Browse Definitions :

Browse Definitions by Alphabet

PAT - PEB

  • path to profitability (P2P) - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • pathing - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • pathing (path control) - Pathing (sometimes called path control) is a networking approach used to address the specific needs of storage networks (as compared to ordinary message networks) by changing the way that communication paths are managed and organized.
  • pathological computer use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • pathological Internet use - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • patient engagement - Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in their own medical care.
  • patient matching - Patient matching is a process of comparing data from different health IT systems to see if data sources match and belong to the same patient to obtain a complete record of the patient’s health history and medical care.
  • patient portal - A patient portal is a web-based access point that enables self-serve health IT services for patients.
  • patient record locator - A patient record locator is a computer service that allows doctors and nurses to obtain a patient’s electronic health records including electronic medical records, ambulatory medical record and prescription data.
  • patient similarity - Patient similarity is the concept of researching the best treatments and the ones to avoid based on the records of like individuals with like health conditions.
  • patient-generated health data (PGHD) - Patient-generated health data (PGHD) is data created, recorded or gathered by or from patients, family members or caregivers to help address a medical concern.
  • pattern - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • pattern (design pattern) - In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.
  • pattern recognition - Pattern recognition is the ability to detect arrangements of characteristics or data that yield information about a given system.
  • pay for performance (P4P) - Pay for performance (P4P), in healthcare, is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
  • pay for privacy - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access.
  • pay per use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • pay-as-you-go cloud computing (PAYG cloud computing) - The pay-as-you-go cloud computing (PAYG cloud computing) method charges users only for the services they use, eliminating wasted resources.
  • pay-as-you-grow pricing - Vendors that offer a pay-as-you-grow storage allow customers with growing environments to acquire capacity after an array has been installed through the purchase of licenses.
  • pay-per-use - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • pay-per-view - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.
  • payload (computing) - In computing, a payload is the carrying capacity of a packet or other transmission data unit.
  • Payment Application Data Security Standard - Payment Application Data Security Standard (PA-DSS) is a set of requirements that are intended to help software vendors develop secure payment applications that support PCI DSS compliance.
  • Payment Card Industry (PCI) - The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.
  • payment card industry compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • Payment Card Industry Data Security Standard - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.
  • payment processor - A payment processor is a company that facilitates communication between the bank that issued a customer’s debit or credit card and the seller’s bank.
  • PayPal - PayPal is a Web-based application for the secure transfer of funds between member accounts.
  • PayPhrase - Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.
  • payroll software - Payroll software automates the process of paying salaried, hourly and contingent employees.
  • PBD - In a Citrix XenServer, a physical block device (PBD) is a connector object that represents the interface between a physical host and an attached storage repository.
  • PBX - A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.
  • PC - In its more general usage, a personal computer (PC) is a microcomputer designed for use by one person at a time.
  • PC as a service (PCaaS) - PC as a service (PCaaS) is a device lifecycle management model in which an organization pays a monthly subscription fee to lease endpoint hardware and management services from a vendor.
  • PC blade - A blade PC, also called a PC blade, is a computer that is entirely contained in a thin, modular circuit card placed in a centralized, secure location such as a server rack.
  • PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size memory or I/O device that fits into a personal computer, usually a notebook or laptop computer.
  • PC demo - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • PC DOS - Also see DOS.
  • PC philanthropy - PC philanthropy is sharing some of the unused resources of your personal computer, especially unused computer cycles, to benefit a social cause.
  • PC-DOS - Also see DOS.
  • PC-DOS (Personal Computer - Disk Operating System) - Also see DOS.
  • PCAOB (Public Company Accounting Oversight Board) - The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.
  • PCI - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • PCI (Peripheral Component Interconnect) - PCI (Peripheral Component Interconnect) is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation.
  • PCI assessment - A PCI assessment is an audit of the 12 credit card transaction compliance requirements required by the Payment Card Industry Data Security Standard.
  • PCI compliance - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS (Payment Card Industry Data Security Standard) - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • PCI DSS 12 requirements - PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI DSS 2.0 - PCI DSS 2.0 (Payment Card Industry Data Security Standard Version 2.
  • PCI DSS 3.0 - PCI DSS 3.0 is the third major iteration of the Payment Card Industry Data Security Standard, a set of policies and procedures administered by the Payment Card Industry Security Standards Council (PCI SSC) to ensure the security of electronic payment data and sensitive authentication data.
  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance) - Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.
  • PCI DSS merchant levels - Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses.
  • PCI DSS Requirements Fast Guide - A chart that lists the 6 control objectives and 12 requirements that make up the Payment Card Industry Data Security Standards (PCI DSS).
  • PCI DSS vocabulary quiz - Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI e - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI Express - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI forensic investigator program - A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks.
  • PCI gap assessment - A PCI gap assessment is the identification, analysis and documentation of areas of non-compliance with the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI policy - A PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).
  • PCI QSA - Payment Card Industry Qualified Security Assessor (PCI QSA) is a designation conferred by the PCI Security Standards Council to individuals it deems qualified to perform PCI assessments and consulting services.
  • PCI Security Standards Council - The PCI Security Standards Council is an organization created by the major credit card companies in an effort to better protect credit card holder data.
  • PCI X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCI-CISP - CISP (Cardholder Information Security Program) and PCI (Payment Card Industry Data Security Standard) are specifications developed and used by credit card companies for the purpose of ensuring and enhancing the privacy and security of financial data.
  • PCI-E - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCI-X - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCI-X (Peripheral Component Interconnect Extended) - PCI-X (Peripheral Component Interconnect Extended) is a computer bus technology (the "data pipes" between parts of a computer) that increases the speed that data can move within a computer from 66 MHz to 133 MHz.
  • PCIe - PCIe is a high-speed serial interconnection standard for connecting peripheral devices to a computer's motherboard.
  • PCIe SSD (PCIe solid-state drive) - A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.
  • PCL - Printer Control Language (PCL) is a language (essentially, a set of command code s) that enables applications to control HP DeskJet, LaserJet, and other HP printers.
  • PCM - Pulse code modulation (PCM) is a digitalscheme for transmitting analogdata.
  • PCM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCMCIA - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • PCMCIA card - A PCMCIA card is a credit card-size memory or I/O device that connects to a personal computer, usually a notebook or laptop computer.
  • PCoIP (PC over IP) - PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.
  • PCRAM - Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.
  • PCS - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • PCS - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PCS (personal communications service) - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PDA - Personal digital assistants were the precursors to smartphones.
  • PDC - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • PDD-63 - HSPD-7 (Homeland Security Presidential Directive No.
  • PDF - PDF is also an abbreviation for the Netware Printer Definition File.
  • PDL - A page description language (PDL) specifies the arrangement of a printed page through commands from a computer that the printer carries out.
  • PDM - Product development, or new product development (NPD), is the process of bringing new or updated products or services to a target market through a systematic approach to idea creation, design, marketing and commercialization.
  • PDP 11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDP-11 (Programmed Data Processor-11) - PDP-11 (Programmed Data Processor-1 is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation (DEC) from the early 1960s through the mid-1990s.
  • PDU - A power distribution unit is a device for controlling electrical power in a data center.
  • Peachtree - Peachtree is an accounting application for small and medium-sized businesses (SMBs) made by Sage Software.
  • peak - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak (pk) - Peak (pk) is the maximum value, either positive (pk+) or negative (pk-), that a waveform attains.
  • peak to peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • peak-to-peak (pk-pk) - Peak-to-peak (pk-pk) is the difference between the maximum positive and the maximum negative amplitudes of a waveform, as shown below.
  • PEAP - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • PEBCAK - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close