Browse Definitions :

Browse Definitions by Alphabet

PUR - WHA

  • purchase order - A purchase order is a buyer's request to a seller to order goods.
  • pure risk (absolute risk) - Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.
  • Pure Storage - Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.
  • Purple Screen of Death (PSOD) - A Purple Screen of Death (PSOD) is a diagnostic screen with white type on a purple background that is displayed when the VMkernel of an ESX/ESXi host experiences a critical error and becomes inoperative, terminating its running virtual machines.
  • purple squirrel - A purple squirrel is a metaphor used by recruiters and human relationship managers to describe the perfect job candidate.
  • purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
  • push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • push advertising - Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • push technology - Push technology (Webcasting) is the prearranged updating of news, weather, or other selected information on a computer user's desktop interface through periodic and generally unobtrusive transmission over the World Wide Web (including the use of the Web protocol on intranet).
  • Push to Talk - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.
  • PV cell - A photovoltaic cell (PV cell) is a specialized semiconductor diode that converts visible light into direct current (DC).
  • PVC - A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.
  • PVM - A personal VM (personal virtual machine) is a virtual computing environment that is allocated to an end user for personal use.
  • PVM - Parallel Virtual Machine (PVM) is a program that enables distributed computing among networked computers on different platforms, so that they can perform as a single, large unit for computer-intensive applications.
  • PVR - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PVS - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • PW - Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP, or MPLS.
  • Pwn2Own - Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference.
  • PWS - PWS, an abbreviation for Personal Web Server, is Microsoft's version of a Web server program for individual PC users who want to share Web pages and other files from their hard drive.
  • PXE - The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.
  • PXE - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.
  • PXE (Preboot Execution Environment) - Preboot Execution Environment (PXE) refers to various methods of getting an IBM-compatible computer, typically running Windows, to boot up without the need for a hard drive or boot diskette.
  • Python - Python is an interpreted, object-oriented programming language similar to PERL, that has gained popularity because of its clear syntax and readability.
  • PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
  • Software patch/fix - A software patch or fix helps resolve issues that crop up in different programs.
  • The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
  • The Phoenix Project book club - Chapters 1 and 2 podcast - This podcast (with transcript) covers the first two chapters of The Phoenix Project, a popular business and technology book about DevOps.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is public cloud? Everything you need to know - A public cloud is a platform that uses the standard cloud computing model to make resources -- such as virtual machines (VMs), applications or storage -- available to users remotely.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close