Browse Definitions by Alphabet
- What is pipelining? - Pipelining is the process of a computer processor executing computer instructions as separate stages.
- What is PKI (public key infrastructure)? - PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption.
- What is podcasting? - Podcasting is the preparation and distribution of digital audio files to the computers of subscribed users using Really Simple Syndication (RSS) feeds.
- What is port address translation (PAT)? - Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public Internet Protocol address by using network ports.
- What is PowerShell and how to use it: The ultimate tutorial - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
- What is prediction error? - A prediction error is the failure of a model of a system to accurately forecast outcomes.
- What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
- What is prescriptive analytics? - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
- What is Pretty Good Privacy and how does it work? - Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
- What is private PaaS? How is it different from public PaaS? - Private platform as a service (private PaaS) is a cloud computing model that facilitates the development, deployment and management of software applications in a private cloud.
- What is privileged access management (PAM)? - Privileged access management (PAM) is a security framework designed to protect organizations against cyberthreats by controlling and monitoring access to critical information and resources.
- What is procure-to-pay (P2P)? - Procure-to-pay (P2P), also known as purchase-to-pay, is the process organizations use to obtain essential resources.
- What is product as a service? - Product as a service (PaaS) is the concept of selling the services and outcomes a product can provide rather than the product itself.
- What is production planning and why is it important? - Production planning is the act of developing a guide for the design and production of a given product or service.
- What is professional services automation (PSA)? - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
- What is programmatic advertising and how does it work? - Programmatic advertising is a data-driven method that automates the process of buying and selling digital advertisements.
- What is Project Management Body of Knowledge (PMBOK)? - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
- What is promiscuous mode in networking? - In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host.
- What is prompt chaining? Definition and benefits - Prompt chaining is a technique used when working with generative artificial intelligence (generative AI) models in which the output from one prompt is used as input for the next.
- What is prompt engineering? - Prompt engineering is an artificial intelligence (AI) engineering technique that refines large language models (LLMs), with specific prompts and recommended outputs.
- What is PSTN (public switched telephone network)? - PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks via traditional circuit-switched networks.
- What is public cloud? A definition and in-depth guide - A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources, applications and services available on demand to remote users around the world.
- What is PUE (power usage effectiveness)? - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
- What is pure risk? - Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain.
- What is the Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare)? - The Affordable Care Act (ACA), formally known as the Patient Protection and Affordable Care Act, is a landmark healthcare law Congress enacted and former President Barack Obama signed in March 2010.
- What is Wi-Fi Piggybacking? - Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority.