named pipe


Also found in: Wikipedia.

named pipe

(operating system)
A Unix pipe with a filename created using the "mknod" command. Named pipes allow unrelated processes to communicate with each other whereas the normal (un-named) kind can only be used by processes which are parent and child or siblings (forked from the same parent).
References in periodicals archive ?
SLIL was previously named Pipe Strength Limited, which
He won a Bafta for the Troubleshooter series, was named pipe smoker of the year in 1991 and even had a real ale named after him.
IT was just like old times at Sandown as punters across the country sang the praises of a man named Pipe after Gaspara landed a huge gamble in the Sunderlands Imperial Cup.
Once named Pipe Smoker of the The Year, Trueman was diagnosed with cancer in May and spent the last month before his death in intensive care in hospital close to his home in the Yorkshire Dales.
I Write in response to Mr Harry Mitchell's plea for suggestions about his two cats named Pipe and McCoy
Comedian and novelist Stephen Fry was named Pipe smoker of the Year yesterday.
Guardium's patent-pending S-TAP[TM] (software tap) technology is also used to monitor "back-door" local access (non-network connections) by database administrators, such as console, shared memory, and named pipe connections.
One side of the communication can be a Virtuoso target task that communicates using a channel, while the other side of the communication can be a host-based application that communicates using a file, a named pipe, a COM port or a TCP/IP socket.
The upgrades of this version include: a Windows NT architecture including New Technology File System; improved scalability enhancing the performance of concurrently accessible disk drives; several times the document arrival rates of previous versions; faster query processing; supports up to 1000 concurrent sessions; support of databases over 500 GB in size; simplified management and storing of large databases; provides Named Pipe and TCP/IP support allowing easy distribution of components in a distributed configuration; and advanced real-time performance fully overlapping document query insertion and index updates.
It creates a verifiable audit trail of all transactions -- including DBA activities that access databases via "back-door" protocols such as Oracle Bequeath, named pipes and shared memory -- and immediately generates real-time security alerts whenever policy violations are detected.