Browse Definitions :

Browse Definitions by Alphabet

PSE - WHA

  • pseudocode - Pseudocode (pronounced SOO-doh-kohd) is a detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • pseudoscience - Pseudoscience is a proposition, a finding or a system of explanation that is presented as science but that lacks the essential rigor of the scientific method.
  • PSK - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • PSK31 - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • PSN - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.
  • PSS - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • PSTN - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.
  • PSTN (public switched telephone network) - The public switched telephone network, or PSTN, is the world's collection of interconnected voice-oriented public telephone networks.
  • PTC ThingWorx - PTC ThingWorx is a model-based rapid application development (RAD) platform for the Internet of Things.
  • PTF - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.
  • PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.
  • PTR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PTT - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • PU - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).
  • public cloud storage - Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a pay-per-use basis, similar to the way a public utility like electric or gas provides and charges for services.
  • public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • Public Health Data Standards Consortium - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Data Standards Consortium (PHDSC) - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Information Network - Public Health Information Network (PHIN) is an initiative developed by the Center for Disease Control and Prevention (CDC) to establish and implement a framework for sharing public health information electronically.
  • public key - In cryptography, a public key is a large numerical value that is used to encrypt data.
  • public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
  • public key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • Public Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • public key infrastructure - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.
  • public land mobile network - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.
  • Public private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • public relations (PR) - Public relations (PR) is the use of communications to manage public perception of an individual or an organization.
  • Public Relations Society of America (PRSA) - The Public Relations Society of America (PRSA) is the world's largest association for public relations (PR) professionals, overseeing more than 21,000 members.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • public switched telephone network - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.
  • public-key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • Public-Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • Public-Key Cryptography Standards (PKCS) - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • Public-private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • Public-private partnership (PPP) - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • published applications - Published applications are virtual software programs that function as if they were installed locally.
  • PUE - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • pull marketing - Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods.
  • pull notification - Pull notifications are communications that are sent as a response to a client request.
  • pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
  • pulse amplitude modulation - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse code modulation - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • pulse code modulation (PCM) - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • PUP - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • PUP (potentially unwanted program) - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • Puppet - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppy Linux - Puppy Linux is a compact version of Linux, an operating system (OS) that provides computer users with a free or low-cost alternative to Unix.
  • purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
  • purchase order - A purchase order is a buyer's request to a seller to order goods.
  • pure risk (absolute risk) - Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • Purple Screen of Death (PSOD) - A Purple Screen of Death (PSOD) is a diagnostic screen with white type on a purple background that is displayed when the VMkernel of an ESX/ESXi host experiences a critical error and becomes inoperative, terminating its running virtual machines.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push advertising - Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • push technology - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).
  • Push to Talk - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.
  • PV cell - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).
  • PVC - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • PVM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • PVM - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.
  • PVR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PVS - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PW - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • Pwn2Own - Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference.
  • PWS - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • PXE - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.
  • PXE - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
  • PXE (Preboot Execution Environment) - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.
  • Python - Python is an interpreted, object-oriented programming language similar to PERL, that has gained popularity because of its clear syntax and readability.
  • PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
  • Software patch/fix - A software patch or fix helps resolve issues that crop up in different programs.
  • The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
  • The Phoenix Project book club - Chapters 1 and 2 podcast - This podcast (with transcript) covers the first two chapters of The Phoenix Project, a popular business and technology book about DevOps.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is public cloud? Everything you need to know - A public cloud is a platform that uses the standard cloud computing model to make resources -- such as virtual machines (VMs), applications or storage -- available to users remotely.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

Close