Browse Definitions :

Browse Definitions by Alphabet

PAY - PER

  • Payment Card Industry Data Security Standard - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.
  • payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
  • PayPhrase - Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.
  • payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.
  • PBD - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.
  • PBX - A private branch exchange (PBX) is a telephone system within an enterprise that switches calls between users on local lines, while enabling all users to share a certain number of external phone lines.
  • PC - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC blade - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • PC demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • PC DOS - Also see DOS.
  • PC-DOS - Also see DOS.
  • PC-DOS (Personal Computer - Disk Operating System) - Also see DOS.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS 12 requirements - PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS 2.0 - PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.
  • PCI DSS 3.0 - PCI DSS 3.0 is the third major iteration of the Payment Card Industry Data Security Standard, a set of policies and procedures administered by the Payment Card Industry Security Standards Council (PCI SSC) to ensure the security of electronic payment data and sensitive authentication data.
  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS merchant levels - Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses.
  • PCI DSS Requirements Fast Guide - A chart that lists the 6 control objectives and 12 requirements that make up the Payment Card Industry Data Security Standards (PCI DSS).
  • PCI DSS vocabulary quiz - Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI e - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI Express - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI forensic investigator program - A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks.
  • PCI gap assessment - A PCI gap assessment is the identification, analysis and documentation of areas of non-compliance with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI policy - A PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI QSA - Payment Card Industry Qualified Security Assessor (PCI QSA) is a designation conferred by the PCI Security Standards Council to individuals it deems qualified to perform PCI assessments and consulting services.
  • PCI Security Standards Council - The PCI Security Standards Council is an organization created by the major credit card companies in an effort to better protect credit card holder data.
  • PCI X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCI-CISP - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • PCI-E - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI-X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCIe - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCL - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • PCM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCM - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • PCMCIA - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • PCRAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCS - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PCS - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • PCS (personal communications service) - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PDA - Personal digital assistants were the precursors to smartphones.
  • PDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • PDD-63 - HSPD-7 (Homeland Security Presidential Directive No.
  • PDF - PDF is also an abbreviation for the Netware Printer Definition File.
  • PDL - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • PDM - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • PDP 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 (Programmed Data Processor-11) - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDU - A power distribution unit is a device for controlling electrical power in a data center.
  • Peachtree - Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.
  • peak - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak (pk) - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak to peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • PEAP - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEBCAK - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • pebi - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • pebibyte (PiB) - A pebibyte (PiB) is a unit of measure used to describe data capacity.
  • PechaKucha (pecha kucha) - PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds.
  • PECR - The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.
  • peer review - Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer botnet (P2P botnet) - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.
  • peer-to-peer computing - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peer-to-peer network (P2P network) - A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network.
  • peercasting - Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.
  • Pegasus malware - Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, including text messages, emails, key logs, audio and information from installed applications, such as Facebook or Instagram.
  • pegged cryptocurrency - A pegged cryptocurrency is an encryption-secured digital medium of exchange whose value is tied to that of some other medium of exchange, such as gold or the currency of a given nation.
  • Pel - The term pel has been replaced by pixel, another contraction of "picture element.
  • Peltzman Effect - The Peltzman Effect is the net-zero effect on overall safety between the presence of safety precautions and people’s tendency to be less cautious in their presence.
  • pen test - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • pen testing (penetration testing) - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • Pen Testing as a Service (PTaaS) - Pen testing as a service (PTaaS) is a cloud service that provides information technology (IT) professionals with the resources they need to conduct and act upon point-in-time and continuous penetration tests.
  • penetration testing - A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture.
  • penguin - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • Pentium - Also see the Pentium MMX and the Pentium 3.
  • Pentium 4 - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • Pentium 4 (P4) - Pentium 4 (P4) is the Intel processor (codenamed Willamette) that was released in November 2000.
  • people analytics (HR analytics) - People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • PeopleSoft eProcurement - PeopleSoft eProcurement is a component of Oracle’s Supplier Relationship Management (SRM) product group that enables self-service for requisition and other procurement tasks.
  • per cent symbol - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • per cent symbol (%) - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent - The per cent symbol is used in mathematics, engineering, and science to indicate parts per hundred.
  • percent change - Percent change -- also known as percent difference.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close