Browse Definitions :

Browse Definitions by Alphabet

PRO - PUS

  • problem list - A problem list is a document that states the most important health problems facing a patient such as nontransitive illnesses or diseases, injuries suffered by the patient, and anything else that has affected the patient or is currently ongoing with the patient.
  • problem program - Now seldom used, the term problem program is used to distinguish a computer program that directly supports a user application from an operating system, a utility, or any other underlying support programming.
  • process - A process is an instance of a program running in a computer.
  • Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.
  • process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
  • process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.
  • process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.
  • process manufacturing - Process manufacturing is a production method that creates goods by combining supplies, ingredients or raw materials using a formula or recipe.
  • process mining software - Process mining software is a type of programming that analyzes data in enterprise application event logs in order to learn how business processes are actually working.
  • processing in memory (PIM) - Processing in memory, or PIM (sometimes called processor in memory), refers to the integration of a processor with Random Access Memory (RAM) on a single chip.
  • processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.
  • procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procurement card - A procurement card is a type of company charge card used in making smaller purchases for greater cost efficiency, control and convenience.
  • procurement plan - A procurement plan -- also called a procurement management plan -- is a document that justifies the need for an external supplier and explains how the process of finding a supplier will be performed.
  • procurement software - Procurement software is a computer program or suite that allows an organization to automate the processes of purchasing materials and maintaining an inventory of goods.
  • Producer Price Index (PPI) - The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.
  • product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
  • product as a service - Product as a service is the concept of selling the services and outcomes a product can provide rather than the product itself.
  • product backlog grooming - Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.
  • product data management (PDM) - Product data management (PDM) is the process of capturing and managing the electronic information related to a product so it can be reused in business processes such as design, production, distribution and marketing.
  • product development (new product development -- NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product information management (PIM) - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.
  • product lifecycle management (PLM) - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.
  • product owner - A product owner is a role on a Scrum team that is accountable for the project's outcome.
  • Product Qualified Lead (PQL) - A product qualified lead (PQL) is an individual and business who has experienced value from using a product as a result of a free trial, use of a limited feature model, or other type of actual experience with the product.
  • product-agnostic - Product-agnostic is a description of something that is not associated with a particular commercial product -- such as a specific device or application -- or something that is interoperable with all products of a given type.
  • production data - Production data is data that is persistently stored and essential to completing day-to-day business tasks and processes.
  • production planning - Production planning is the act of developing a guide for the design and production of a given product or service.
  • production server - A production server is a server used to host website content and applications for deployment to a live environment.
  • productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, spreadsheets and presentations.
  • professional services - A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.
  • professional services automation (PSA) - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
  • profit and loss statement (P&L) - A profit and loss statement (P&L), also known as an income statement, is a financial report that shows a company's revenues and expenses over a given period of time, usually a fiscal quarter or year.
  • profitability analysis - Profitability analysis is a component of enterprise resource planning (ERP) that allows administrators to forecast the profitability of a proposal or optimize the profitability of an existing project.
  • program - In computing, a program is a specific set of ordered operations for a computer to perform.
  • program counter - A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.
  • program/erase cycle (P/E cycle) - A solid-state storage program/erase cycle (P/E cycle) is a sequence of events in which data is written to a solid-state NAND flash memory cell, such as the type found in a flash or thumb drive, and is subsequently erased and rewritten.
  • programmable automation controller (PAC) - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • programmable network (network programmability) - A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.
  • programmatic advertising - Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.
  • progressive scan - Progressive scan is a display and signal type in which the entire image is refreshed every cycle.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • project charter - A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.
  • project management - Project management is the discipline of using established principles, procedures and policies to successfully guide a project from conception through completion.
  • Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
  • project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.
  • Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
  • Project planning: What is it and 5 steps to create a plan - Project planning is a discipline addressing how to complete a project in a certain timeframe, usually with defined stages and designated resources.
  • project post-mortem - Project post-mortem is a process intended to inform project improvements by determining aspects that were successful or unsuccessful.
  • project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
  • Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real time notifications.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • proof of concept (POC) - A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.
  • proof of concept (PoC) exploit - A proof of concept (PoC) exploit is a non-harmful attack against a computer or network.
  • proof of stake (PoS) - Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.
  • propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.
  • propeller head (or propellor head, prop head, prophead) - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • property management system (PMS) - A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.
  • proportional control - Proportional control is a control system technology based on a response in proportion to the difference between what is set as a desired process variable (or set point) and the current value of the variable.
  • proportionality - In mathematics, proportionality indicates that two quantities or variables are related in a linear manner.
  • proprietary - In information technology, proprietary describes a technology or product that is owned exclusively by a single company.
  • PropTech (property tech) - PropTech, or property technology, is any form of technology that combines the real estate market with IT in order to help users buy, research, sell or manage property.
  • protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • protected mode - Protected mode is a mode of program operation in a computer with an Intel-based microprocessor in which the program is restricted to addressing a specific contiguous area of 640 kilobytes.
  • Proteus effect - The Proteus effect is the tendency for people to be affected by their digital representations, such as avatars, dating profiles and social media personas.
  • protocol data unit (PDU) - In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.
  • proton - A proton is a subatomic particle found in the nucleus of every atom.
  • prototype - In software development, a prototype is a rudimentary working model of a product or information system, usually built for demonstration purposes or as part of the development process.
  • Prototyping Model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
  • provisioning - In general, provisioning means "providing" or making something available.
  • proxy firewall - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
  • proxy hacking - Proxy hacking is a cyber attack technique designed to supplant an authentic webpage in a search engine's index and search results pages to drive traffic to an imitation site.
  • proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudocode - Pseudocode (pronounced SOO-doh-kohd) is a detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • pseudoscience - Pseudoscience is a proposition, a finding or a system of explanation that is presented as science but that lacks the essential rigor of the scientific method.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • PSTN (public switched telephone network) - The public switched telephone network, or PSTN, is the world's collection of interconnected voice-oriented public telephone networks.
  • PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.
  • public cloud storage - Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a pay-per-use basis, similar to the way a public utility like electric or gas provides and charges for services.
  • public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • public key - In cryptography, a public key is a large numerical value that is used to encrypt data.
  • public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • Public-Key Cryptography Standards (PKCS) - Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.
  • public-private partnership (PPP) - A public-private partnership (PPP) is a funding model for public infrastructure projects and initiatives such as a new telecommunications system, public transportation system, airport or power plant.
  • published applications - Published applications are virtual software programs that function as if they were installed locally.
  • pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
  • pure risk - Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • purple screen of death (PSOD) - A purple screen of death (PSOD) is a diagnostic screen with white type on a purple background that's displayed when the VMkernel of a VMware ESXi host experiences a critical error, becomes inoperative and terminates any virtual machines (VMs) that are running.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close