Browse Definitions by Alphabet
- What is port address translation (PAT)? - Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 addresses to a single public Internet Protocol address by using network ports.
- What is post-quantum cryptography? Comprehensive guide - Post-quantum cryptography, also known as quantum encryption or PQC, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers.
- What is PowerShell and how to use it: The ultimate tutorial - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
- What is precision medicine (PM)? - Precision medicine (PM), also referred to as personalized or individualized medicine, continues to evolve as an important process in healthcare in which physicians and other caregivers develop treatments for patients based on genetic makeup, socioeconomic status and lifestyles.
- What is prediction error? - A prediction error is the failure of a model of a system to accurately forecast outcomes.
- What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
- What is prescriptive analytics? - Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.
- What is Pretty Good Privacy and how does it work? - Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
- What is private PaaS? How is it different from public PaaS? - Private platform as a service (private PaaS) is a cloud computing model that facilitates the development, deployment and management of software applications in a private cloud.
- What is privileged access management (PAM)? - Privileged access management (PAM) is a security framework designed to protect organizations against cyberthreats by controlling and monitoring access to critical information and resources.
- What is procure-to-pay (P2P)? - Procure-to-pay (P2P), also known as purchase-to-pay, is the process organizations use to obtain essential resources.
- What is product analytics, and why is it important? - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
- What is product as a service? - Product as a service (PaaS) is the concept of selling the services and outcomes a product can provide rather than the product itself.
- What is production planning and why is it important? - Production planning is the act of developing a guide for the design and production of a given product or service.
- What is professional services automation (PSA)? - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
- What is programmatic advertising and how does it work? - Programmatic advertising is a data-driven method that automates the process of buying and selling digital advertisements.
- What is Project Management Body of Knowledge (PMBOK)? - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
- What is promiscuous mode in networking? - In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host.
- What is prompt chaining? Definition and benefits - Prompt chaining is a technique used when working with generative artificial intelligence (generative AI) models in which the output from one prompt is used as input for the next.
- What is prompt engineering? - Prompt engineering is an artificial intelligence (AI) engineering technique that refines large language models (LLMs), with specific prompts and recommended outputs.
- What is PSTN (public switched telephone network)? - PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks via traditional circuit-switched networks.
- What is public cloud? A definition and in-depth guide - A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources, applications and services available on demand to remote users around the world.
- What is PUE (power usage effectiveness)? - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
- What is pure risk? - Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain.
- What is the Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare)? - The Affordable Care Act (ACA), formally known as the Patient Protection and Affordable Care Act, is a landmark healthcare law Congress enacted and former President Barack Obama signed in March 2010.
- What is the principle of least privilege (POLP)? - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
- What is Wi-Fi Piggybacking? - Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority.