Browse Definitions by Alphabet

  • What is patch management? Lifecycle, benefits and best practices - Patch management is the subset of systems management that involves identifying, acquiring, testing and installing patches, or code changes, that are intended to fix bugs, close security holes or add features.
  • What is pay for performance (P4P)? - Pay for performance (P4P) in healthcare is a payment model where hospitals, physicians and other healthcare workers are given financial incentives for meeting performance objectives.
  • What is pay-as-you-go cloud computing (PAYG cloud computing)? - Pay-as-you-go cloud computing, or PAYG cloud computing, is a payment method for cloud computing that charges based on usage.
  • What is payroll software? - Payroll software automates the process of paying salaried, hourly and contingent employees.
  • What is PCI DSS (Payment Card Industry Data Security Standard)? - The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
  • What is PDCA (Plan, Do, Check, Act)? - PDCA (Plan, Do, Check, Act, sometimes seen as Plan, Do, Check, Adjust) is a repetitive four-stage model for continuous improvement in business process management.
  • What is Perplexity AI? - Perplexity AI is an artificial intelligence-powered web search tool that can generate answers to user queries and complete other content-generation tasks.
  • What is personal cloud storage (PCS)? - Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming.
  • What is pharming? - Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • What is PHI (protected or personal health information)? - Protected health information (PHI), also referred to as 'personal health information,' is the demographic information, medical histories, test and laboratory results, physical and mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • What is physical security and how does it work? - Physical security protects personnel, hardware, software, networks, facilities and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.
  • What is picture archiving and communication system (PACS)? - Picture archiving and communication system (PACS) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically relevant reports.
  • What is pipelining? - Pipelining is the process of a computer processor executing computer instructions as separate stages.
  • What is PKI (public key infrastructure)? - PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption.
  • What is podcasting? - Podcasting is the preparation and distribution of digital audio files to the computers of subscribed users using Really Simple Syndication (RSS) feeds.
  • What is PowerShell and how to use it: The ultimate tutorial - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
  • What is predictive analytics? An enterprise guide - Predictive analytics is a form of advanced analytics that uses current and historical data to forecast activity, behavior and trends.
  • What is privileged access management (PAM)? - Privileged access management (PAM) is a security framework designed to protect organizations against cyberthreats by controlling and monitoring access to critical information and resources.
  • What is product as a service? - Product as a service (PaaS) is the concept of selling the services and outcomes a product can provide rather than the product itself.
  • What is production planning and why is it important? - Production planning is the act of developing a guide for the design and production of a given product or service.
  • What is professional services automation (PSA)? - Professional services automation (PSA) is a type of software application suite that provides a service business with the functionality it needs to manage core business processes.
  • What is programmatic advertising and how does it work? - Programmatic advertising is a data-driven method that automates the process of buying and selling digital advertisements.
  • What is promiscuous mode in networking? - In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just the packets addressed to the host.
  • What is prompt chaining? Definition and benefits - Prompt chaining is a technique used when working with generative artificial intelligence (generative AI) models in which the output from one prompt is used as input for the next.
  • What is prompt engineering? - Prompt engineering is an artificial intelligence (AI) engineering technique that refines large language models (LLMs), with specific prompts and recommended outputs.
  • What is PSTN (public switched telephone network)? - PSTN (public switched telephone network) is the world's collection of interconnected voice-oriented public telephone networks via traditional circuit-switched networks.
  • What is public cloud? A definition and in-depth guide - A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources, applications and services available on demand to remote users around the world.
  • What is Wi-Fi Piggybacking? - Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority.