Browse Definitions :

Browse Definitions by Alphabet

PC - PHL

  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS 12 requirements - PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS 2.0 - PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.
  • PCI DSS 3.0 - PCI DSS 3.0 is the third major iteration of the Payment Card Industry Data Security Standard, a set of policies and procedures administered by the Payment Card Industry Security Standards Council (PCI SSC) to ensure the security of electronic payment data and sensitive authentication data.
  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS merchant levels - Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses.
  • PCI gap assessment - A PCI gap assessment is the identification, analysis and documentation of areas of non-compliance with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI policy - A PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI QSA - Payment Card Industry Qualified Security Assessor (PCI QSA) is a designation conferred by the PCI Security Standards Council to individuals it deems qualified to perform PCI assessments and consulting services.
  • PCI Security Standards Council - The PCI Security Standards Council is an organization created by the major credit card companies in an effort to better protect credit card holder data.
  • PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • PDP-11 (Programmed Data Processor-11) - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • Peachtree - Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.
  • peak (pk) - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.
  • PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.
  • peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer botnet (P2P botnet) - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • peercasting - Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • Pentium - Also see the Pentium MMX and the Pentium 3.
  • people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • PeopleSoft eProcurement - PeopleSoft eProcurement is a component of Oracle’s Supplier Relationship Management (SRM) product group that enables self-service for requisition and other procurement tasks.
  • Pepys' weblog - The famous diary that Samuel Pepys (pronounced PEEPS), once the head of England's Navy, kept during the years 1660-1669 is being made available online in the form of a weblog.
  • per cent symbol (%) - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent change (percent difference) - Percent change -- also known as percent difference.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.
  • performance - Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, (MIPS) - millions of instructions per second) during a benchmark test.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an organization's achievements, efficiency and adherence to budget, comparing actual results against previously articulated goals.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • performance scorecard - A performance scorecard is a graphic or an application that depicts the progress over time of some entity, such as an enterprise, an employee or a business unit, toward some type of goal.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • perigee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.
  • periodic inventory system - A periodic inventory system is a mechanism for measuring the level of inventory and the cost of goods sold (COGS) by using an occasional physical count.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • peripheral drift illusion - The peripheral drift illusion is a perception of movement in a static image; the illusion is caused by the brain’s interpretation of patterns seen outside of the eye’s area of focus.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • permanent virtual circuit (PVC) - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • permeability (magnetic permeability) - Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.
  • permeability of free space (a vacuum) - The permeability of free space (a vacuum) is a physical constant equal to approximately 1.
  • permittivity (electric permittivity) - Permittivity, also called electric permittivity, is a constant of proportionality that exists between electric displacement and electric field intensity.
  • permittivity of free space - The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.
  • perpetual software license - A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.
  • persistent connection (HTTP persistent connection) - A persistent connection (HTTP persistent connection) is a network communication channel that remains open for further HTTP requests and responses rather than closing after a single exchange.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • persistent storage - Persistent storage is any data storage device that retains data after power to that device is shut off.
  • personal area network (PAN) - A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.
  • personal cloud storage (PCS) - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • personal computer (PC) - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • personal digital assistant (PDA) - Personal digital assistant is a term for a small, mobile, handheld device that provides computing and information storage and retrieval capabilities for personal or business use, often for keeping schedules, calendars and address book information handy.
  • personal drone - A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • Personal Home Page (PHP) - In Web programming, Personal Home Page (PHP) is a script language and interpreter, similar to JavaScript and Microsoft's VBScript, that is freely available and used primarily on Linux Web servers.
  • personal identity verification (PIV) card - A personal identity verification (PIV) card is a United States Federal smart card that contains the necessary data for the cardholder to be granted to Federal facilities and information systems and assure appropriate levels of security for all applicable Federal applications.
  • personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personal VM (personal virtual machine or PVM) - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • personality profile - A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company.
  • personalization engine - A personalization engine is a tool used by businesses to collect and analyze customer behavior and data to create a customized user experience -- including special offers, product recommendations and automated marketing efforts -- in an e-commerce setting.
  • personalized search - Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • PERT chart - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive gaming - Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.
  • pervasive Wi-Fi - Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.
  • petabyte - A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.
  • petaflop - A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS).
  • PFC (power factor correction or power factor controller) - PFC (power factor correction; also known as power factor controller) is a feature included in some computer and other power supply boxes that reduces the amount of reactive power generated by a computer.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • pharmaceutical detailing - Pharmaceutical detailing is a 1:1 marketing technique pharmaceutical companies use to educate a physician about a vendor's products, hoping that the physician will prescribe the company's products more often.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phase - In electronic signaling, phase is a definition of the position of a point in time (instant) on a waveform cycle.
  • phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • phase-locked loop (PLL) - A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.
  • phased antenna system - .
  • phased rollout - Phased rollout is a hardware or software migration method that involves incremental implementation of a new system.
  • phenomenon - A phenomenon, in a scientific context, is something that is observed to occur or to exist.
  • PHI breach (protected health information breach) - A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.
  • phishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • phlashing - Phlashing is a permanent denial of service (PDoS) attack that exploits a vulnerability in network-based firmware updates.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close