entity such as a variable, a function, or an object to have more than one form.

polynomial - A polynomial is a mathematical expression consisting of a sum of terms, each term including a variable or variables raised to a power and multiplied by a coefficient.

polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points.

polynomial versus nondeterministic polynomial - P versus NP (polynomial versus nondeterministic polynomial) refers to a theoretical question presented in 1971 by Leonid Levin and Stephen Cook, concerning mathematical problems that are easy to solve (P type) as opposed to problems that are difficult to solve (NP type).

pomodoro technique - The pomodoro technique is designed to help users use their time more effectively by overcoming tendencies to procrastinate and multitask, both of which impair productivity.

PON - A passive optical network (PON) is a system that brings optical fiber cabling and signals all or most of the way to the end user.

Pong - Pong is said to have been both the first coin-operated arcade game and the first popular home video game.

POODLE (Padding Oracle On Downgraded Legacy Encryption) - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.

POODLE Attack - The POODLE attack, also known as CVE-2014-3566, is an exploit used to steal information from secure connections, including cookies, passwords and any of the other type of browser data that gets encrypted as a result of the secure sockets layer (SSL) protocol.

POP - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.

POP 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

pop up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.

pop up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.

pop up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.

pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.

pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.

pop-up ad - A pop-up ad is a pop-up window used for advertising.

pop-up blocker - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.

pop-up blocker (pop-up killer) - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.

pop-up download - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.

pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.

pop-up killer - A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser.

pop-up menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.

pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.

pop-up transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.

POP3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

population - In statistics and other areas of mathematics, a population is a complete collection of entities or items that has at least one characteristic in common.

population health management (PHM) - Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.

PoR - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.

port - On computer and telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually with a socket and plug of some kind.

port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.

port 9875 (port of doom) - Port 9875 is a port often associated with setting up VoIP communications.

Port Address Translation - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.

Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.

port forwarding - Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.

port interface card - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.

port interface card (PIC) - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.

port knocking - Port knocking is an authentication method used by network administrators to control access to computers or other network devices behind a firewall.

port layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.

port mirroring - Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.

port mirroring (roving analysis port) - Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.

port number - A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.

port redirector - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).

port replicator - A port replicator is an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected.

port scan (port scan attack) - A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services -- each associated with a "well-known" port number -- the computer provides.

portability - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.

portable - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.

portable app - A portable application (portable app) is a software product designed to be easily moved from one computing environment to another.

portable computer - A portable computer is a personal computer that is designed to be easily transported and relocated, but is larger and less convenient to transport than a notebook computer.

Portable Document Format - PDF is also an abbreviation for the Netware Printer Definition File.

Portable Document Format (PDF) - PDF is also an abbreviation for the Netware Printer Definition File.

portable keyboard - A portable keyboard (or handheld keyboard) is one that is designed to be used with wireless devices, such as personal digital assistants (PDAs) and smartphones.

portable keyboard (handheld keyboard) - A portable keyboard (or handheld keyboard) is one that is designed to be used with wireless devices, such as personal digital assistants (PDAs) and smartphones.

portable media center - Portable media center is a term for a handheld multimedia device that can play digital music, image, and movie files that have been downloaded from the Internet or stored on a personal computer.

Portable Network Graphics - PNG (Portable Network Graphics) is a file format used for lossless image compression.

Portable Operating System Interface - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.

portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.

Portal Markup Language - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).

Portal Markup Language (PML) - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).

Portal of Doom - Portal of Doom (abbreviated as PoD and sometimes spelled all one word, as PortalOfDoom) is a Trojan horse that hijacks the computers of unsuspecting Windows users running old operating systems.

Porter's Five Forces - Porter's Five Forces is a framework developed by economist Michael E.

porting - Portability is a characteristic attributed to a computer program if it can be used in an operating systems other than the one in which it was created without requiring major rework.

portlet - On the Web, a portlet is a component of a portal Web site that provides access to some specific information source or application, such as news updates, technical support, or an e-mail program among many other possibilities.

portmanteau - A portmanteau is a word created from two other words, or parts of words, that both contribute to its meaning.

portrait - In computer printing, portrait is a mode in which the printer orients content for reading across the shorter length (the width) of the sheet of paper.

POS - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.

POS - A point-of-sale (POS) terminal is a computerized replacement for a cash register.

POS data - Barcode data (sometimes called point-of-sale data) is information from barcodes that is automatically gathered as a consumer's purchases are put through a check-out.

POS malware (point-of-sale malware) - Point-of-sale malware (POS malware) is malicious software expressly written to steal customer payment data -- especially credit card data -- from retail checkout systems.

POS scanner - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.

POS terminal - A point-of-sale (POS) terminal is a computerized replacement for a cash register.

positional assembly - Positional assembly is a technique that has been suggested as a means to build objects, devices, and systems on a molecular scale using automated processes in which the components that carry out the construction process would follow programmed paths.

positioning - Positioning, in a marketing context, is the process of identifying an appropriate market niche for a product, service or brand and getting it established it in that area.

positioning statement - A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t.

positive correlation - A positive correlation is a relationship between two variables such that their values increase or decrease together.

positron - A positron is a particle of matter with the same mass as an electron but an opposite charge.

POSIX - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.

POSIX (Portable Operating System Interface) - POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.

possession factor - The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.

POST - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.

POST (Power-On Self-Test) - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.

Post Office Protocol 3 - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.

post processing deduplication - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.

post-processing deduplication - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.

post-processing deduplication (PPD) - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.

post-quantum cryptography - Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers.

postcardware - Postcardware is freeware (no-charge software that is freely shared) that requires only that the user send the software provider a postcard as a form of payment.

postfix notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

PostgreSQL - PostgreSQL (pronounced "post-gress-Q-L") is an open source relational database management system (DBMS) developed by a worldwide team of volunteers.

Postscript - A WhatIs.com tech vocabulary quiz.

Postscript - Postscript is a programming language that describes the appearance of a printed page.

Postscript Printer Description file - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.

potential energy - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.

potential energy (U) - Potential energy, expressed in science as U, is energy that is stored within an object, not in motion but capable of becoming active.

potentially unwanted program - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.

POTS - POTS is a term sometimes used in discussion of new telephone technologies in which the question of whether and how existing voice transmission for ordinary phone communication can be accommodated.

pounds per square inch (PSI) - PSI is commonly used to measure the pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure).

power - Electrical power is the rate at which electrical energy is converted to another form, such as motion, heat, or an electromagnetic field.

power cycling - Power cycling is the process of turning hardware off and then turning it on again.

power distribution unit - A power distribution unit is a device for controlling electrical power in a data center.

power distribution unit (PDU) - A power distribution unit is a device for controlling electrical power in a data center.

power factor controller - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.

power factor correction - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.

power of 10 notation - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.

power on - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

power on reset - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.

Power On Self Test - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.

Power over Ethernet - Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.

Power over Ethernet (PoE) - Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.

power PC - PowerPC is a microprocessor architecture that was developed jointly by Apple, IBM, and Motorola.

power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine’s mechanical power to another piece of equipment.

power up - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

power usage effectiveness - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.

power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.

power user - A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user.

power-down - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

Power-Line Communications - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.

power-of-10 notation - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.

power-off - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

power-on - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

power-on reset - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.

power-on reset (PoR) - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.

Power-On Self-Test - When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer's basic input/output system (or "starting program") runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.

power-up - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

PowerBuilder - PowerBuilder is a popular rapid application development (RAD) tool for buildingobject-oriented programmingclient/serverapplications the parts of which can bedistributedwithin a network.

PowerPC - PowerPC is a microprocessor architecture that was developed jointly by Apple, IBM, and Motorola.

PowerPoint - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.

PowerShell - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.

PowerShell provider (Windows PowerShell provider) - A Windows PowerShell provider is a .

PowerShell v3 - PowerShell v3 is a task-automation framework found in client and server versions of Windows.

POX - POX is an open source development platform for Python-based software-defined networking (SDN) control applications, such as OpenFlow SDN controllers.

PPD - Parallel presence detect (PPD) is a method of using resistors to communicate a memory module's speed and density to the basic input/output system (BIOS) when a computer boots (starts or restarts).

PPD - Post-processing deduplication (PPD), also known as asynchronous de-duplication, is the analysis and removal of redundant data after a backup is complete and data has been written to storage.

PPD file - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.

PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.

PPGA - PPGA (plastic pin grid array) is a microchip design from Intel that has the silicon core of the microchip facing down toward the computer motherboard.

PPGA (plastic pin grid array) - PPGA (plastic pin grid array) is a microchip design from Intel that has the silicon core of the microchip facing down toward the computer motherboard.

ppi - In computers, pixels per inch (ppi) is a measure of the sharpness (that is, the density of illuminated points) on a display screen.

PPM - In printing, PPM is an abbreviation that stands for "pages per minute.

PPM - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.

PPM (pages per minute) - In printing, PPM is an abbreviation that stands for "pages per minute.

PPM (project and portfolio management) - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.

PPP - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.

PPP - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.

PPP (Point-to-Point Protocol) - PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.

PPPoE - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.

PPPoE (Point-to-Point Protocol over Ethernet) - PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices.

PPTP - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.

Practical Extraction and Reporting Language - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.

Practice Fusion - Practice Fusion Inc.

PRAM - PRAM (parameter RAM or parameter random access memory) is a special battery-powered form of random access memory in certain Macintosh computers where vital system information such as the date and time are stored.

Pray over Internet Protocol - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.

Pray over Internet Protocol (PoIP) - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.

Pray over IP - Pray over Internet Protocol (PoIP) is an Israel-based corporation that runs a Web site and forum allowing Jews and Christians worldwide to have their prayers heard in the Holy Land.

pre-market engagement - Both public and private sector organizations use pre-market engagement to get an advance understanding of the market, suppliers and their offerings while also forming or strengthening relationships with those suppliers.

pre-N - 802.11n is an addition to the 802.

pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.

pre-touch - Electric field (EF) sensing is a method of proximity sensing that allows robots and computers to detect, evaluate and work with objects in their vicinity.

preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.

Preboot Execution Environment - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.

Preboot Execution Environment - The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

Preboot Execution Environment (PXE) - The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

precision agriculture - Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.

precision medicine (PM) - Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider differences in genes, socioeconomic status and lifestyles when devising treatment regimens for patients.

precycling - Precycling is the practice of avoiding the acquisition of unnecessary items that will eventually have to be recycled or dealt with as waste.

predication - Predication (also called branch predication) is a process implemented in Explicitly Parallel Instruction Computing (EPIC)-based processors and their compilers to increase performance by eschewing branch prediction (a common technique used in modern processors), where a wrong guess by the processor brings a performance penalty.

predication (branch predication) - Predication (also called branch predication) is a process implemented in Explicitly Parallel Instruction Computing (EPIC)-based processors and their compilers to increase performance by eschewing branch prediction (a common technique used in modern processors), where a wrong guess by the processor brings a performance penalty.

prediction error - A prediction error is the failure of some expected event to occur.

PredictionIO - PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.

predictive analytics - Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

predictive churn modeling - Churn rate is a measure of the number of customers or employees who leave a company during a given period.

predictive coding - Predictive coding software can be used to automate portions of an e-discovery document review.

predictive dialer - A predictive dialer is a telephone control system that automatically calls a list of telephone numbers in sequence, screening out no-answers, busy signals, answering machines and disconnected numbers while predicting at what point a human caller will be able to handle the next call.

Predictive Index - The Predictive Index (PI) is often used for employee profiling.

Predictive Index (PI) - The Predictive Index (PI) is often used for employee profiling.

predictive maintenance (PdM) - Predictive maintenance (PdM) is the servicing of equipment when it is estimated that service is required, within a certain tolerance.

predictive model - Predictive modeling, also called predictive analytics, is a mathematical process that seeks to predict future events or outcomes by analyzing patterns that are likely to forecast future results.

Predictive Model Markup Language - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.

predictive modeling - Predictive modeling, also called predictive analytics, is a mathematical process that seeks to predict future events or outcomes by analyzing patterns that are likely to forecast future results.

predictive personalization - Predictive personalization is the effort and ability to predict the actions of users, based on their previous behaviors online.

predictive technology - Predictive technology is a body of tools capable of discovering and analyzing patterns in data so that past behavior can be used to forecast likely future behavior.

predictive text - Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.

predictor - Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

preemptive multitasking - Preemptive multitasking is task in which a computer operating system uses some criteria to decide how long to allocate to any one task before giving another task a turn to use the operating system.

prefix notation - Polish notation, also known as prefix notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

Premium Rate Service - In the U.K.

Premium Rate Service (PRS) - In the U.K.

prescription drug monitoring program (PDMP) - A prescription drug monitoring program (PDMP) is an electronic database that collects designated data on controlled substances that are prescribed and dispensed within a state.

prescriptive analytics - Prescriptive analytics is a type of business analytics that focuses on finding the best course of action for a given situation, and belongs to a portfolio of analytic capabilities that include descriptive and predictive analytics.

presence awareness - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

presence leveraging - Presence leveraging refers to any technology that supports and expands presence, the ability of a network subscriber to locate and identify any other user's computing device as soon as the other user connects to the network.

presence technology - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

presentation graphics - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.

presentation layer - Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.

presentation management - Presentation management is the supervised creation, distribution, updating and publishing of messages and visuals in presentations across an entire enterprise.

presentation software - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.

presentation software (presentation graphics) - Presentation software (sometimes called "presentation graphics") is a category of application program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information.

preservation orders - Litigation hold is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company.

Presidential Decision Directive 63 - HSPD-7 (Homeland Security Presidential Directive No.

Presidential Policy Directive 21 (PPD-21) - Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure.

press kit - A press kit is an information package provided for members of the media to promote events, organizations, products or candidates.

pressure - Pressure is an expression of force exerted on a surface per unit area.

pressure sensing - Pressure sensing is the capacity for some system to sense the force exerted on a surface per unit area and express that force in the strength of an electric signal.

pressure sensor - A pressure sensor is a device that detects a force exerted on a surface (pressure) and converts it to an electronic signal whose strength is relative to the strength of the force.

pressure, standard - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.

Presto - Presto is a free and open source distributed SQL query engine designed for the demands of big data.

Pretty Easy Privacy (pEp) - Pretty Easy Privacy (pEp) is an open source encryption tool designed to make it simple for users to protect their online communications.

Pretty Good Privacy - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

Pretty Good Privacy (PGP) - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

Pretty Please mode - Pretty Please mode is a feature added to require the use of “please” and “thank you” in voice commands for Google Assistant as used on Android devices and Google Home.

prettyprint - Prettyprint is the process of converting and presenting source code or other objects in a legible and attractive way.

preventive health - Preventive health is the use of recognized proactive health screenings, counseling and maintenance to prevent future illness and treatment.

preventive maintenance - Preventive maintenance is the practice of routinely taking measures in hardware administration that reduces the risk of failures and improves the likelihood of quick recovery in the event that a failure does occur.

PRI - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.

price scanner - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.

primary account number - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.

primary account number truncation - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.

primary domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.

primary key - A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.

primary key (primary keyword) - A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.

primary keyword - A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.

Primary Rate Interface - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.

primary storage - Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use and critical for an organization’s operations.

primary storage (main storage) - Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use and critical for an organization’s operations.

Primavera - Primavera Systems Inc.

prime contract - A prime contract is any contract or contractual action that is awarded directly to a contractor by the U.

prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.

primitive - In computer programming, a primitive (pronounced PRIH-muh-teev) is a basic interface or segment of code that can be used to build more sophisticated program elements or interfaces.

PRINCE 2 - PRINCE2 is a project management methodology developed by the government of the United Kingdom (UK) and used internationally, especially in information technology (IT) environments.

PRINCE2 - PRINCE2 is a project management methodology developed by the government of the United Kingdom (UK) and used internationally, especially in information technology (IT) environments.

principle of least privilege - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.

principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.

principle of obliquity - In systems engineering, obliquity is a theory that proposes the best way to achieve a goal when you are working with a complex system is to take an indirect approach instead of a direct one.

print bed - A print bed is the surface on a 3D printer where a print head lays down the materials that make up a 3D print.

print server - Test yourself.

print server - A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators.

printed circuit board (PCB) - A printed circuit board (PCB) is the board base for physically supporting and wiring surface-mounted and socketed components in most electronics.

printer - A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper.

Printer Control Language - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.

Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.

printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.

Printing terms: Glossary - This is a WhatIs.

printout - A hard copy (or "hardcopy") is a printed copy of information from a computer.

Prism - Prism is an application that lets users run web applications in dedicated browser windows.

Prisma - Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services.

prisoner's dilemma - The prisoner's dilemma is a games theory scenario that illustrates a non-zero sum problem in which competitors can, through trust and cooperation, yield the optimum potential solution.

privacy - On the Internet, privacy, a major concern of users, can be divided into these concerns: What personal information can be shared with whom Whether messages can be exchanged without anyone else seeing them Whether and how one can send messages anonymously Personal Information Privacy Most Web users want to understand that personal information they share will not be shared with anyone else without their permission.

Privacy and Electronic Communications Regulations - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.

Privacy and Electronic Communications Regulations (PECR) - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.

privacy compliance - Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.

privacy impact assessment (PIA) - A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization.

privacy plan - A privacy plan is an organizational directive that outlines how the organization will protect the personal information of its customers and clients.

privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.

Privacy Shield (EU-US Privacy Shield) - EU-US Privacy Shield is a framework for adherence to E.

private API - A private API is an application programming interface that has its application hosted with in-house developers.

private automatic branch exchange - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.

private automatic branch exchange (PABX) - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.

private branch exchange - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.

private branch exchange - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.

private branch exchange (PBX) - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.

private CA (private PKI) - Private CA stands for private certification authority and is an enterprise specific CA that functions like a publicly trusted CA but is exclusively run by or for the enterprise.

private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.

private cloud - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.

private cloud (internal cloud or corporate cloud) - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.

private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.

private cloud storage - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.

private cloud storage (internal cloud storage) - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.

private equity - Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).

private IP address - A private IP address is a non-Internet facing IP address on an internal network.

private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.

private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.

private PaaS (private platform as a service) - Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.

private port numbers - The dynamic port numbers (also known as the private port numbers) are the port numbers that are available for use by any application to use in communicating with any other application, using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).

private sector - The private sector is the part of a country's economic system that is run by individuals and companies, rather than the government.

privatization - Privatization is the process of transferring an enterprise or industry from the public sector to the private sector.

privilege - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.

privilege bracketing - Privilege bracketing is the practice of limiting temporarily increased permission levels to the briefest possible time period.

privilege creep - Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job.

privilege escalation attack - A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.

privileged access management (PAM) - Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.

privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.

privileges - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.

PRM - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.

PRNG - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.

proactive / reactive chat - Proactive chat is initiated by a website according to business rules that are triggered by user behavior; reactive chat is user-initiated.

proactive provider participation for P2P - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.

probabilistic robotics - Probabilistic robotics, also called statistical robotics, is a field of robotics that involves the control and behavior of robots in environments subject to unforeseeable events.

probability - Probability is a branch of mathematics that deals with calculating the likelihood of a given event's occurrence, which is expressed as a number between 1 and 0.

probe - In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.

problem - A problem, in an IT service management (ITSM) context, is an issue that could cause an incident.

problem exists between chair and keyboard - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.

problem list - A problem list is a document that catalogs a patient's health problems, including nontransitive illnesses, injuries and anything else that has or is affecting the patient.

problem management - Problem management, in information technology, is a process aimed at resolving incidents and problems caused by end-user errors or IT infrastructure issues, and preventing recurrence of such incidents.

problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.

procedural language extension to structured query language - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

process - A process is an instance of a program running in a computer.

Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.

process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.

process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.

process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.

process manufacturing - Process manufacturing is a production method that creates goods by combining supplies, ingredients or raw materials using a formula or recipe.

process mining software - Process mining software is a type of programming that analyzes data in enterprise application event logs in order to learn how business processes are actually working.

process-centric BPM - Process-centric business process management is a holistic approach to BPM that centers on processes themselves, rather than individual components such as documents, workflow or people.

processing in memory - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.

processing in memory (PIM) - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.

processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.

processor serial number - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.

processor serial number (PSN) - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.

procrastination - Procrastination is the habit of delaying tasks beyond a realistic timeframe for their completion.

procure to pay - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

procurement card - A procurement card is a type of company charge card used in making smaller purchases for greater cost efficiency, control and convenience.

procurement plan - A procurement plan -- also called a procurement management plan -- is a document that justifies the need for an external supplier and explains how the process of finding a supplier will be performed.

procurement software - Procurement software is a computer program or suite that allows an organization to automate the processes of purchasing materials and maintaining an inventory of goods.

Producer Price Index (PPI) - The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.

product - In information technology, a product is something (for example, a software application) that is created and then made available to customers, usually with a distinct name or order number.

product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.

product as a service - Product as a service is the concept of selling the services and outcomes a product can provide rather than the product itself.

product backlog grooming - Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.

product data management (PDM) - Product data management (PDM) involves capturing and managing the electronic information related to a product so it can be used in various business processes, including production and marketing.

product development - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.

product development (new product development - NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.

product development management - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.

product footprint - The product footprint is an assessment of the impact a particular product has on the environment.

product information management - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.

product information management (PIM) - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.

product lifecycle - The product lifecycle is the collective stages that a product goes through from its conception and design through to its ultimate disposal.

product lifecycle (in marketing) - The product lifecycle, in a marketing context, is all the stages of a product's life span that are related to its promotion and sales.

product lifecycle management - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.

product lifecycle management (PLM) - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.

product lifecycle sustainability - Product lifecycle sustainability is an approach to managing the stages of a product’s existence so that any negative impact on the environment is minimized.

product owner - The product owner is a role in scrum development of the person who represents the business or user community.

product placement - Product placement is the inclusion of a branded product in media, usually without explicit reference to the product.

product positioning - Product positioning is the tailored presentation of a product or brand for a specific targeted demographic.

Product Qualified Lead (PQL) - A product qualified lead (PQL) is an individual and business who has experienced value from using a product as a result of a free trial, use of a limited feature model, or other type of actual experience with the product.

product-agnostic - Product-agnostic is a description of something that is not associated with a particular commercial product -- such as a specific device or application -- or something that is interoperable with all products of a given type.

production data - Production data is data that is persistently stored and essential to completing day-to-day business tasks and processes.

production planning - Production planning is the act of developing a guide for the design and production of a given product or service.

production server - A production server is a server used to host website content and applications for deployment to a live environment.

productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, worksheets and presentations.

professional emancipation - Professional emancipation is an approach to work that focuses on the ability of individuals to guide and control their careers and work life.

professional services - A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.

professional services automation (PSA) - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.

profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.

Profile-Driven Storage - Profile-Driven Storage is a feature in vSphere 5 that lets users to intelligently provision applications, mapping VMs to storage levels according to service levels, availability, performance needs or cost.

profit and loss statement (P&L) - A profit and loss statement (P&L), also known as an income statement, is a financial report that shows a company's revenues and expenses over a given period of time, usually a fiscal quarter or year.

profit margin - A profit margin is the difference between what it costs a business to get a product or service to market and the price it charges for it.

profitability analysis - Profitability analysis is a component of enterprise resource planning (ERP) that allows administrators to forecast the profitability of a proposal or optimize the profitability of an existing project.

program - In computing, a program is a specific set of ordered operations for a computer to perform.

program counter - A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.

Program Evaluation Review Technique - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

program language generations - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.

program layer - In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.

program temporary fix - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.

program temporary fix (PTF) - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.

programmable automation controller (PAC) - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.

programmable economy - The programmable economy is a term created by research firm Gartner Inc.

programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.

programmable network (PN) - A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently from network hardware.

programmable read only memory - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.

programmable read-only memory - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.

programmable read-only memory (PROM) - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.

programmatic advertising - Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.

programmatic marketing - Programmatic marketing is best defined in two parts.

Programmed Data Processor 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.

Programmed Data Processor-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.

Programmed Input Output - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.

Programmed Input/Output - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.

Programmed Logic for Automatic Teaching Operations - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.

programming language generations - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.

progressive delivery - Progressive delivery is the process of pushing changes to a product iteratively -- first to a small audience and then to increasingly larger audiences to maintain quality control (QC).

progressive download - A progressive download is a process that allows the user to access content before the data transfer is complete.

progressive JPEG - A progressive JPEG is the JPEG equivalent of the interlaced GIF Graphics Interchange Format.

progressive profiling - Progressive profiling is a marketing technique that involves gradually collecting information about leads, or prospective customers, with iterative releases of forms asking questions intended to advance the sales cycle.

progressive scan - Progressive scan is a display and signal type in which the entire image is refreshed every cycle.

progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.

project and portfolio management - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.

Project AppBlast - AppBlast is a VMware initiative that allows users to access their Windows and Mac applications from any device running an HTML 5 browser.

Project Blackbox - Sun Microsystems' Modular Datacenter (known as "Project Blackbox" in the prototype phase) is a mobile and virtualized data center packaged in a standard 20-foot shipping container.

project charter (PC) - A project charter (PC) is a document that states a project exists and the project manager has written authority to begin work.

project management - Project management is the discipline of using established principles, procedures and policies to successfully guide a project from conception through completion.

Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).

project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.

Project Management Office - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.

Project Management Professional - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).

Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).

Project Management vocabulary quiz - This quiz tests your knowledge of project management terminology.

Project Nao - Project Nao, also called the Nao Project, is an ongoing venture dedicated to the development and mass production of an intelligent humanoid robot for the consumer market.

Project Nao (or Nao Project) - Project Nao, also called the Nao Project, is an ongoing venture dedicated to the development and mass production of an intelligent humanoid robot for the consumer market.

Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.

Project Owl - Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.

project plan - Project planning is a discipline for stating how to complete a project within a certain timeframe, usually with defined stages, and with designated resources.

project planning - Project planning is a discipline for stating how to complete a project within a certain timeframe, usually with defined stages, and with designated resources.

project post-mortem - Project post-mortem is a process intended to inform project improvements by determining aspects that were successful or unsuccessful.

project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.

Project Vault - Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.

projector mapping - Projector mapping (also known as projection mapping or video mapping) is the use of standard projectors to display 2D and 3D images on real world objects.

projector phone - A projector phone is a smartphone with an embedded pico projector.

ProLiant - ProLiant, an "industry standard" computer server from Compaq, typifies the popularly-priced server that is designed to satisfy general computing needs at various levels in an enterprise.

PROM - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.

Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real time notifications.

promiscuous mode - In a network, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety.

pronoun - A pronoun is a non-specific word that stands in for a noun, in situations where it should be clearly understood what or whom the pronoun refers to.

proof of concept (POC) - A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.

proof of concept (PoC) exploit - A proof of concept (PoC) exploit is a non-harmful attack against a computer or network.

prop head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.

propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.

propeller head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.

propeller head (or propellor head, prop head, prophead) - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.

propellor head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.

proper subset symbol - The proper subset symbol indicates a specific relationship between two set s.

property management system (PMS) - A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.

prophead - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.

proportion - In general, a ratio is a way of concisely showing the relationship between two quantities of something.

proportional control - Proportional control is a control system technology based on a response in proportion to the difference between what is set as a desired process variable (or set point) and the current value of the variable.

proportionality - In mathematics, proportionality indicates that two quantities or variables are related in a linear manner.

proprietary - In information technology, proprietary describes a technology or product that is owned exclusively by a single company.

proprietary solution - A proprietary solution is a hardware or software product or combination of products and services that is tied to a specific vendor, to the exclusion of all other vendors.

PropTech (property tech) - PropTech, or property technology, is any form of technology that combines the real estate market with IT in order to help users buy, research, sell or manage property.

Protected Extensible Authentication Protocol - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.

protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

protected mode - Protected mode is a mode of program operation in a computer with an Intel-based microprocessor in which the program is restricted to addressing a specific contiguous area of 640 kilobytes.

Protecting America's Critical Infrastructures - HSPD-7 (Homeland Security Presidential Directive No.

Proteus effect - The Proteus effect is the tendency for people to be affected by their digital representations, such as avatars, dating profiles and social media personas.

protocol analyzer - A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity.

protocol independent multicast - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.

protocol-independent multicast - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.

proton - A proton is a subatomic particle found in the nucleus of every atom.

prototype - In software development, a prototype is a rudimentary working model of a product or information system, usually built for demonstration purposes or as part of the development process.

prototyping - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.

Prototyping Model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.

provision - In general, provisioning means "providing" or making something available.

provisioning - In general, provisioning means "providing" or making something available.

proximity marketing (hyperlocal marketing) - Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific location.

proximity operator - A proximity operator is a character or word used to narrow search engine results by limiting them to those that have query keywords placed within a specific number of words in the content.

proximity sensing - Proximity sensing is the ability of a robot to tell when it is near an object, or when something is near it.

proxy - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.

proxy firewall - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.

proxy hacking - Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages.

proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.

PRS - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.

PRS - In the U.K.

PS/2 connector - A PS/2 connector is a round connector with six pins that some makes of personal computer use for the keyboard or mouse connection.

PS1 - Playstation is a video game console developed by Sony.

PS3 - Playstation is a video game console developed by Sony.

pseudo random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.

pseudo wire - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.

pseudo-anonymity - Pseudo-anonymity is the appearance – but not the reality--of anonymity online.

pseudo-infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.

pseudo-random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.

pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.

pseudocode - Pseudocode (pronounced SOO-doh-kohd) is a detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.

pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.

pseudonymous profile - A pseudonymous profile is a collection of information about a particular computer user that identifies the user either by their computer's IP address or by a randomly-generated nickname.

pseudoscience - Pseudoscience is a proposition, a finding or a system of explanation that is presented as science but that lacks the essential rigor of the scientific method.

pseudowire - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.

PSK - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.

PSK31 - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.

PSN - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.

PSS - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.

PST file - A PST file is a personal folder file in Microsoft Outlook.

PSTN - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.

PSTN (public switched telephone network) - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.

PTC ThingWorx - PTC ThingWorx is a model-based rapid application development (RAD) platform for the Internet of Things.

PTF - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.

PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.

PTR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

PTT - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.

PU - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).

public cloud storage - Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a pay-per-use basis, similar to the way a public utility like electric or gas provides and charges for services.

public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.

public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.

public domain software - Programs that are uncopyrighted because their authors intended to share them with everyone else are in the public domain.

public folder - In Microsoft Outlook, a public folder is a folder created to share information with others.

Public Health Data Standards Consortium - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.

Public Health Data Standards Consortium (PHDSC) - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.

Public Health Information Network - Public Health Information Network (PHIN) is an initiative developed by the Center for Disease Control and Prevention (CDC) to establish and implement a framework for sharing public health information electronically.

public key - In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.

public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.

public key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.

Public Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).

public key infrastructure - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.

public land mobile network - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.

public land mobile network (PLMN) - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.

Public private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.

public relations (PR) - Public relations (PR) is the use of communications to manage public perception of an individual or an organization.

Public Relations Society of America (PRSA) - The Public Relations Society of America (PRSA) is the world's largest association for public relations (PR) professionals, overseeing more than 21,000 members.

public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.

public switched telephone network - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.

public-key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.

Public-Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).

Public-Key Cryptography Standards (PKCS) - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).

Public-private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.

Public-private partnership (PPP) - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.

published applications - Published applications are virtual software programs that function as if they were installed locally.

PUE - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.

pull marketing - Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods.

pull notification - Pull notifications are communications that are sent as a response to a client request.

pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.

pulse amplitude modulation - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.

pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.

pulse code modulation - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.

pulse code modulation (PCM) - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.

pulsing zombie - A pulsing zombie is a computer whose security has been compromised without its owner's knowledge by a cracker so that it intermittently carries out a denial-of-service attack on target computers in a network.

pumpKIN - PumpKIN is a free, open source application that is used for exchange of data using the Trivial File Transfer Protocol (TFTP).

PUP - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.

PUP (potentially unwanted program) - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.

Puppet - Puppet is an open source systems management tool for centralizing and automating configuration management.

Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.

Puppy Linux - Puppy Linux is a compact version of Linux, an operating system (OS) that provides computer users with a free or low-cost alternative to Unix.

purchase intent - Purchase intent is the probability that a consumer will buy a product or service.

purchase order - A purchase order is a buyer's request to a seller to order goods.

pure risk (absolute risk) - Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

Purple Book - The Purple Book is the informal name for Philips and Sony's specification document for the double-density compact disk (DDCD) format.

Purple Screen of Death (PSOD) - A Purple Screen of Death (PSOD) is a diagnostic screen with white type on a purple background that is displayed when the VMkernel of an ESX/ESXi host experiences a critical error and becomes inoperative, terminating its running virtual machines.

purple squirrel - A purple squirrel is a metaphor used by recruiters and human relationship managers to describe the perfect job candidate.

purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.

push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.

push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.

push advertising - Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards.

push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.

push technology - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).

push technology (Webcasting) - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).

Push to Talk - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.

Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.

push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.

PV cell - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).

PVC - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.

PVM - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.

PVM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.

PVR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

PVS - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).

PW - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.

Pwn2Own - Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference.

PWS - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.

PXE - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.

PXE - The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

PXE (Preboot Execution Environment) - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.

Python - Python is an interpreted, object-oriented programming language similar to PERL, that has gained popularity because of its clear syntax and readability.

PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.

Next
Next

Glossary Letter Q