Browse Definitions by Alphabet
- privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an organization's IT environments.
- problem list - A problem list is a document that states the most important health problems facing a patient such as nontransitive illnesses or diseases, injuries suffered by the patient, and anything else that has affected the patient or is currently ongoing with the patient.
- problem program - Now seldom used, the term problem program is used to distinguish a computer program that directly supports a user application from an operating system, a utility, or any other underlying support programming.
- process - A process is an instance of a program running in a computer.
- Process Explorer - Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.
- process hollowing - Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code.
- process innovation - Process innovation refers to a change in an existing operation or product that creates significant value for an organization.
- process intelligence (business process intelligence) - Process intelligence is data that has been systematically collected to analyze the individual steps within a business process or operational workflow.
- process manufacturing - Process manufacturing is a production method in which goods are created by combining supplies, ingredients or raw materials using a predetermined formula or recipe.
- process mining - Process mining is a technique that interprets logs from enterprise applications -- like customer resource management (CRM) and enterprise resource planning (ERP) platforms -- to identify the steps in common business processes, detect variations and prioritize areas of improvement.
- processing in memory (PIM) - Processing in memory, or PIM (sometimes called processor in memory), refers to the integration of a processor with Random Access Memory (RAM) on a single chip.
- processor (CPU) - A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.
- procure to pay (P2P) - Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.
- procurement plan - A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding and selecting a vendor.
- product analytics - Product analytics is the process of gathering and transforming user-level data into insights that reveal how customers interact with specific products.
- product data management (PDM) - Product data management (PDM) is the process of capturing and managing the electronic information related to a product so it can be reused in business processes such as design, production, distribution and marketing.
- product development (new product development) - Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, development and marketing of newly created or rebranded goods and services.
- product-qualified lead (PQL) - A product-qualified lead (PQL) is an individual or business that experienced value from using a product as a result of a free trial, use of a limited feature model or other types of first-hand experience with a product.
- productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, spreadsheets and presentations.
- professional services - A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.
- profit and loss statement (P&L) - A profit and loss statement (P&L), also called an income statement or statement of operations, is a financial report that shows a company's revenues, expenses and net profit or loss over a given period of time.
- program - In computing, a program is a specific set of ordered operations for a computer to perform.
- program counter - A program counter is a special register in a computer processor that contains the memory address (location) of the next program instruction to be executed.
- program/erase cycle (P/E cycle) - A solid-state storage program/erase cycle (P/E cycle) is a sequence of events in which data is written to a solid-state NAND flash memory cell, such as the type found in a flash or thumb drive, and is subsequently erased and rewritten.
- programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular, solid-state computer with customized instructions for performing a particular task.
- progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
- project charter - A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.
- project constraint - A constraint in project management is any restriction that defines a project's limitations.
- project management - Project management is the discipline of using established principles, procedures and policies to guide a project from conception through completion.
- Project Management Body of Knowledge (PMBOK) - The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).
- project management framework - A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.
- Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
- Project planning: What it is and 5 steps to create a plan - Project planning is a project management discipline that addresses how to complete a project in a certain time frame, usually with clearly defined stages, milestones and designated resources.
- Project portfolio management: A beginner's guide - Project portfolio management is a formal approach used by organizations to identify, prioritize, coordinate and monitor projects that align with their strategy and goals.
- project post-mortem - A project post-mortem is a business process that lets the project team, project management, and other stakeholders review and evaluate the results at the end of a project or after the resolution of an incident.
- project scope - Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
- Prometheus - Prometheus is an open source monitoring and alerting toolkit for microservices and containers that provides flexible queries and real-time notifications.
- proof of concept (POC) - A proof of concept (POC) is a demonstration of a product in which work is focused on determining whether an idea can be turned into a reality.
- proof of concept (PoC) exploit - A proof of concept (PoC) exploit is a nonharmful attack against a computer or network.
- proof of stake (PoS) - Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.
- propagation delay - Propagation delay is the amount of time required for a signal to be received after it has been sent; it is caused by the time it takes for the signal to travel through a medium.
- property management system (PMS) - A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.
- proportional control - Proportional control is a control system technology in which the response (output) is proportional to the difference between a setpoint value and the current value of a process variable.
- PropTech (property tech) - PropTech, or property technology, is any form of technology that combines the real estate market with IT in order to help users buy, research, sell or manage property.
- Protected Extensible Authentication Protocol (PEAP) - Protected Extensible Authentication Protocol (PEAP) is a security protocol commonly used to protect wireless networks.
- protected mode - Protected mode, also called protected virtual address mode, is the primary mode of operation for an Intel-based x86 microprocessor.
- proton - A proton is a subatomic particle found in the nucleus of every atom.
- prototype - A prototype is an early version of a product from which future versions are developed.
- prototyping model - The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
- provisioning - In the context of IT and computing, provisioning refers to the process of setting up IT infrastructure and providing access to authorized users to the various resources that are part of the infrastructure.
- proxy hacking - Proxy hacking is a cyber attack technique designed to supplant an authentic webpage in a search engine's index and search results pages to drive traffic to an imitation site.
- pseudocode - Pseudocode is a detailed yet readable description of what a computer program or algorithm should do.
- PST file - A PST file is a personal folder file in Microsoft Outlook.
- public cloud storage - Public cloud storage, also called online storage, is a service model that provides data storage on a pay-per-use basis.
- public data - Public data is information that can be shared, used, reused and redistributed without restriction.
- public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
- Public-Key Cryptography Standards (PKCS) - Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.
- public-private partnership (PPP) - A public-private partnership (PPP) is a funding model for public infrastructure projects and initiatives such as a new telecommunications system, public transportation system, airport or power plant.
- pulse - A pulse is a burst of current, voltage, or electromagnetic-field energy.
- purchase intent - Purchase intent is the probability that a consumer will buy a product or service.
- pure risk - Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.
- Pure Storage - Pure Storage is a provider of enterprise data flash storage products designed to substitute for electromechanical disk arrays.
- purple screen of death (PSOD) - A purple screen of death (PSOD) is a diagnostic screen with white type on a purple background that's displayed when the VMkernel of a VMware ESXi host experiences a critical error, becomes inoperative and terminates any virtual machines (VMs) that are running.
- purpose-built backup appliance (PBBA) - A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.
- push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
- Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
- Python - Python is a high-level, general-purpose, interpreted object-oriented programming language.
- PyTorch - PyTorch is an open source machine learning (ML) framework based on the Python programming language and the Torch library.
- software portability - Software portability is a characteristic attributed to a computer program if it can run with minimal rework on operating systems (OSes) other than the one for which it was created.
- The Phoenix Project - The Phoenix Project is a best-selling novel about DevOps.
- What are performance appraisals? A how-to guide for managers - A performance appraisal is the structured practice of regularly reviewing an employee's job performance.
- What are port numbers and how do they work? - A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
- What is a paperless office? - The paperless office is an umbrella term for business practices that improve the workplace by reducing reliance on paper.
- What is a partition in computers? - A partition is a logical division of a hard disk drive (HDD) that's treated as a separate unit by operating systems (OSes) and file systems.
- What is a pass-the-hash attack? - A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.
- What is a password? - A password is a string of characters used to verify the identity of a user during the authentication process.
- What is a perceptron? - A perceptron is a simple model of a biological neuron used in an artificial neural network.
- What is a personal area network (PAN)? - A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few meters.
- What is a PERT chart? And how to use it, with examples - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks in a project.
- What is a pivot table? - A pivot table is a statistics tool that summarizes and reorganizes selected columns and rows of data in a spreadsheet or database table to obtain a desired report.
- What is a PMO (project management office)? - A project management office (PMO) is a group, agency or department that defines and maintains the standards of project management for a company.
- What is a potentially unwanted program (PUP)? - A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download it.
- What is a private cloud? Definition and examples - Private cloud is a type of cloud computing that delivers advantages similar to public cloud, including scalability and self-service, but through a proprietary architecture.
- What is a private key? - A private key, also known as a secret key, is a variable in cryptography used with an algorithm to encrypt or decrypt data.
- What is a product owner? - A product owner is a role on a Scrum team that is responsible for the project's outcome.
- What is a programmable automation controller (PAC)? - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
- What is a programmable network (network programmability)? - A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control.
- What is a protocol data unit (PDU)? - A protocol data unit (PDU) is the basic unit of exchange between entities that communicate with a specified networking protocol.
- What is a proxy firewall? - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
- What is a proxy server? Definition and use cases - A proxy server is an intermediary between a user and the internet.
- What is a public key and how does it work? - In cryptography, a public key is a large numerical value that is used to encrypt data.
- What is a public key certificate? - A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
- What is PaaS? Platform as a service definition and guide - Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
- What is parallel processing? - Parallel processing is a method in computing of running two or more processors, or CPUs, to handle separate parts of an overall task.
- What is parity in computing? - In computers, parity (from the Latin paritas, meaning "equal or equivalent") is a technique that checks whether data has been lost or written over when it is moved from one place in storage to another or when it is transmitted between computers.
- What is Pascal case? - Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.
- What is passive keyless entry (PKE)? - Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the vehicle, unlocking the door on approach or when the door handle is pulled, and locking it when the user walks away or touches the car on exit.
- What is password cracking? - Password cracking is the process of using an application program to identify an unknown or forgotten password that allows access to a computer or network resource.
- What is passwordless authentication? - Passwordless authentication allows a user to sign into a service without using a password.
- What is patch management? Lifecycle, benefits and best practices - Patch management is the subset of systems management that involves identifying, acquiring, testing and installing patches, or code changes, that are intended to fix bugs, close security holes or add features.