Browse Definitions :

Browse Definitions by Alphabet

PRI - PRO

  • Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.
  • printout - A hard copy (or "hardcopy") is a printed copy of information from a computer.
  • Prisma - Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services.
  • prisoner's dilemma - The prisoner's dilemma is a games theory scenario that illustrates a non-zero sum problem in which competitors can, through trust and cooperation, yield the optimum potential solution.
  • privacy - On the Internet, privacy, a major concern of users, can be divided into these concerns: What personal information can be shared with whom Whether messages can be exchanged without anyone else seeing them Whether and how one can send messages anonymously Personal Information Privacy Most Web users want to understand that personal information they share will not be shared with anyone else without their permission.
  • Privacy and Electronic Communications Regulations - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • Privacy and Electronic Communications Regulations (PECR) - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • privacy compliance - Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.
  • privacy impact assessment (PIA) - A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization.
  • privacy plan - A privacy plan is an organizational directive that outlines how the organization will protect the personal information of its customers and clients.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • Privacy Shield (EU-US Privacy Shield) - EU-US Privacy Shield is a framework for adherence to E.
  • private API - A private API is an application programming interface that has its application hosted with in-house developers.
  • private automatic branch exchange - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.
  • private automatic branch exchange (PABX) - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.
  • private branch exchange - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • private branch exchange - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • private branch exchange (PBX) - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • private CA (private PKI) - Private CA stands for private certification authority and is an enterprise specific CA that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private cloud storage - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private cloud storage (internal cloud storage) - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private equity - Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).
  • private IP address - A private IP address is a range of non-internet facing IP addresses used in an internal network.
  • private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.
  • private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data.
  • private PaaS (private platform as a service) - Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.
  • private port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • private sector - The private sector is the part of a country's economic system that is run by individuals and companies, rather than the government.
  • privatization - Privatization is the process of transferring an enterprise or industry from the public sector to the private sector.
  • privilege creep - Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job.
  • privilege escalation attack - A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
  • privileged access management (PAM) - Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • privileges - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
  • PRM - Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.
  • PRNG - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • proactive / reactive chat - Proactive chat is initiated by a website according to business rules that are triggered by user behavior; reactive chat is user-initiated.
  • proactive provider participation for P2P - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.
  • probabilistic robotics - Probabilistic robotics, also called statistical robotics, is a field of robotics that involves the control and behavior of robots in environments subject to unforeseeable events.
  • probability - Probability is a branch of mathematics that deals with calculating the likelihood of a given event's occurrence, which is expressed as a number between 1 and 0.
  • probe - In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.
  • problem - A problem, in an IT service management (ITSM) context, is an issue that could cause an incident.
  • problem exists between chair and keyboard - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • problem list - A problem list is a document that catalogs a patient's health problems, including nontransitive illnesses, injuries and anything else that has or is affecting the patient.
  • problem management - Problem management, in information technology, is a process aimed at resolving incidents and problems caused by end-user errors or IT infrastructure issues, and preventing recurrence of such incidents.
  • problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • procedural language extension to structured query language - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).
  • process - A process is an instance of a program running in a computer.
  • Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.
  • process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
  • process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.
  • process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.
  • process manufacturing - Process manufacturing is a production method that creates goods by combining supplies, ingredients or raw materials using a formula or recipe.
  • process mining software - Process mining software is a type of programming that analyzes data in enterprise application event logs in order to learn how business processes are actually working.
  • process-centric BPM - Process-centric business process management is a holistic approach to BPM that centers on processes themselves, rather than individual  components such as  documents, workflow or people.
  • processing in memory - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.
  • processing in memory (PIM) - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.
  • processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.
  • processor serial number - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.
  • procrastination - Procrastination is the habit of delaying tasks beyond a realistic timeframe for their completion.
  • procure to pay - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procurement card - A procurement card is a type of company charge card used in making smaller purchases for greater cost efficiency, control and convenience.
  • procurement plan - A procurement plan -- also called a procurement management plan -- is a document that justifies the need for an external supplier and explains how the process of finding a supplier will be performed.
  • procurement software - Procurement software is a computer program or suite that allows an organization to automate the processes of purchasing materials and maintaining an inventory of goods.
  • Producer Price Index (PPI) - The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.
  • product - In information technology, a product is something (for example, a software application) that is created and then made available to customers, usually with a distinct name or order number.
  • product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
  • product as a service - Product as a service is the concept of selling the services and outcomes a product can provide rather than the product itself.
  • product backlog grooming - Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.
  • product data management (PDM) - Product data management (PDM) involves capturing and managing the electronic information related to a product so it can be used in various business processes, including production and marketing.
  • product development - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product development (new product development - NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product development management - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product footprint - The product footprint is an assessment of the impact a particular product has on the environment.
  • product information management - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.
  • product information management (PIM) - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.
  • product lifecycle - The product lifecycle is the collective stages that a product goes through from its conception and design through to its ultimate disposal.
  • product lifecycle (in marketing) - The product lifecycle, in a marketing context, is all the stages of a product's life span that are related to its promotion and sales.
  • product lifecycle management - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.
  • product lifecycle management (PLM) - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.
  • product lifecycle sustainability - Product lifecycle sustainability is an approach to managing the stages of a product’s existence so that any negative impact on the environment is minimized.
  • product owner - A product owner is a role on a Scrum team that is accountable for the project's outcome.
  • product placement - Product placement is the inclusion of a branded product in media, usually without explicit reference to the product.
  • product positioning - Product positioning is the tailored presentation of a product or brand for a specific targeted demographic.
  • Product Qualified Lead (PQL) - A product qualified lead (PQL) is an individual and business who has experienced value from using a product as a result of a free trial, use of a limited feature model, or other type of actual experience with the product.
  • product-agnostic - Product-agnostic is a description of something that is not associated with a particular commercial product -- such as a specific device or application -- or something that is interoperable with all products of a given type.
  • production data - Production data is data that is persistently stored and essential to completing day-to-day business tasks and processes.
  • production planning - Production planning is the act of developing a guide for the design and production of a given product or service.
  • production server - A production server is a server used to host website content and applications for deployment to a live environment.
  • productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, worksheets and presentations.
  • professional emancipation - Professional emancipation is an approach to work that focuses on the ability of individuals to guide and control their careers and work life.
  • professional services - A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.
  • professional services automation (PSA) - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
  • profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.
  • Profile-Driven Storage - Profile-Driven Storage is a feature in vSphere 5 that lets users to intelligently provision applications, mapping VMs to storage levels according to service levels, availability, performance needs or cost.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

Close