Browse Definitions :

Browse Definitions by Alphabet

  • power cycling - Power cycling is the process of turning hardware off and then turning it on again.
  • power distribution unit (PDU) - A power distribution unit (PDU) is a device for controlling electrical power in a data center.
  • power factor correction (PFC) - Power factor correction (PFC) is the set of mechanisms built into a power supply circuit to raise the power factor (PF).
  • Power over Ethernet (PoE) - Power over Ethernet (PoE) is a technology for implementing wired Ethernet local area networks (LANs) that enables the electrical current necessary for operating each device to be carried by Ethernet data cables instead of standard electrical power cords and wiring.
  • Power Platform - Power Platform is an intuitive and collaborative platform from Microsoft.
  • power take-off (PTO) - Power take-off (PTO) is a device that transfers an engine's mechanical power to another piece of equipment.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • power-on reset (PoR) - A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.
  • PPD file (Postscript Printer Description file) - A PPD (Postscript Printer Description) file is a file that describes the font s, paper sizes, resolution, and other capabilities that are standard for a particular Postscript printer.
  • pre-roll ad - A pre-roll ad is a promotional video message that plays before the content the user has selected.
  • preamble - A preamble is a signal used in network communications to synchronize transmission timing between two or more systems.
  • Preboot Execution Environment (PXE) - The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.
  • preboot execution environment (PXE) - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
  • precision agriculture - Precision agriculture (PA) is a farming management concept based on observing, measuring and responding to inter- and intra-field variability in crops.
  • precision medicine (PM) - Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider differences in genes, socioeconomic status and lifestyles when devising treatment regimens for patients.
  • prediction error - A prediction error is the failure of some expected event to occur.
  • Predictive Index (PI) - The Predictive Index (PI) is a theory-based, self-report measurement of normal, adult, work-related personality that was developed and validated for use in occupational and organizational populations.
  • predictive modeling - Predictive modeling is a mathematical process used to predict future events or outcomes by analyzing patterns in a given set of input data.
  • predictive text - Predictive text is an input technology that facilitates typing on a device by suggesting words the user may wish to insert in a text field.
  • prescriptive analytics - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
  • presentation layer - The presentation layer resides at Layer 6 of the Open Systems Interconnection (OSI) communications model and ensures that communications that pass through it are in the appropriate form for the recipient application.
  • presentation software - Presentation software, also known as graphics presentation applications or presentation graphics programs, is a category of software used to create content where information is often represented in a graphical or visual way.
  • Presidential Policy Directive 21 (PPD-21) - Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and secure the country's critical infrastructure.
  • press kit - A press kit is an information package provided for members of the media to promote events, organizations, products or candidates.
  • Pretty Good Privacy (PGP) - Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
  • prettyprint - Prettyprint is the process of converting and presenting source code or other objects in a legible and attractive way.
  • primary key (primary keyword) - A primary key, also called a primary keyword, is a column in a relational database table that's distinctive for each record.
  • primary storage (main storage) - Primary storage is the collective methods and technologies that capture and retain digital information in active use and critical for an organization's operations.
  • prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.
  • primitive (programming) - In computer programming, a primitive is one of a set of fundamental language elements that serve as the foundation for a programming language.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
  • print server - A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators.
  • printed circuit board (PCB) - A printed circuit board (PCB) is a structure for assembling electronic components and their connections into a unified circuit that allows electrical current to pass between components.
  • printer - A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.
  • Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.
  • Prisma - Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services.
  • privacy compliance - Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.
  • privacy impact assessment (PIA) - A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of a program or system.
  • privacy policy - A privacy policy is a legal document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • private 5G - Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.
  • private API - A private API is an application programming interface that has its application hosted with in-house developers.
  • private branch exchange (PBX) - A private branch exchange is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • private CA (private PKI) - A private CA is an enterprise-specific certificate authority that functions like a publicly trusted CA.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud storage (internal cloud storage) - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private IP address - A private IP address is a range of non-internet facing IP addresses used in an internal network.
  • private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data.
  • private platform as a service (private PaaS) - Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.
  • private sector - The private sector is the part of a country's economic system that is run by individuals and companies, rather than a government entity.
  • privilege creep - Privilege creep is the gradual accumulation of access rights beyond what individuals need to do their job.
  • privileged access management (PAM) - Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an organization's IT environments.
  • problem list - A problem list is a document that states the most important health problems facing a patient such as nontransitive illnesses or diseases, injuries suffered by the patient, and anything else that has affected the patient or is currently ongoing with the patient.
  • problem program - Now seldom used, the term problem program is used to distinguish a computer program that directly supports a user application from an operating system, a utility, or any other underlying support programming.
  • process - A process is an instance of a program running in a computer.
  • Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.
  • process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
  • process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.
  • process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.
  • process manufacturing - Process manufacturing is a production method in which goods are created by combining supplies, ingredients or raw materials using a predetermined formula or recipe.
  • process mining - Process mining is a technique that interprets logs from enterprise applications -- like customer resource management (CRM) and enterprise resource planning (ERP) platforms -- to identify the steps in common business processes, detect variations and prioritize areas of improvement.
  • processing in memory (PIM) - Processing in memory, or PIM (sometimes called processor in memory), refers to the integration of a processor with Random Access Memory (RAM) on a single chip.
  • processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.
  • procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procurement plan - A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor.
  • product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
  • product as a service - Product as a service is the concept of selling the services and outcomes a product can provide rather than the product itself.
  • product data management (PDM) - Product data management (PDM) is the process of capturing and managing the electronic information related to a product so it can be reused in business processes such as design, production, distribution and marketing.
  • product development (new product development -- NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product information management (PIM) - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.
  • product owner - A product owner is a role on a Scrum team that is accountable for the project's outcome.
  • product-qualified lead (PQL) - A product-qualified lead (PQL) is an individual or business that experienced value from using a product as a result of a free trial, use of a limited feature model or other types of first-hand experience with a product.
  • production planning - Production planning is the act of developing a guide for the design and production of a given product or service.
  • productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, spreadsheets and presentations.
  • professional services - A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.
  • professional services automation (PSA) - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
  • profit and loss statement (P&L) - A profit and loss statement (P&L), also called an income statement or statement of operations, is a financial report that shows a company's revenues, expenses and net profit or loss over a given period of time.
  • program - In computing, a program is a specific set of ordered operations for a computer to perform.
  • program counter - A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.
  • program/erase cycle (P/E cycle) - A solid-state storage program/erase cycle (P/E cycle) is a sequence of events in which data is written to a solid-state NAND flash memory cell, such as the type found in a flash or thumb drive, and is subsequently erased and rewritten.
  • programmable automation controller (PAC) - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • programmable network (network programmability) - A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • project charter - A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.
  • project constraint - A constraint in project management is any restriction that defines a project's limitations.
  • project management - Project management is the discipline of using established principles, procedures and policies to guide a project from conception through completion.
  • Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
  • project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.
  • Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
  • Project planning: What is it and 5 steps to create a plan - Project planning is a discipline addressing how to complete a project in a certain timeframe, usually with defined stages and designated resources.
  • Project portfolio management: A beginner's guide - Project portfolio management is a formal approach used by organizations to identify, prioritize, coordinate and monitor projects that align with their strategy and goals.
  • project post-mortem - A project post-mortem is a business process that lets the project team, project management, and other stakeholders review and evaluate the results at the end of a project or after the resolution of an incident.
  • project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
  • Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real-time notifications.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • prompt engineering - Prompt engineering is an AI engineering technique encompassing the process of refining LLMs with specific prompts and recommended outputs, as well as the process of refining input to various generative AI services to generate text or images.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close