Browse Definitions by Alphabet
- public cloud storage - Public cloud storage, also called online storage, is a service model that provides data storage on a pay-per-use basis.
- public data - Public data is information that can be shared, used, reused and redistributed without restriction.
- public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
- Public-Key Cryptography Standards (PKCS) - Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.
- public-private partnership (PPP) - A public-private partnership (PPP) is a funding model for public infrastructure projects and initiatives such as a new telecommunications system, public transportation system, airport or power plant.
- pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
- purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
- Pure Storage - Pure Storage is a provider of enterprise data flash storage products designed to substitute for electromechanical disk arrays.
- purple screen of death (PSOD) - A purple screen of death (PSOD) is a diagnostic screen with white type on a purple background that's displayed when the VMkernel of a VMware ESXi host experiences a critical error, becomes inoperative and terminates any virtual machines (VMs) that are running.
- purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
- push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
- Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
- Python - Python is a high-level, general-purpose, interpreted object-oriented programming language.
- PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
- software portability - Software portability is a characteristic attributed to a computer program if it can run with minimal rework on operating systems (OSes) other than the one for which it was created.
- The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
- What are performance appraisals? A how-to guide for managers - A performance appraisal is the structured practice of regularly reviewing an employee's job performance.
- What are port numbers and how do they work? - A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
- What are predictive networks and how do they work? - Predictive networks are intelligent IT network systems that use artificial intelligence (AI), machine learning (ML) and real-time analytics to anticipate and proactively address network issues before they occur.
- What is a pandemic plan? - A pandemic plan is a documented strategy for how an organization plans to provide essential services when there is a widespread outbreak of an infectious disease.
- What is a paperless office? - The paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.
- What is a partition in computers? - A partition is a logical division of a hard disk drive (HDD) that's treated as a separate unit by operating systems (OSes) and file systems.
- What is a pass-the-hash attack? - A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
- What is a passkey? - A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
- What is a password? - A password is a string of characters used to verify the identity of a user during the authentication process.
- What is a perceptron? - A perceptron is a simple model of a biological neuron used in an artificial neural network.
- What is a personal area network (PAN)? - A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few meters.
- What is a PERT chart? And how to use it, with examples - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks in a project.
- What is a pivot table? How to use in Excel and Sheets - A pivot table is a statistics tool that summarizes and reorganizes selected columns and rows of data in a spreadsheet or database table to obtain a desired report.
- What is a PMO (project management office)? - A project management office (PMO) is a group, agency or department that defines and maintains the standards of project management for a company.
- What is a point of presence (PoP)? - A point of presence (PoP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.
- What is a potentially unwanted program (PUP)? - A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download it.
- What is a power distribution unit (PDU)? - A power distribution unit (PDU) is a device for controlling data center electrical power.
- What is a private API? - A private API is an application programming interface that's designed for use within an organization and not for external consumption.
- What is a private cloud? Definition and examples - Private cloud is a type of cloud computing that delivers advantages similar to public cloud, including scalability and self-service, but through a proprietary architecture.
- What is a private key? - A private key, also known as a secret key, is a variable in cryptography used with an algorithm to encrypt or decrypt data.
- What is a procurement plan? - A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor.
- What is a product owner? - A product owner is a role on a Scrum team that is responsible for the project's outcome.
- What is a programmable automation controller (PAC)? - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
- What is a programmable network (network programmability)? - A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control.
- What is a project charter? Definition and examples - A project charter is a formal short document stating that a project exists and providing project managers with written authority to begin work.
- What is a property management system (PMS)? - A property management system (PMS) is a software application that supports the operations of hospitality accommodations and commercial or residential rental properties.
- What is a protocol data unit (PDU)? - A protocol data unit (PDU) is the basic unit of exchange between entities that communicate with a specified networking protocol.
- What is a proxy firewall? - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
- What is a proxy server? Definition and use cases - A proxy server is an intermediary between a user and the internet.
- What is a public key and how does it work? - In cryptography, a public key is a large numerical value that is used to encrypt data.
- What is a public key certificate? - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
- What is PaaS? Platform as a service definition and guide - Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
- What is packet loss in networking? - Packet loss is when one or more transmitted data packets fail to arrive at their destination.
- What is parallel processing? - Parallel processing is a method in computing of running two or more processors, or CPUs, to handle separate parts of an overall task.
- What is parity in computing? - In computers, parity (from the Latin paritas, meaning "equal or equivalent") is a technique that checks whether data has been lost or written over when it is moved from one place in storage to another or when it is transmitted between computers.
- What is Pascal case? - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
- What is passive keyless entry (PKE)? - Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit.
- What is password cracking? - Password cracking is the process of using an application program to identify an unknown or forgotten password that allows access to a computer or network resource.
- What is passwordless authentication? - Passwordless authentication allows a user to sign into a service without using a password.
- What is patch management? Lifecycle, benefits and best practices - Patch management is the subset of systems management that involves identifying, acquiring, testing and installing patches, or code changes, that are intended to fix bugs, close security holes or add features.
- What is pattern recognition? - Pattern recognition is the ability to detect arrangements of characteristics in data that yields information about a given system or data set.
- What is pay for performance (P4P)? - Pay for performance (P4P) in healthcare is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
- What is pay-as-you-go cloud computing (PAYG cloud computing)? - Pay-as-you-go cloud computing, or PAYG cloud computing, is a payment method for cloud computing that charges based on usage.
- What is payroll software? - Payroll software automates the process of paying salaried, hourly and contingent employees.
- What is PC as a service (PCaaS)? - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware (PCs) and management services from a vendor instead of purchasing them outright.
- What is PCI DSS (Payment Card Industry Data Security Standard)? - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
- What is PDCA (Plan, Do, Check, Act)? - PDCA (Plan, Do, Check, Act, sometimes seen as Plan, Do, Check, Adjust) is a repetitive four-stage model for continuous improvement in business process management.
- What is penetration testing? - A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
- What is PeopleSoft? - PeopleSoft is an enterprise resource planning (ERP) software suite owned by Oracle Corporation.
- What is perfect forward secrecy (PFS)? - Perfect forward secrecy (PFS), also known as forward secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
- What is performance management software? - Performance management software is a tool that enables human resources (HR) teams to measure and track the performance of employees and to implement appropriate programs or strategies to ensure that employee performance is aligned with the organization's business objectives and goals.
- What is Perplexity AI? - Perplexity AI is an artificial intelligence-powered web search tool that can generate answers to user queries and complete other content-generation tasks.
- What is personal cloud storage (PCS)? - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
- What is pharming? - Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.
- What is PHI (protected or personal health information)? - Protected health information (PHI), also referred to as 'personal health information,' is the demographic information, medical histories, test and laboratory results, physical and mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
- What is PHI breach (protected health information breach)? - A PHI (protected health information) breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates.
- What is phishing? Understanding enterprise phishing threats - Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information.
- What is physical security and how does it work? - Physical security protects personnel, hardware, software, networks, facilities and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
- What is picture archiving and communication system (PACS)? - Picture archiving and communication system (PACS) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically relevant reports.
- What is ping and how does it work? - Ping (Packet Internet Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address is reachable and can respond to network requests.
- What is pipelining? - Pipelining is the process of a computer processor executing computer instructions as separate stages.
- What is PKI (public key infrastructure)? - PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption.
- What is PL/SQL (Procedural Language/Structured Query Language)? - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).
- What is podcasting? - Podcasting is the preparation and distribution of digital audio files to the computers of subscribed users using Really Simple Syndication (RSS) feeds.
- What is Point-to-Point Protocol over Ethernet (PPPoE)? - Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints.
- What is population health management (PHM)? - Population health management (PHM) is a data-driven discipline within the healthcare industry that seeks to improve health outcomes for a defined population.
- What is port address translation (PAT)? - Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public Internet Protocol address by using network ports.
- What is post-quantum cryptography? Comprehensive guide - Post-quantum cryptography, also known as quantum encryption or PQC, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers.
- What is PowerShell and how to use it: The ultimate tutorial - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
- What is precision medicine (PM)? - Precision medicine (PM), also referred to as personalized or individualized medicine, continues to evolve as an important process in healthcare in which physicians and other caregivers develop treatments for patients based on genetic makeup, socioeconomic status and lifestyles.
- What is prediction error? - A prediction error is the failure of a model of a system to accurately forecast outcomes.
- What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
- What is prescriptive analytics? - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
- What is Pretty Good Privacy and how does it work? - Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
- What is private PaaS? How is it different from public PaaS? - Private platform as a service (private PaaS) is a cloud computing model that facilitates the development, deployment and management of software applications in a private cloud.
- What is privileged access management (PAM)? - Privileged access management (PAM) is a security framework designed to protect organizations against cyberthreats by controlling and monitoring access to critical information and resources.
- What is procure-to-pay (P2P)? - Procure-to-pay (P2P), also known as purchase-to-pay, is the process organizations use to obtain essential resources.
- What is product analytics, and why is it important? - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
- What is product as a service? - Product as a service (PaaS) is the concept of selling the services and outcomes a product can provide rather than the product itself.
- What is production planning and why is it important? - Production planning is the act of developing a guide for the design and production of a given product or service.
- What is professional services automation (PSA)? - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
- What is programmatic advertising and how does it work? - Programmatic advertising is a data-driven method that automates the process of buying and selling digital advertisements.
- What is Project Management Body of Knowledge (PMBOK)? - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
- What is promiscuous mode in networking? - In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host.