Browse Definitions :

Browse Definitions by Alphabet

PRO - PUS

  • protocol-independent multicast - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.
  • protocol-independent multicast (PIM) - Protocol-independent multicast (PIM) is a set of four specifications that define modes of Internet multicasting to allow one-to-many and many-to-many transmission of information.
  • proton - A proton is a subatomic particle found in the nucleus of every atom.
  • prototype - In software development, a prototype is a rudimentary working model of a product or information system, usually built for demonstration purposes or as part of the development process.
  • prototyping - The prototyping model is a systems development method (SDM) in which a prototype (an early approximation of a final system or product) is built, tested, and then reworked as necessary until an acceptable prototype is finally achieved.
  • Prototyping Model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
  • provision - In general, provisioning means "providing" or making something available.
  • provisioning - In general, provisioning means "providing" or making something available.
  • proximity marketing (hyperlocal marketing) - Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific location.
  • proximity operator - A proximity operator is a character or word used to narrow search engine results by limiting them to those that have query keywords placed within a specific number of words in the content.
  • proximity sensing - Proximity sensing is the ability of a robot to tell when it is near an object, or when something is near it.
  • proxy - What is a proxy server? A proxy server acts as an intermediary between an end user and the Internet for security, privacy, administrative control and caching services.
  • proxy firewall - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
  • proxy hacking - Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages.
  • proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • PRS - In the U.K.
  • PRS - In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.
  • PS/2 connector - A PS/2 connector is a round connector with six pins that some makes of personal computer use for the keyboard or mouse connection.
  • PS1 - Playstation is a video game console developed by Sony.
  • PS3 - Playstation is a video game console developed by Sony.
  • pseudo random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudo wire - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • pseudo-anonymity - Pseudo-anonymity is the appearance – but not the reality--of anonymity online.
  • pseudo-infinite loop - An infinite loop (sometimes called an endless loop) is a piece of coding that lacks a functional exit so that it repeats indefinitely.
  • pseudo-random number generator - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • pseudocode - Pseudocode (pronounced SOO-doh-kohd) is a detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.
  • pseudonymity - Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym.
  • pseudonymous profile - A pseudonymous profile is a collection of information about a particular computer user that identifies the user either by their computer's IP address or by a randomly-generated nickname.
  • pseudoscience - Pseudoscience is a proposition, a finding or a system of explanation that is presented as science but that lacks the essential rigor of the scientific method.
  • pseudowire - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • PSK - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • PSK31 - Phase-shift keying (PSK) is a method of digital communication in which the phase of a transmitted signal is varied to convey information.
  • PSN - A PSN (processor serial number) is a software-readable unique serial number that Intel has stamped into its Pentium 3 microprocessor.
  • PSS - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • PST file - A PST file is a personal folder file in Microsoft Outlook.
  • PSTN - PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.
  • PSTN (public switched telephone network) - PSTN (public switched telephone network) is the world’s collection of interconnected voice-oriented public telephone networks.
  • PTC ThingWorx - PTC ThingWorx is a model-based rapid application development (RAD) platform for the Internet of Things.
  • PTF - In IBM, a program temporary fix (PTF) is a temporary solution to a bug in an IBM software product that is made available for customers to install.
  • PTO (paid time off, personal time off) - Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.
  • PTR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PTT - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • PU - In IBM's Systems Network Architecture (SNA), a physical unit (PU) identifies a network node that supports communication sessions between logical units (LU).
  • public cloud storage - Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a pay-per-use basis, similar to the way a public utility like electric or gas provides and charges for services.
  • public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • public domain software - Programs that are uncopyrighted because their authors intended to share them with everyone else are in the public domain.
  • public folder - In Microsoft Outlook, a public folder is a folder created to share information with others.
  • Public Health Data Standards Consortium - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Data Standards Consortium (PHDSC) - The Public Health Data Standards Consortium (referred to as PHDSC or the Consortium) is an independent agency that focuses on improvements in health information technology for both the health care industry and the public health market.
  • Public Health Information Network - Public Health Information Network (PHIN) is an initiative developed by the Center for Disease Control and Prevention (CDC) to establish and implement a framework for sharing public health information electronically.
  • public key - In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures.
  • public key certificate - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
  • public key cryptography - Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to encrypt and decrypt data.
  • Public Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • public key infrastructure - A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.
  • public land mobile network - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.
  • public land mobile network (PLMN) - (pu A public land mobile network (PLMN) is any wireless communications system intended for use by terrestrial subscribers in vehicles or on foot.
  • Public private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • public relations (PR) - Public relations (PR) is the use of communications to manage public perception of an individual or an organization.
  • Public Relations Society of America (PRSA) - The Public Relations Society of America (PRSA) is the world's largest association for public relations (PR) professionals, overseeing more than 21,000 members.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • public switched telephone network - PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.
  • public-key cryptography - Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to encrypt and decrypt data.
  • Public-Key Cryptography Standards - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • Public-Key Cryptography Standards (PKCS) - The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).
  • Public-private partnership - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • Public-private partnership (PPP) - Public-private partnership (PPP) is a funding model for a public infrastructure project such as a new telecommunications system, airport or power plant.
  • published applications - Published applications are virtual software programs that function as if they were installed locally.
  • PUE - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • pull marketing - Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods.
  • pull notification - Pull notifications are communications that are sent as a response to a client request.
  • pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
  • pulse amplitude modulation - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the transmission of data by varying the amplitudes (voltage or power levels) of the individual pulses in a regularly timed sequence of electrical or electromagnetic pulses.
  • pulse code modulation - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • pulse code modulation (PCM) - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • pulsing zombie - A pulsing zombie is a computer whose security has been compromised without its owner's knowledge by a cracker so that it intermittently carries out a denial-of-service attack on target computers in a network.
  • pumpKIN - PumpKIN is a free, open source application that is used for exchange of data using the Trivial File Transfer Protocol (TFTP).
  • PunchOut - PunchOut is an e-procurement software application from Ariba that makes it possible for a buyer to access a supplier's Web site from within the buyer's own procurement application.
  • PUP - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • PUP (potentially unwanted program) - A PUP (potentially unwanted program) is a program that may be unwanted, despite the possibility that users consented to download it.
  • Puppet - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppet (Puppet Labs) - Puppet is an open source systems management tool for centralizing and automating configuration management.
  • Puppy Linux - Puppy Linux is a compact version of Linux, an operating system (OS) that provides computer users with a free or low-cost alternative to Unix.
  • purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
  • purchase order - A purchase order is a buyer's request to a seller to order goods.
  • pure play - Pure play is a business term used to indicate a company, business model or investment focused on a particular industry, product, service or line of distribution.
  • pure risk (absolute risk) - Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • Purple Book - The Purple Book is the informal name for Philips and Sony's specification document for the double-density compact disk (DDCD) format.
  • Purple Screen of Death (PSOD) - A Purple Screen of Death (PSOD) is a diagnostic screen with white type on a purple background that is displayed when the VMkernel of an ESX/ESXi host experiences a critical error and becomes inoperative, terminating its running virtual machines.
  • purple squirrel - A purple squirrel is a metaphor used by recruiters and human relationship managers to describe the perfect job candidate.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push advertising - Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • push technology (Webcasting) - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close