named pipe


Also found in: Wikipedia.

named pipe

(operating system)
A Unix pipe with a filename created using the "mknod" command. Named pipes allow unrelated processes to communicate with each other whereas the normal (un-named) kind can only be used by processes which are parent and child or siblings (forked from the same parent).
References in periodicals archive ?
This invitation to tender contains the complete pipe replacement of named pipe sections of the main and connecting pipes in accordance with the ordinance on high-pressure gas pipelines in conjunction with the dvgw rules, Worksheet g 463 and the factory standards of ontras gastransport gmbh.
Communication between them is based on named pipe technology [9,10].
He won a Bafta for the Troubleshooter series, was named pipe smoker of the year in 1991 and even had a real ale named after him.
Sir John, who lived just outside Ross-on-Wye, Herefordshire, won a Bafta for the Troubleshooter series, was named pipe smoker of the year in 1991 and even had a real ale named after him.
IT was just like old times at Sandown as punters across the country sang the praises of a man named Pipe after Gaspara landed a huge gamble in the Sunderlands Imperial Cup.
Once named Pipe Smoker of the The Year, Trueman was diagnosed with cancer in May and spent the last month before his death in intensive care in hospital close to his home in the Yorkshire Dales.
I Write in response to Mr Harry Mitchell's plea for suggestions about his two cats named Pipe and McCoy
Comedian and novelist Stephen Fry was named Pipe smoker of the Year yesterday.
Guardium's patent-pending S-TAP[TM] (software tap) technology is also used to monitor "back-door" local access (non-network connections) by database administrators, such as console, shared memory, and named pipe connections.
One side of the communication can be a Virtuoso target task that communicates using a channel, while the other side of the communication can be a host-based application that communicates using a file, a named pipe, a COM port or a TCP/IP socket.
It creates a verifiable audit trail of all transactions -- including DBA activities that access databases via "back-door" protocols such as Oracle Bequeath, named pipes and shared memory -- and immediately generates real-time security alerts whenever policy violations are detected.