Browse Definitions :

Browse Definitions by Alphabet

PRI - PRO

  • Primavera - Primavera Systems Inc.
  • prime contract - A prime contract is any contract or contractual action that is awarded directly to a contractor by the U.
  • prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.
  • primitive - In computer programming, a primitive (pronounced PRIH-muh-teev) is a basic interface or segment of code that can be used to build more sophisticated program elements or interfaces.
  • PRINCE 2 - PRINCE2 is a project management methodology developed by the government of the United Kingdom (UK) and used internationally, especially in information technology (IT) environments.
  • PRINCE2 - PRINCE2 is a project management methodology developed by the government of the United Kingdom (UK) and used internationally, especially in information technology (IT) environments.
  • principle of least privilege - The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
  • principle of least privilege (POLP) - The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
  • print bed - A print bed is the surface on a 3D printer where a print head lays down the materials that make up a 3D print.
  • print server - A print server is a software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators.
  • print server - Test yourself.
  • printed circuit board (PCB) - A printed circuit board (PCB) is the board base for physically supporting and wiring surface-mounted and socketed components in most electronics.
  • printer - A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper.
  • Printer Control Language - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • Printer Control Language (PCL) - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • printer pool - Printer pooling is a standard feature of Windows NT, 2000, XP, Vista and Windows 7 that allows agroup of printers to share the same name and function as if they were one printer.
  • Printing terms: Glossary - This is a WhatIs.
  • printout - A hard copy (or "hardcopy") is a printed copy of information from a computer.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • Prisma - Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services.
  • prisoner's dilemma - The prisoner's dilemma is a games theory scenario that illustrates a non-zero sum problem in which competitors can, through trust and cooperation, yield the optimum potential solution.
  • privacy - On the Internet, privacy, a major concern of users, can be divided into these concerns: What personal information can be shared with whom Whether messages can be exchanged without anyone else seeing them Whether and how one can send messages anonymously Personal Information Privacy Most Web users want to understand that personal information they share will not be shared with anyone else without their permission.
  • Privacy and Electronic Communications Regulations - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • Privacy and Electronic Communications Regulations (PECR) - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • privacy compliance - Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.
  • privacy impact assessment (PIA) - A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization.
  • privacy plan - A privacy plan is an organizational directive that outlines how the organization will protect the personal information of its customers and clients.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • Privacy Shield (EU-US Privacy Shield) - EU-US Privacy Shield is a framework for adherence to E.
  • private API - A private API is an application programming interface that has its application hosted with in-house developers.
  • private automatic branch exchange - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.
  • private automatic branch exchange (PABX) - A private automatic branch exchange (PABX) is an automatic telephone switching system within a private enterprise.
  • private branch exchange - A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.
  • private branch exchange - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • private branch exchange (PBX) - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • private CA (private PKI) - Private CA stands for private certification authority and is an enterprise specific CA that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • private cloud (internal cloud or corporate cloud) - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private cloud storage - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private cloud storage (internal cloud storage) - Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.
  • private equity - Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).
  • private IP address - A private IP address is a non-Internet facing IP address on an internal network.
  • private key - A private (secret) key is an encryption key whose value should never be made public.
  • private key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.
  • private PaaS (private platform as a service) - Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.
  • private port numbers - The dynamic port numbers (also known as the private port numbers) are the port numbers that are available for use by any application to use in communicating with any other application, using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • private sector - The private sector is the part of a country's economic system that is run by individuals and companies, rather than the government.
  • privatization - Privatization is the process of transferring an enterprise or industry from the public sector to the private sector.
  • privilege - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
  • privilege bracketing - Privilege bracketing is the practice of limiting temporarily increased permission levels to the briefest possible time period.
  • privilege creep - Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job.
  • privilege escalation attack - A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
  • privileged access management (PAM) - Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • privileges - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
  • PRNG - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • proactive / reactive chat - Proactive chat is initiated by a website according to business rules that are triggered by user behavior; reactive chat is user-initiated.
  • proactive provider participation for P2P - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.
  • probabilistic robotics - Probabilistic robotics, also called statistical robotics, is a field of robotics that involves the control and behavior of robots in environments subject to unforeseeable events.
  • probability - Probability is a branch of mathematics that deals with calculating the likelihood of a given event's occurrence, which is expressed as a number between 1 and 0.
  • probe - In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.
  • problem - A problem, in an IT service management (ITSM) context, is an issue that could cause an incident.
  • problem exists between chair and keyboard - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • problem list - A problem list is a document that catalogs a patient's health problems, including nontransitive illnesses, injuries and anything else that has or is affecting the patient.
  • problem management - Problem management, in information technology, is a process aimed at resolving incidents and problems caused by end-user errors or IT infrastructure issues, and preventing recurrence of such incidents.
  • problems - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • procedural language extension to structured query language - In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).
  • process - A process is an instance of a program running in a computer.
  • Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.
  • process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
  • process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.
  • process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.
  • process manufacturing - Process manufacturing is a production method that creates goods by combining supplies, ingredients or raw materials using a formula or recipe.
  • process mining software - Process mining software is a type of programming that analyzes data in enterprise application event logs in order to learn how business processes are actually working.
  • process-centric BPM - Process-centric business process management is a holistic approach to BPM that centers on processes themselves, rather than individual  components such as  documents, workflow or people.
  • processing in memory - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.
  • processing in memory (PIM) - Processing in memory (PIM, sometimes called processor in memory) is the integration of a processor with RAM (usually DRAM or SRAM) on a single chip.
  • processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.
  • processor serial number - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.
  • processor serial number (PSN) - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.
  • procrastination - Procrastination is the habit of delaying tasks beyond a realistic timeframe for their completion.
  • procure to pay - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
  • procurement card - A procurement card is a type of company charge card used in making smaller purchases for greater cost efficiency, control and convenience.
  • procurement plan - A procurement plan -- also called a procurement management plan -- is a document that justifies the need for an external supplier and explains how the process of finding a supplier will be performed.
  • procurement software - Procurement software is a computer program or suite that allows an organization to automate the processes of purchasing materials and maintaining an inventory of goods.
  • Producer Price Index (PPI) - The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.
  • product - In information technology, a product is something (for example, a software application) that is created and then made available to customers, usually with a distinct name or order number.
  • product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
  • product as a service - Product as a service is the concept of selling the services and outcomes a product can provide rather than the product itself.
  • product backlog grooming - Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.
  • product data management (PDM) - Product data management (PDM) involves capturing and managing the electronic information related to a product so it can be used in various business processes, including production and marketing.
  • product development - Product development, or new product development (NPD), is the process of bringing new or updated products or services to a target market through a systematic approach to idea creation, design, marketing and commercialization.
  • product development (new product development - NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product development management - Product development, or new product development (NPD), is the process of bringing new or updated products or services to a target market through a systematic approach to idea creation, design, marketing and commercialization.
  • product footprint - The product footprint is an assessment of the impact a particular product has on the environment.
  • product information management - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.
  • product information management (PIM) - Product information management (PIM) is a classification of software products that support the global identification, linking and synchronization of product information across heterogeneous data sources.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close