Browse Definitions :

Browse Definitions by Alphabet

PRO - PSE

  • profit and loss statement (P&L) - A profit and loss statement (P&L), also known as an income statement, is a financial report that shows a company's revenues and expenses over a given period of time, usually a fiscal quarter or year.
  • profit margin - A profit margin is the difference between what it costs a business to get a product or service to market and the price it charges for it.
  • profitability analysis - Profitability analysis is a component of enterprise resource planning (ERP) that allows administrators to forecast the profitability of a proposal or optimize the profitability of an existing project.
  • program - In computing, a program is a specific set of ordered operations for a computer to perform.
  • program counter - A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.
  • Program Evaluation Review Technique - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • program language generations - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • program layer - In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
  • program temporary fix - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.
  • programmable automation controller (PAC) - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
  • programmable economy - The programmable economy is a term created by research firm Gartner Inc.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • programmable network (PN) - A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently from network hardware.
  • programmable read only memory - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.
  • programmable read-only memory - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.
  • programmable read-only memory (PROM) - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.
  • programmatic advertising - Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.
  • programmatic marketing - Programmatic marketing is best defined in two parts.
  • Programmed Data Processor 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • Programmed Data Processor-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • Programmed Input Output - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.
  • Programmed Input/Output - Programmed Input/Output (PIO) is a way of moving data between devices in a computer in which all data must pass through the processor.
  • Programmed Logic for Automatic Teaching Operations - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.
  • programming language generations - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • progressive delivery - Progressive delivery is the process of pushing changes to a product iteratively -- first to a small audience and then to increasingly larger audiences to maintain quality control (QC).
  • progressive profiling - Progressive profiling is a marketing technique that involves gradually collecting information about leads, or prospective customers, with iterative releases of forms asking questions intended to advance the sales cycle.
  • progressive scan - Progressive scan is a display and signal type in which the entire image is refreshed every cycle.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • project and portfolio management - PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.
  • Project AppBlast - AppBlast is a VMware initiative that allows users to access their Windows and Mac applications from any device running an HTML 5 browser.
  • Project Blackbox - Sun Microsystems' Modular Datacenter (known as "Project Blackbox" in the prototype phase) is a mobile and virtualized data center packaged in a standard 20-foot shipping container.
  • project charter (PC) - A project charter (PC) is a document that states a project exists and the project manager has written authority to begin work.
  • project management - Project management is the discipline of using established principles, procedures and policies to successfully guide a project from conception through completion.
  • Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
  • project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.
  • Project Management Office - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.
  • Project Management Professional - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Management vocabulary quiz - This quiz tests your knowledge of project management terminology.
  • Project Nao - Project Nao, also called the Nao Project, is an ongoing venture dedicated to the development and mass production of an intelligent humanoid robot for the consumer market.
  • Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
  • Project Owl - Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.
  • project plan - Project planning is a discipline for stating how to complete a project within a certain timeframe, usually with defined stages, and with designated resources.
  • Project planning: What is it and 5 steps to create a plan - Project planning is a discipline addressing how to complete a project in a certain timeframe, usually with defined stages and designated resources.
  • project post-mortem - Project post-mortem is a process intended to inform project improvements by determining aspects that were successful or unsuccessful.
  • project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
  • Project Vault - Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.
  • projector mapping - Projector mapping (also known as projection mapping or video mapping) is the use of standard projectors to display 2D and 3D images on real world objects.
  • projector phone - A projector phone is a smartphone with an embedded pico projector.
  • PROM - Programmable read-only memory (PROM) is read-only memory (ROM) that can be modified once by a user.
  • Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real time notifications.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • pronoun - A pronoun is a non-specific word that stands in for a noun, in situations where it should be clearly understood what or whom the pronoun refers to.
  • proof of concept (POC) - A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.
  • proof of concept (PoC) exploit - A proof of concept (PoC) exploit is a non-harmful attack against a computer or network.
  • prop head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.
  • propeller head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • propeller head (or propellor head, prop head, prophead) - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • propellor head - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • property management system (PMS) - A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.
  • prophead - A propeller head (also spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some technical field.
  • proportion - In general, a ratio is a way of concisely showing the relationship between two quantities of something.
  • proportional control - Proportional control is a control system technology based on a response in proportion to the difference between what is set as a desired process variable (or set point) and the current value of the variable.
  • proportionality - In mathematics, proportionality indicates that two quantities or variables are related in a linear manner.
  • proprietary - In information technology, proprietary describes a technology or product that is owned exclusively by a single company.
  • proprietary solution - A proprietary solution is a hardware or software product or combination of products and services that is tied to a specific vendor, to the exclusion of all other vendors.
  • PropTech (property tech) - PropTech, or property technology, is any form of technology that combines the real estate market with IT in order to help users buy, research, sell or manage property.
  • Protected Extensible Authentication Protocol - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • protected mode - Protected mode is a mode of program operation in a computer with an Intel-based microprocessor in which the program is restricted to addressing a specific contiguous area of 640 kilobytes.
  • Protecting America's Critical Infrastructures - HSPD-7 (Homeland Security Presidential Directive No.
  • Proteus effect - The Proteus effect is the tendency for people to be affected by their digital representations, such as avatars, dating profiles and social media personas.
  • protocol analyzer - A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity.
  • protocol independent multicast - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.
  • protocol-independent multicast - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.
  • proton - A proton is a subatomic particle found in the nucleus of every atom.
  • prototype - In software development, a prototype is a rudimentary working model of a product or information system, usually built for demonstration purposes or as part of the development process.
  • prototyping - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
  • Prototyping Model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
  • provision - In general, provisioning means "providing" or making something available.
  • provisioning - In general, provisioning means "providing" or making something available.
  • proximity marketing (hyperlocal marketing) - Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific location.
  • proximity operator - A proximity operator is a character or word used to narrow search engine results by limiting them to those that have query keywords placed within a specific number of words in the content.
  • proximity sensing - Proximity sensing is the ability of a robot to tell when it is near an object, or when something is near it.
  • proxy - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • proxy firewall - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
  • proxy hacking - Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages.
  • proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • PRS - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • PRS - In the U.K.
  • PS/2 connector - A PS/2 connector is a round connector with six pins that some makes of personal computer use for the keyboard or mouse connection.
  • PS1 - Playstation is a video game console developed by Sony.
  • PS3 - Playstation is a video game console developed by Sony.
  • pseudo random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudo wire - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • pseudo-anonymity - Pseudo-anonymity is the appearance – but not the reality--of anonymity online.
  • pseudo-infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • pseudo-random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close