Browse Definitions :

Browse Definitions by Alphabet

  • R programming language - The R programming language is an open source scripting language for predictive analytics and data visualization.
  • R/3 - R/3 is the comprehensive set of integrated business applications from SAP, the German company that states it is the market and technology leader in business application software.
  • race condition - A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.
  • raceway - A raceway is an enclosed conduit that forms a physical pathway for electrical wiring and protect wires and cables from heat, corrosion, water intrusion and other environmental threats.
  • rack - A rack, in an IT (information technology) context, is a supporting framework that holds hardware modules.
  • rack server (rack-mounted server) - A rack server, also called a rack-mounted server, is a computer dedicated to use as a server and designed to be installed in a framework called a rack.
  • rack unit - A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.
  • radian per second (rad/s or rad/sec) - The radian per second (symbolized rad/s or rad/sec) is the Standard International (SI) unit of angular (rotational) speed.
  • radiant energy - Radiant energy is, simply, energy that radiates from a source of electromagnetic radiation, such as the light and heat radiating from the sun.
  • radical innovation - Radical innovation is an invention that destroys or supplants an existing business model.
  • radio access network (RAN) - A radio access network (RAN) is a major component of a wireless telecommunications system that connects individual devices to other parts of a network through a radio link.
  • radio frequency (RF, rf) - Radio frequency (RF) is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.
  • radiology information system (RIS) - A radiology information system (RIS) is a networked software system for managing medical imagery and associated data.
  • RADIUS (Remote Authentication Dial-In User Service) - RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • RAID (redundant array of independent disks) - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
  • RAID 0 (disk striping) - RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks group.
  • RAID 10 (RAID 1+0) - RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.
  • RAID 3 (redundant array of independent disks) - RAID 3 is a RAID configuration that uses striping and parity, but it uses a parity disk to store the parity information generated by a RAID controller instead of striping it with the data.
  • RAID 4 (redundant array of independent disks) - RAID 4 (redundant array of independent disks) is a RAID configuration that uses a dedicated parity disk and block-level striping across multiple disks.
  • RAID 5 - RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.
  • RAID 50 (RAID 5+0) - RAID 50, also known as RAID 5+0, combines distributed parity (RAID 5) with striping (RAID 0).
  • RAID 6 - RAID 6, also known as double-parity RAID, is one of several RAID schemes that work by placing data on multiple disks and enabling I/O operations to overlap in a balanced way, improving performance.
  • RAID controller - A RAID controller is a hardware device or software program used to manage hard disk drives or solid-state drives in a computer or storage array so they work as a logical unit.
  • RAIN (redundant/reliable array of inexpensive/independent nodes) - A reliable array of independent nodes (RAIN) is a heterogeneous cluster of compute and storage nodes connected in a fault-tolerant network topology that incorporates multiple interfaces and redundant hardware.
  • rainbow table - A rainbow table is a password hacking tool that uses a precomputed table of reversed password hashes to crack passwords in a database.
  • rainmaker - A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.
  • raised floor - A raised floor is a data center construction model in which a slightly higher floor is constructed above the building's original concrete slab floor, leaving the open space created between the two for wiring or cooling infrastructure.
  • RAM (random access memory) - Random access memory (RAM) is the hardware in a computing device that provides temporary storage for the operating system (OS), software programs and any other data in current use so they're quickly available to the device's processor.
  • RAM-based solid-state drive (SSD) - A RAM-based solid-state drive (SSD) is a storage device made from silicon microchips that has no moving parts and stores data electronically instead of magnetically.
  • random numbers - As the term suggests, a random number is a number chosen by chance -- i.
  • Rankine cycle - The Rankine cycle is a method of providing power in a closed system where a fluid is evaporated to perform a task and re-condensed.
  • ransomware as a service (RaaS) - Ransomware as a service (RaaS) is a subscription-based business model that enables affiliates to launch ransomware attacks by accessing and using pre-developed ransomware tools.
  • ransomware recovery - Ransomware recovery is the process of resuming operations following a cyberattack that demands payment in exchange for unlocking encrypted data.
  • rapid application development (RAD) - Rapid application development (RAD) is a model based on the concept that higher-quality products can be developed faster through more expedient processes, such as early prototyping, reusing software components and less formality in team communications.
  • rapid mobile app development (RMAD) - Rapid mobile application development (RMAD) uses low-code/no-code programming tools to expedite the application creation process for mobile platforms.
  • Raspberry Pi ($35 computer) - Raspberry Pi is a small, single-board computer that costs $35.
  • RAT (remote access Trojan) - A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer.
  • raw data (source data or atomic data) - Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.
  • raw device mapping - Raw device mapping (RDM) enables disk access in a virtual machine (VM) in the VMware server virtualization environment and allows a storage logical unit number (LUN) to be connected directly to a VM from the storage area network (SAN).
  • RDBMS (relational database management system) - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • React Native - React Native is an open source JavaScript framework for mobile application development.
  • reactance - Reactance is a form of opposition generated by components in an electric circuit when alternating current (AC) passes through it.
  • reactive programming - Reactive programming describes a design paradigm that relies on asynchronous programming logic to handle real-time updates to otherwise static content.
  • reactive systems architecture - A computer systems paradigm that takes advantage of the responsiveness, flexibility and resiliency of reactive programming, so that various components can take continue to function and even thrive if any component is compromised.
  • read-only - Read-only is a file attribute which only allows a user to view a file, restricting any writing to the file.
  • read-only memory (ROM) - Read-only memory, or ROM, is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to.
  • Real ID - Real ID is a driver's license that complies with standards mandated by the United States Real ID Act of 2005.
  • Real time gross settlement (RTGS) - Real Time Gross Settlement (RTGS) is an electronic form of funds transfer where the transmission takes place on a real time basis.
  • Real Time Streaming Protocol (RTSP) - Real Time Streaming Protocol (RTSP) is an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.
  • real user monitoring (RUM) - Real user monitoring (RUM) is a technology used by developers and network operators to gain real-world observability into web performance and service availability.
  • real-time analytics - Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.
  • real-time application (RTA) - A real-time application is an application program that functions within a time frame that the user senses as immediate or current.
  • real-time business intelligence (RTBI) - Real-time business intelligence (RTBI) combines data analytics and various data processing tools to enable access to the most recent, up-to-the-minute relevant data and visualizations.
  • real-time communications (RTC) - Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency or transmission delays.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • real-time monitoring - Real-time monitoring is the delivery of continuously updated data about systems, processes or events.
  • real-time operating system (RTOS) - A real-time operating system (RTOS) is an OS that guarantees real-time applications a certain capability within a specified deadline.
  • Real-Time Transport Control Protocol (RTCP) - Real-Time Transport Control Protocol (RTCP) is a protocol that works with Real-Time Protocol (RTP) to monitor data delivery on large multicast networks, mainly for streaming media, telephony and video conferencing.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • recommendation engine - A recommendation engine is a system that gives customers recommendations based upon their behavior patterns and similarities to people who might have shared preferences.
  • recommerce - Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.
  • record - In computer data processing, a record is a collection of data items arranged for processing by a program.
  • records information management (RIM) - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • records management - Records management is the supervision and administration of digital or paper records, regardless of format.
  • records retention schedule - A records retention schedule is a policy that defines how long paper and electronic content must be kept and provides disposal guidelines for how those items should be discarded.
  • recovery point objective (RPO) - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system or network goes down as a result of a hardware, program or communications failure.
  • recovery time objective (RTO) - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
  • recruitment - Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.
  • recruitment management system - A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.
  • recruitment marketing - Recruitment marketing is the combination of strategies and tools used by an organization to engage and entice job candidates in the pre-applicant phase of recruiting.
  • recruitment process outsourcing (RPO) - Recruitment process outsourcing (RPO) is when an employer turns the responsibility of finding potential job candidates over to a third-party service provider.
  • recurrent neural networks - A recurrent neural network (RNN) is a type of artificial neural network commonly used in speech recognition and natural language processing.
  • Red Hat - Red Hat is a software company that combines open source Linux operating system components with related programs into a distribution package that customers can order.
  • Red Hat Atomic Host - Red Hat Atomic Host is a variant of the Red Hat Enterprise Linux supported, open source operating system, designed to be a minimal OS with optimizations for container hosting.
  • Red Hat Enterprise Linux (RHEL) - Red Hat Enterprise Linux (RHEL) is an enterprise Linux operating system (OS) developed by Red Hat for the business market.
  • Red Hat OpenShift - Red Hat OpenShift is a multifaceted, open source container application development platform from Red Hat Inc.
  • red herring - A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.
  • red teaming - Red teaming is the practice of rigorously challenging plans, policies, systems and assumptions by adopting an adversarial approach.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundant - Data redundancy refers to the practice of keeping data in two or more places within a database or data storage system.
  • refactoring - Refactoring is the process of restructuring code, while not changing its original functionality.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of the computer processor.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and punishing undesired ones.
  • reinforcement learning from human feedback (RLHF) - Reinforcement learning from human feedback (RLHF) is a machine learning approach that combines reinforcement learning techniques, such as rewards and comparisons, with human guidance to train an artificial intelligence (AI) agent.
  • reinforcement theory - Reinforcement theory is a psychological principle suggesting that behaviors are shaped by their consequences, and that individual behaviors can be changed accordingly through reinforcement, punishment and extinction.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relationship marketing - Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term customer engagement rather than shorter-term goals like customer acquisition and individual sales.
  • release - A release is the distribution of the final version or the newest version of a software application.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • release train engineer (RTE) - A release train engineer (RTE) is an information technology (IT) professional in a large enterprise who drives continuous development initiatives while also acting as a full time chief scrum master for a Scaled Agile Framework (SAFe).
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close