personal information manager
Abbreviated PIM, a type of software application designed to help users organize random bits of information. Although the category is fuzzy, most PIMs enable you to enter various kinds of textual notes — reminders, lists, dates — and to link these bits of information together in useful ways. Many PIMs also include calendar, scheduling, and calculator programs.
Read Also:
- personally identifiable information
Abbreviated as PII or pii, personally identifiable information is any information that can identify an individual. This type of information may be requested from users through online forms and can include your mailing address, credit card number, your IP address, phone number, e-mail address, Social Security number or any other unique identifier. Being cautious about […]
- Pervasive Computing
The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity as computing devices become progressively smaller and more powerful. Also called ubiquitous computing, pervasive computing is the result of computer technology advancing at exponential speeds — a trend toward all man-made and some natural products having hardware […]
- Petabyte
It wasn’t that long ago that data storage devices were measured in gigabytes and terabyte hard drives seemed exotic. Now that terabytes are commonplace, the next unit of data measurement you’re likely to hear about is the petabyte. In data storage, terms have been defined out to the yottabyte (1024 bytes), or the yobybyte (280 […]
- Petaflop
A petaflop is the ability of a computer to do one quadrillion floating point operations per second (FLOPS). Additionally, a petaflop can be measured as one thousand teraflops. A petaflop computer requires a massive number of computers working in parallel on the same problem. Applications might include real-time nuclear magnetic resonance imaging during surgery or […]
- pharming
Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in […]