Browse Definitions :

Browse Definitions by Alphabet

PST - WHA

  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • PSTN - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.
  • PSTN (public switched telephone network) - The public switched telephone network, or PSTN, is the world's collection of interconnected voice-oriented public telephone networks.
  • PTC ThingWorx - PTC ThingWorx is a model-based rapid application development (RAD) platform for the Internet of Things.
  • PTF - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.
  • PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.
  • PTR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PTT - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • PU - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).
  • public cloud storage - Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a pay-per-use basis, similar to the way a public utility like electric or gas provides and charges for services.
  • public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • Public Health Data Standards Consortium - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Data Standards Consortium (PHDSC) - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Information Network - Public Health Information Network (PHIN) is an initiative developed by the Center for Disease Control and Prevention (CDC) to establish and implement a framework for sharing public health information electronically.
  • public key - In cryptography, a public key is a large numerical value that is used to encrypt data.
  • public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
  • public key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • Public Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • public key infrastructure - PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange information using digital certificates.
  • public land mobile network - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.
  • Public private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • public relations (PR) - Public relations (PR) is the use of communications to manage public perception of an individual or an organization.
  • Public Relations Society of America (PRSA) - The Public Relations Society of America (PRSA) is the world's largest association for public relations (PR) professionals, overseeing more than 21,000 members.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • public switched telephone network - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.
  • public-key cryptography - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • Public-Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • Public-Key Cryptography Standards (PKCS) - Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.
  • Public-private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • Public-private partnership (PPP) - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • published applications - Published applications are virtual software programs that function as if they were installed locally.
  • PUE - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • pull marketing - Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods.
  • pull notification - Pull notifications are communications that are sent as a response to a client request.
  • pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
  • pulse amplitude modulation - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse code modulation - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • pulse code modulation (PCM) - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • PUP - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • Puppet - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppy Linux - Puppy Linux is a compact version of Linux, an operating system (OS) that provides computer users with a free or low-cost alternative to Unix.
  • purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
  • purchase order - A purchase order is a buyer's request to a seller to order goods.
  • pure risk - Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • Purple Screen of Death (PSOD) - A Purple Screen of Death (PSOD) is a diagnostic screen with white type on a purple background that is displayed when the VMkernel of an ESX/ESXi host experiences a critical error and becomes inoperative, terminating its running virtual machines.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push advertising - Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • push technology - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).
  • Push to Talk - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • PV cell - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).
  • PVC - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • PVM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • PVM - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.
  • PVR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PVS - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PW - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • Pwn2Own - Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference.
  • PWS - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • PXE - Preboot execution environment (PXE), pronounced pixie, is a set of standards that enables a computer to load an operating system (OS) over a network connection.
  • PXE - The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.
  • Python - Python is a high-level, general-purpose, interpreted object-oriented programming language.
  • PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
  • Software patch/fix - A software patch or fix helps resolve issues that crop up in different programs.
  • The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
  • The Phoenix Project book club - Chapters 1 and 2 podcast - This podcast (with transcript) covers the first two chapters of The Phoenix Project, a popular business and technology book about DevOps.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
  • What is public cloud? Everything you need to know - A public cloud is a platform that uses the standard cloud computing model to make resources -- such as virtual machines (VMs), applications or storage -- available to users remotely.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close