Browse Definitions :

Browse Definitions by Alphabet

PRO - WHA

  • programmable network (network programmability) - A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.
  • programmatic advertising - Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • project charter - A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.
  • project constraint - A constraint in project management is any restriction that defines a project's limitations.
  • project management - Project management is the discipline of using established principles, procedures and policies to guide a project from conception through completion.
  • Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
  • project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.
  • Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
  • Project planning: What is it and 5 steps to create a plan - Project planning is a discipline addressing how to complete a project in a certain timeframe, usually with defined stages and designated resources.
  • Project portfolio management: A beginner's guide - Project portfolio management is a formal approach used by organizations to identify, prioritize, coordinate and monitor projects that align with their strategy and goals.
  • project post-mortem - A project post-mortem is a business process that lets the project team, project management, and other stakeholders review and evaluate the results at the end of a project or after the resolution of an incident.
  • project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
  • Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real-time notifications.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • prompt engineering - Prompt engineering is an AI engineering technique encompassing the process of refining LLMs with specific prompts and recommended outputs, as well as the process of refining input to various generative AI services to generate text or images.
  • proof of concept (POC) - A proof of concept (POC) is a demonstration of a product in which work is focused on determining whether an idea can be turned into a reality.
  • proof of concept (PoC) exploit - A proof of concept (PoC) exploit is a non-harmful attack against a computer or network.
  • proof of stake (PoS) - Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.
  • propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.
  • propeller head (or propellor head, prop head, prophead) - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • property management system (PMS) - A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.
  • proportional control - Proportional control is a control system technology in which the response (output) is proportional to the difference between a setpoint value and the current value of a process variable.
  • PropTech (property tech) - PropTech, or property technology, is any form of technology that combines the real estate market with IT in order to help users buy, research, sell or manage property.
  • Protected Extensible Authentication Protocol (PEAP) - Protected Extensible Authentication Protocol (PEAP) is a security protocol commonly used to protect wireless networks.
  • protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • protected mode - Protected mode, also called protected virtual address mode, is the primary mode of operation for an Intel-based x86 microprocessor.
  • protocol data unit (PDU) - In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.
  • proton - A proton is a subatomic particle found in the nucleus of every atom.
  • prototype - A prototype is an early version of a product from which future versions are developed.
  • prototyping model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
  • provisioning - In the context of IT and computing, provisioning refers to the process of setting up IT infrastructure and providing access to authorized users to the various resources that are part of the infrastructure.
  • proxy firewall - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
  • proxy hacking - Proxy hacking is a cyber attack technique designed to supplant an authentic webpage in a search engine's index and search results pages to drive traffic to an imitation site.
  • proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudocode - Pseudocode is a detailed yet readable description of what a computer program or algorithm should do.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • pseudoscience - Pseudoscience is a proposition, a finding or a system of explanation that is presented as science but that lacks the essential rigor of the scientific method.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • PSTN (public switched telephone network) - The public switched telephone network, or PSTN, is the world's collection of interconnected voice-oriented public telephone networks.
  • PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.
  • public cloud storage - Public cloud storage, also called online storage, is a service model that provides data storage on a pay-per-use basis.
  • public data - Public data is information that can be shared, used, reused and redistributed without restriction.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • public key - In cryptography, a public key is a large numerical value that is used to encrypt data.
  • public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • Public-Key Cryptography Standards (PKCS) - Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.
  • public-private partnership (PPP) - A public-private partnership (PPP) is a funding model for public infrastructure projects and initiatives such as a new telecommunications system, public transportation system, airport or power plant.
  • pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
  • pure risk - Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • purple screen of death (PSOD) - A purple screen of death (PSOD) is a diagnostic screen with white type on a purple background that's displayed when the VMkernel of a VMware ESXi host experiences a critical error, becomes inoperative and terminates any virtual machines (VMs) that are running.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • Python - Python is a high-level, general-purpose, interpreted object-oriented programming language.
  • PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
  • Software patch/fix - A software patch or fix is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
  • software portability - Software portability is a characteristic attributed to a computer program if it can run with minimal rework on operating systems (OSes) other than the one for which it was created.
  • The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
  • The Phoenix Project book club - Chapters 1 and 2 podcast - This podcast (with transcript) covers the first two chapters of The Phoenix Project, a popular business and technology book about DevOps.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is PaaS? Platform as a service definition and guide - Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • What is patch management? Lifecycle, benefits and best practices - Patch management is the subset of systems management that involves identifying, acquiring, testing and installing patches, or code changes, that are intended to fix bugs, close security holes or add features.
  • What is PowerShell and how to use it: The ultimate tutorial - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
  • What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
  • What is public cloud? Everything you need to know - A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources and services available to remote users around the world.
Networking
  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

Security
  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close