Browse Definitions :

Browse Definitions by Alphabet

PC - PER

  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC blade - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • PC demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • PC DOS - Also see DOS.
  • PC-DOS - Also see DOS.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS 12 requirements - PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS 2.0 - PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.
  • PCI DSS 3.0 - PCI DSS 3.0 is the third major iteration of the Payment Card Industry Data Security Standard, a set of policies and procedures administered by the Payment Card Industry Security Standards Council (PCI SSC) to ensure the security of electronic payment data and sensitive authentication data.
  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS merchant levels - Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses.
  • PCI DSS vocabulary quiz - Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI e - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI Express - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI forensic investigator program - A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks.
  • PCI gap assessment - A PCI gap assessment is the identification, analysis and documentation of areas of non-compliance with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI policy - A PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI QSA - Payment Card Industry Qualified Security Assessor (PCI QSA) is a designation conferred by the PCI Security Standards Council to individuals it deems qualified to perform PCI assessments and consulting services.
  • PCI Security Standards Council - The PCI Security Standards Council is an organization created by the major credit card companies in an effort to better protect credit card holder data.
  • PCI X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCI-CISP - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • PCI-E - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI-X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCIe - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCL - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • PCM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCM - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • PCMCIA - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • PCRAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCS - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • PCS - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PCS (personal communications service) - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PDA - Personal digital assistants were the precursors to smartphones.
  • PDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • PDD-63 - HSPD-7 (Homeland Security Presidential Directive No.
  • PDF - PDF is also an abbreviation for the Netware Printer Definition File.
  • PDL - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • PDM - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • PDP 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 (Programmed Data Processor-11) - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDU - A power distribution unit is a device for controlling electrical power in a data center.
  • Peachtree - Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.
  • peak - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak (pk) - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak to peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • PEAP - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEBCAK - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • pebi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.
  • PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.
  • PECR - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer botnet (P2P botnet) - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.
  • peer-to-peer computing - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • peercasting - Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.
  • Pel - The term pel has been replaced by pixel, another contraction of "picture element.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen test - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • penetration testing - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • penguin - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • Pentium - Also see the Pentium MMX and the Pentium 3.
  • Pentium 4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • PeopleSoft eProcurement - PeopleSoft eProcurement is a component of Oracle’s Supplier Relationship Management (SRM) product group that enables self-service for requisition and other procurement tasks.
  • per cent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • per cent symbol (%) - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent change - Percent change -- also known as percent difference.
  • percent change (percent difference) - Percent change -- also known as percent difference.
  • percent difference - Percent change -- also known as percent difference.
  • percent increase - percent decrease - Percent increase and percent decrease are measures of percent change, which is the extent to which a variable gains or loses intensity, magnitude, extent, or value.
  • percent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers.
  • perfect RAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.
  • performance - Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, (MIPS) - millions of instructions per second) during a benchmark test.
  • performance and accountability reporting - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
  • performance and accountability reporting (PAR) - Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an institution's profitability, efficiency and adherence to budget, comparing actual results against original targets.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close